The global pandemic of 2020 stressed healthcare and aid organizations to their breaking points. Unfortunately, cyber criminals and nations states took advantage of the situation to launch new attacks against the sector. Attacks ran the gamut from COVID-themed phishing lures designed to land ransomware, like Ryuk, on victim devices to blackmailing patients after data breaches. In addition to the health systems themselves attackers are also going after aid organizations and the supply and distribution chain for COVID vaccines.
In this on-demand webinar, Diana Kelley, CTO & Co-Founder of SecurityCurve, will breakdown the most common TTPs (tactic, techniques, and procedures) being used against healthcare and provide a list of recommendations organizations can implement to strengthen their IT immune systems and remain resilient against new and emerging attacks. Diana also covers ransomware examples like:
- How human-operated ransomware campaigns, like Ryuk, gain persistence
- New techniques like blackmailing patients after health data breaches
- Recently discovered attacks on the vaccine distribution supply chain
Diana Kelley’s security career spans over 30 years. She is Co-Founder and CTO of SecurityCurve and donates much of her time to volunteer work in the cybersecurity community, including serving on the ACM Ethics & Plagiarism Committee, as CTO and Board member at Sightline Security, Board member and Inclusion Working Group champion at WiCyS, Cybersecurity Committee Advisor at CompTIA, and RSAC US Program Committee.
Diana produces the #MyCyberWhy series, hosts BrightTALK’s The Security Balancing Act, and is a Principal Consulting Analyst with TechVision Research and a member of The Analyst Syndicate.
She was the Cybersecurity Field CTO for Microsoft, Global Executive Security Advisor at IBM Security, GM at Symantec, VP at Burton Group (now Gartner), and a Manager at KPMG.
She is a sought after keynote speaker, the co-author of the book Cryptographic Libraries for Developers, has been a lecturer at Boston College's Masters program in cybersecurity, the EWF 2020 Executive of the Year, and one of Cybersecurity Ventures 100 Fascinating Females Fighting Cybercrime.
Deputy CTO focused in Privileged Access Management (PAM) and Identity and Access Management (IAM). Architecture, Engineering, and Implementation of BeyondTrust's Privileged Access Management Solutions enforcing Privileged Password Managment and Privileged Session Management, Privileged Endpoint Management, and Secure Remote Access which utilizes a single pane of glass for all management aspects including Audit, Reporting, and Vulnerability.