SlideShare uma empresa Scribd logo
1 de 15
Cybersecurity and Healthcare
A Survey of Healthcare IT Professionals at HIMSS 2018
S U R V E Y
Survey of 102 IT professionals taken at HIMSS 2018
Healthcare data is extremely
valuable on the dark web. As a
result, attacks against healthcare
organizations are on the rise.
Do you worry about a cybersecurity event striking your organization?
Not worried
/not very
concerned
7%
Concerned
16%
Very concerned
77%
What type of cyberattack are you most concerned about?
Ransomware
32%
DDoS
13%
Compromised applications
19%
Insider threats
25%
Other
11%
How confident are you in your organization’s
ability to handle a cyberattack?
Needs
work
9%
Adequate
32%
Above
average
33%
Very
confident
19%
Needs an
overhaul
6%
Does your organization have a senior
information security leader such as a CISO?
No
14%
No, but looking to hire
within next 12 months
14%
Yes
73%
Does your organization have a
cybersecurity incident response plan?
No
14%
No, but on roadmap in
next 12 months
12%
Yes
75%
Has your institution suffered from a cyberattack?
No
44%
Yes, more than
a year ago
4%
Yes, in the past year
38%
I’m not sure
13%
?
Has your institution ever paid a ransom or extortion fee?
No
43%
I’m not sure
48%
Yes
9%
?
Regarding internal threats from employee or contractor,
what are you most worried about?
Malicious users
24%
Careless users
51%
Compromised users
25%
What makes detecting insider threats difficult?
Lack of tools to monitor employee
and other insiders’ activities
27%
More employees, contractors,
business partners have access
to our network
24%
More company assets on the
network / cloud
24%
Lack of staff to analyze permissions
data on employee access
25%
What is the most time-consuming task when it comes to
investigating or responding to insider threats?
24%
32%
26% Tuning security
tools
Collecting information from
diverse security tools
Forensics or
incident analysis
17% Managing too many
security alerts
Increasingly cyber incidents are rendering
healthcare organizations unable to access
patient data which has impacted overall
patient care. For this reason, it is more
crucial than ever that healthcare
organizations take steps to protect their
data and applications now.
— Terry Ray, Imperva CTO
”
“
L E A R N M O R E
To learn more about protecting data and preventing
security breaches in healthcare, click the button below.
Imperva is a leading cybersecurity company that delivers best-in-class
solutions to protect data and applications – wherever they reside –
on-premises, in the cloud, and across hybrid environments.

Mais conteúdo relacionado

Mais procurados

The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security SurveyIDG
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationSilicon Valley Bank
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyCigniti Technologies Ltd
 
Security and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowSecurity and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowThe Internet of Things
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
 
Innovations in cybersecurity panel
Innovations in cybersecurity panelInnovations in cybersecurity panel
Innovations in cybersecurity panelSWIFT
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Fujitsu Middle East
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams CompTIA
 
New Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesNew Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesSynopsys Software Integrity Group
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...Proofpoint
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident DetectionTripwire
 
What Has Changed Since COVID-19?
What Has Changed Since COVID-19?What Has Changed Since COVID-19?
What Has Changed Since COVID-19?SophiaPalmira
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsArgyle Executive Forum
 

Mais procurados (20)

State of Security
State of SecurityState of Security
State of Security
 
Infosecurity Europe - Infographic
Infosecurity Europe - InfographicInfosecurity Europe - Infographic
Infosecurity Europe - Infographic
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 
Cybersecurity's Impact on Innovation
Cybersecurity's Impact on InnovationCybersecurity's Impact on Innovation
Cybersecurity's Impact on Innovation
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategy
 
Security and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to KnowSecurity and PCI: 4 Things You Need to Know
Security and PCI: 4 Things You Need to Know
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Innovations in cybersecurity panel
Innovations in cybersecurity panelInnovations in cybersecurity panel
Innovations in cybersecurity panel
 
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
Radical Innovation In Security (New Techniques Applied To Tomorrow’s Risk)
 
2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams 2018 Trends in Cybersecurity: Building Effective Security Teams
2018 Trends in Cybersecurity: Building Effective Security Teams
 
New Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challengesNew Synopsys research uncovers security's biggest challenges
New Synopsys research uncovers security's biggest challenges
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 
10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection10 Steps to Better Security Incident Detection
10 Steps to Better Security Incident Detection
 
What Has Changed Since COVID-19?
What Has Changed Since COVID-19?What Has Changed Since COVID-19?
What Has Changed Since COVID-19?
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOsGlobal Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
 

Semelhante a Cybersecurity and Healthcare - HIMSS 2018 Survey

Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summarypatmisasi
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014Peggy Lawless
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced ThreatsHannah Jenney
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilienceaccenture
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study SummaryScalar Decisions
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...SolarWinds
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyQualys
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksAbhishek Sood
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011Lumension
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsBitglass
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022SophiaPalmira1
 

Semelhante a Cybersecurity and Healthcare - HIMSS 2018 Survey (20)

Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
EndpointSecurityConcerns2014
EndpointSecurityConcerns2014EndpointSecurityConcerns2014
EndpointSecurityConcerns2014
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 
Healthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber ResilienceHealthcare Payers: 2018 State of Cyber Resilience
Healthcare Payers: 2018 State of Cyber Resilience
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study Summary
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 

Mais de Imperva

API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 

Mais de Imperva (20)

API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 

Último

CECT NECK NECK ANGIOGRAPHY CAROTID ANGIOGRAPHY
CECT NECK NECK ANGIOGRAPHY CAROTID ANGIOGRAPHYCECT NECK NECK ANGIOGRAPHY CAROTID ANGIOGRAPHY
CECT NECK NECK ANGIOGRAPHY CAROTID ANGIOGRAPHYRMC
 
Diseases of the Respiratory System (J00-J99),.pptx
Diseases of the Respiratory System (J00-J99),.pptxDiseases of the Respiratory System (J00-J99),.pptx
Diseases of the Respiratory System (J00-J99),.pptxEMADABATHINI PRABHU TEJA
 
Empathy Is a Stress Response - Choose Compassion instead
Empathy Is a Stress Response - Choose Compassion insteadEmpathy Is a Stress Response - Choose Compassion instead
Empathy Is a Stress Response - Choose Compassion insteadAlex Clapson
 
Anatomy Shelf Notevbhhhhhhhhhhhhhhhs.pdf
Anatomy Shelf Notevbhhhhhhhhhhhhhhhs.pdfAnatomy Shelf Notevbhhhhhhhhhhhhhhhs.pdf
Anatomy Shelf Notevbhhhhhhhhhhhhhhhs.pdfhezamzaki1
 
"ANATOMY AND PHYSIOLOGY OF THE SKIN".pdf
"ANATOMY AND PHYSIOLOGY OF THE SKIN".pdf"ANATOMY AND PHYSIOLOGY OF THE SKIN".pdf
"ANATOMY AND PHYSIOLOGY OF THE SKIN".pdfDolisha Warbi
 
Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborHealth Catalyst
 
Identifying Signs of Mental Health Presentation (1).pptx
Identifying Signs of Mental Health Presentation (1).pptxIdentifying Signs of Mental Health Presentation (1).pptx
Identifying Signs of Mental Health Presentation (1).pptxsandhulove46637
 
FINAL PROJECT IN EMPOWERMENT TECHNOLOGIES 11
FINAL PROJECT IN EMPOWERMENT TECHNOLOGIES  11FINAL PROJECT IN EMPOWERMENT TECHNOLOGIES  11
FINAL PROJECT IN EMPOWERMENT TECHNOLOGIES 11crzljavier
 
Understanding Warts and Moles: Differences, Types, and Common Locations
Understanding Warts and Moles: Differences, Types, and Common LocationsUnderstanding Warts and Moles: Differences, Types, and Common Locations
Understanding Warts and Moles: Differences, Types, and Common LocationsNeha Sharma
 
Health literacies in marginalised communities LILAC 24.pptx
Health literacies in marginalised communities LILAC 24.pptxHealth literacies in marginalised communities LILAC 24.pptx
Health literacies in marginalised communities LILAC 24.pptxPamela McKinney
 
ACCA Version of AI & Healthcare: An Overview for the Curious
ACCA Version of AI & Healthcare: An Overview for the CuriousACCA Version of AI & Healthcare: An Overview for the Curious
ACCA Version of AI & Healthcare: An Overview for the CuriousKR_Barker
 
Toothpaste for bleeding gums and sensitive teeth. Teeth whitening, Mouthwash....
Toothpaste for bleeding gums and sensitive teeth. Teeth whitening, Mouthwash....Toothpaste for bleeding gums and sensitive teeth. Teeth whitening, Mouthwash....
Toothpaste for bleeding gums and sensitive teeth. Teeth whitening, Mouthwash....sharyurangari111
 
person with disability and pwd act ppt.pptx
person with disability and pwd act ppt.pptxperson with disability and pwd act ppt.pptx
person with disability and pwd act ppt.pptxMUKESH PADMANABHAN
 
Eating Disorders in Athletes I Sports Psychology
Eating Disorders in Athletes I Sports PsychologyEating Disorders in Athletes I Sports Psychology
Eating Disorders in Athletes I Sports Psychologyshantisphysio
 
Assisted Living Care Residency - PapayaCare
Assisted Living Care Residency - PapayaCareAssisted Living Care Residency - PapayaCare
Assisted Living Care Residency - PapayaCareratilalthakkar704
 
ARTHRITIS.pptx Prepared by monika gopal Tutor
ARTHRITIS.pptx Prepared  by monika gopal TutorARTHRITIS.pptx Prepared  by monika gopal Tutor
ARTHRITIS.pptx Prepared by monika gopal TutorNehaKewat
 

Último (20)

CECT NECK NECK ANGIOGRAPHY CAROTID ANGIOGRAPHY
CECT NECK NECK ANGIOGRAPHY CAROTID ANGIOGRAPHYCECT NECK NECK ANGIOGRAPHY CAROTID ANGIOGRAPHY
CECT NECK NECK ANGIOGRAPHY CAROTID ANGIOGRAPHY
 
SCOPE OF CRITICAL CARE ORGANIZATION
SCOPE OF CRITICAL CARE ORGANIZATIONSCOPE OF CRITICAL CARE ORGANIZATION
SCOPE OF CRITICAL CARE ORGANIZATION
 
Diseases of the Respiratory System (J00-J99),.pptx
Diseases of the Respiratory System (J00-J99),.pptxDiseases of the Respiratory System (J00-J99),.pptx
Diseases of the Respiratory System (J00-J99),.pptx
 
Empathy Is a Stress Response - Choose Compassion instead
Empathy Is a Stress Response - Choose Compassion insteadEmpathy Is a Stress Response - Choose Compassion instead
Empathy Is a Stress Response - Choose Compassion instead
 
Anatomy Shelf Notevbhhhhhhhhhhhhhhhs.pdf
Anatomy Shelf Notevbhhhhhhhhhhhhhhhs.pdfAnatomy Shelf Notevbhhhhhhhhhhhhhhhs.pdf
Anatomy Shelf Notevbhhhhhhhhhhhhhhhs.pdf
 
"ANATOMY AND PHYSIOLOGY OF THE SKIN".pdf
"ANATOMY AND PHYSIOLOGY OF THE SKIN".pdf"ANATOMY AND PHYSIOLOGY OF THE SKIN".pdf
"ANATOMY AND PHYSIOLOGY OF THE SKIN".pdf
 
Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and Labor
 
Identifying Signs of Mental Health Presentation (1).pptx
Identifying Signs of Mental Health Presentation (1).pptxIdentifying Signs of Mental Health Presentation (1).pptx
Identifying Signs of Mental Health Presentation (1).pptx
 
FINAL PROJECT IN EMPOWERMENT TECHNOLOGIES 11
FINAL PROJECT IN EMPOWERMENT TECHNOLOGIES  11FINAL PROJECT IN EMPOWERMENT TECHNOLOGIES  11
FINAL PROJECT IN EMPOWERMENT TECHNOLOGIES 11
 
Understanding Warts and Moles: Differences, Types, and Common Locations
Understanding Warts and Moles: Differences, Types, and Common LocationsUnderstanding Warts and Moles: Differences, Types, and Common Locations
Understanding Warts and Moles: Differences, Types, and Common Locations
 
The Power of Active listening - Tool in effective communication.pdf
The Power of Active listening - Tool in effective communication.pdfThe Power of Active listening - Tool in effective communication.pdf
The Power of Active listening - Tool in effective communication.pdf
 
Health literacies in marginalised communities LILAC 24.pptx
Health literacies in marginalised communities LILAC 24.pptxHealth literacies in marginalised communities LILAC 24.pptx
Health literacies in marginalised communities LILAC 24.pptx
 
Painting Rats White Angers Them to No End
Painting Rats White Angers Them to No EndPainting Rats White Angers Them to No End
Painting Rats White Angers Them to No End
 
ACCA Version of AI & Healthcare: An Overview for the Curious
ACCA Version of AI & Healthcare: An Overview for the CuriousACCA Version of AI & Healthcare: An Overview for the Curious
ACCA Version of AI & Healthcare: An Overview for the Curious
 
Toothpaste for bleeding gums and sensitive teeth. Teeth whitening, Mouthwash....
Toothpaste for bleeding gums and sensitive teeth. Teeth whitening, Mouthwash....Toothpaste for bleeding gums and sensitive teeth. Teeth whitening, Mouthwash....
Toothpaste for bleeding gums and sensitive teeth. Teeth whitening, Mouthwash....
 
Annual Training
Annual TrainingAnnual Training
Annual Training
 
person with disability and pwd act ppt.pptx
person with disability and pwd act ppt.pptxperson with disability and pwd act ppt.pptx
person with disability and pwd act ppt.pptx
 
Eating Disorders in Athletes I Sports Psychology
Eating Disorders in Athletes I Sports PsychologyEating Disorders in Athletes I Sports Psychology
Eating Disorders in Athletes I Sports Psychology
 
Assisted Living Care Residency - PapayaCare
Assisted Living Care Residency - PapayaCareAssisted Living Care Residency - PapayaCare
Assisted Living Care Residency - PapayaCare
 
ARTHRITIS.pptx Prepared by monika gopal Tutor
ARTHRITIS.pptx Prepared  by monika gopal TutorARTHRITIS.pptx Prepared  by monika gopal Tutor
ARTHRITIS.pptx Prepared by monika gopal Tutor
 

Cybersecurity and Healthcare - HIMSS 2018 Survey

  • 1. Cybersecurity and Healthcare A Survey of Healthcare IT Professionals at HIMSS 2018 S U R V E Y Survey of 102 IT professionals taken at HIMSS 2018
  • 2. Healthcare data is extremely valuable on the dark web. As a result, attacks against healthcare organizations are on the rise.
  • 3. Do you worry about a cybersecurity event striking your organization? Not worried /not very concerned 7% Concerned 16% Very concerned 77%
  • 4. What type of cyberattack are you most concerned about? Ransomware 32% DDoS 13% Compromised applications 19% Insider threats 25% Other 11%
  • 5. How confident are you in your organization’s ability to handle a cyberattack? Needs work 9% Adequate 32% Above average 33% Very confident 19% Needs an overhaul 6%
  • 6. Does your organization have a senior information security leader such as a CISO? No 14% No, but looking to hire within next 12 months 14% Yes 73%
  • 7. Does your organization have a cybersecurity incident response plan? No 14% No, but on roadmap in next 12 months 12% Yes 75%
  • 8. Has your institution suffered from a cyberattack? No 44% Yes, more than a year ago 4% Yes, in the past year 38% I’m not sure 13% ?
  • 9. Has your institution ever paid a ransom or extortion fee? No 43% I’m not sure 48% Yes 9% ?
  • 10. Regarding internal threats from employee or contractor, what are you most worried about? Malicious users 24% Careless users 51% Compromised users 25%
  • 11. What makes detecting insider threats difficult? Lack of tools to monitor employee and other insiders’ activities 27% More employees, contractors, business partners have access to our network 24% More company assets on the network / cloud 24% Lack of staff to analyze permissions data on employee access 25%
  • 12. What is the most time-consuming task when it comes to investigating or responding to insider threats? 24% 32% 26% Tuning security tools Collecting information from diverse security tools Forensics or incident analysis 17% Managing too many security alerts
  • 13. Increasingly cyber incidents are rendering healthcare organizations unable to access patient data which has impacted overall patient care. For this reason, it is more crucial than ever that healthcare organizations take steps to protect their data and applications now. — Terry Ray, Imperva CTO ” “
  • 14. L E A R N M O R E To learn more about protecting data and preventing security breaches in healthcare, click the button below.
  • 15. Imperva is a leading cybersecurity company that delivers best-in-class solutions to protect data and applications – wherever they reside – on-premises, in the cloud, and across hybrid environments.