/* CSS to help with ACF styling */ #page-header .h1 {color: #444;} #page-header h2.text-color-xsdn-color {color: #444;}
/* CSS to help with ACF styling */ #page-header .h1 {color: #fff;} #page-header h2.text-color-xsdn-color {color: #fff;}
/* CSS to help with ACF styling */ #page-header .h1 {color: ;} #page-header h2.text-color-xsdn-color {color: ;}
/* CSS to help with ACF styling */ #page-header {background-color: #031ac3;}
/* CSS to help with ACF styling */ #page-header {background: #fff url() center center; padding-top: 0px; padding-bottom: 0px; } @media all and (max-width: 4699px) and (min-width: 1925px) { .title-and-subtitle-background-image { padding-top: 3% !important; padding-bottom: 3% !important; } }
/* CSS to help with ACF styling */ #page-header {background: ;}

Related Resources

“Bad guys don’t sit still, they innovate, and no matter what you do to protect yourself, there is no magic box that magically makes bad guys go away and not want to take your stuff. Whatever new ways you have to protect your stuff, they’re going to develop new ways to try to take it.”

Dave Merkel, Chief Technology Officer, FireEye

Download the slides

The Latest Healthcare Cyber Security Threats: Threat Actors See Growing Value in PHI and an Industry that is Highly Valued yet Under Protected

During this FairWarning Executive Series Webinar, Dave Merkel, Chief Technology Officer of FireEye, and Kurt Long, Founder and CEO of FairWarning, discussed today’s emerging threats and how covered entities can create a world-class threat prevention and response solution.

Discussion included:

  • Activities of nation state groups targeting healthcare’s intellectual property, proprietary information and personal data in order to assist their governments in achieving their strategic healthcare goals
  • Enterprise-like cyber criminal groups’ techniques, tactics, and procedures to turn personal data into profit including compromising networks to take personally identifiable information and payment card data
  • How entities can create a coordinated threat prevention and response framework by leveraging a multi-vendor approach for end-to-end security
  • Implications and action steps for the healthcare industry

RELATED LEARNING CENTER

  • Increase Visibility Into Your Drug Diversion Monitoring Program
    Learn More
    Data Sheet
    Increase Visibility Into Your Drug Diversion Program
  • Addressing Drug Diversion in Healthcare - Where do I Start?
    Learn More
    Whitepaper
    Addressing Drug Diversion In Healthcare: Where Do I Start?
  • Learn More
    Data Sheet
    GDPR Mapping Guide