Attackers are targeting healthcare organizations to gain access to sensitive patient data and medical records. Medical devices, identity architecture and critical assets are being targeted.

Traditional security controls are necessary, but not sufficient to protect the assets. Healthcare organizations are deploying deception technology to gain early and precise threat detection, including identity-driven attacks.

Watch this engaging webinar to hear from Doug J. Spangler, Sr. Analyst of Cyber Threat Intelligence at Trinity Health. Doug will cover insights and best practices based on his 24 years of solid hands-on experience integrating advanced cyber solutions including deception technologies solutions from Acalvio at Trinity Health.

  • The threat vectors and use cases that drove the deployment of deception at Trinity Health
  • What are the key learnings from the deception rollout
  • How can healthcare organizations stay protected from current and emerging threats
 
Speakers:
 
Doug   Dylan
Doug J. Spangler
Sr. Analyst of Cyber Threat Intelligence
 
Dylan Hall
Cyber Threat Intelligence Analyst
 
Content
Attackers are targeting healthcare organizations to gain access to sensitive patient data and medical records. Medical devices, identity architecture and critical assets are being targeted.

Traditional security controls are necessary, but not sufficient to protect the assets. Healthcare organizations are deploying deception technology to gain early and precise threat detection, including identity-driven attacks.

Watch this engaging webinar to hear from Doug J. Spangler, Sr. Analyst of Cyber Threat Intelligence at Trinity Health. Doug will cover insights and best practices based on his 24 years of solid hands-on experience integrating advanced cyber solutions including deception technologies solutions from Acalvio at Trinity Health.

  • The threat vectors and use cases that drove the deployment of deception at Trinity Health
  • What are the key learnings from the deception rollout
  • How can healthcare organizations stay protected from current and emerging threats
 
Speakers:
 
Speaker_Image
 
Doug J. Spangler
Sr. Analyst of Cyber Threat Intelligence
Speaker_Image
 
Dylan Hall
Cyber Threat Intelligence Analyst
 
Update the content for Speakers Description
 
Add the speaker Details
Speaker_Image
Add the speaker Details
Speaker_Image
Add the speaker Details
Speaker_Image
Add the speaker Details
Update the content for Speakers Description