In this eye-opening presentation, we raise the alert of Qilin, a sophisticated Ransomware as a Service operator specifically targeting the U.S. healthcare sector. Discover how threat actors evade EDR detection, exploit MFA vulnerabilities, and execute devastating attacks on medical institutions. Through a detailed walkthrough of real-world scenarios, learn about the offensive tactics employed by threat actors and gain crucial insights into defending against these attacks. Our experts offer an in-depth analysis of the attack methodology as well as valuable industry perspective, including potential solutions including CyberArk Endpoint Privilege Manager. This session is essential for IT professionals in healthcare seeking to bolster their cybersecurity defenses against evolving ransomware threats.
Recommended for You
From the moment ChatGPT was released to the public, offensive actors started looking to use this new wealth of knowledge to further nefarious activities. Many of the controls we have become...
Ransomware attacks have a profound impact on healthcare organizations, extending well beyond financial losses and the disrupted sleep of staff and shareholders. A University of Minnesota School of...
How to create a DevSecOps strategy and program that ensures the production of more secure software.
AI and Deep Fake Technology v. The Human Element The idea that people are the weakest link has been a constant topic of discussion in cybersecurity conversations for years, and this may have been...
On July 19, 2024, organizations around the world began to experience the “blue screen of death” in what would soon be considered one of the largest IT outages in history. Early rumors of a mass...
Each July, my family and I take a road trip from Kentucky back to my hometown in northwestern Pennsylvania to spend time on Lake Erie. As tradition dictates, we stop along I-71 for coffee at...
The CyberArk 2024 Identity Security Threat Landscape Infographic for Education, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
The CyberArk 2024 Identity Security Threat Landscape Infographic for Manufacturing, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
The CyberArk 2024 Identity Security Threat Landscape Infographic for Public Sector, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
The CyberArk 2024 Identity Security Threat Landscape Infographic for Healthcare, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
The CyberArk 2024 Identity Security Threat Landscape Infographic for Technology, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-party
The CyberArk 2024 Identity Security Threat Landscape Infographic for Financial Services, based on a survey of 2,400 security decision-makers, examines GenAI, machine identities, and third- and fourth-
Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the...
View this webinar to understand how CyberArk helps mid-market organizations effectively enforce least privilege with automation to ensure success even with limited resources and giving customers quick
A few weeks ago, my wife asked me why stopping threat actors from impacting our lives is so difficult. In this digital age, the necessity to connect online brings inherent exposure to...
As a CIO, I often wish for a world where the threat landscape is less expansive and complicated than it is today. Unfortunately, the reality is quite different. This month, I find myself...
Watch this video interview with Amit Chhikara, principal in Deloitte Advisory's cyber risk and privileged access management practices, and Clay Rogers, vice president, global strategic alliances
Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality...
CyberArk 2024 Identity Security Threat Landscape EMEA Report provides detailed insights on identity-related cybersecurity threats and technology trends.
We explain how to correlate dynamic and adaptive controls with the levels of risk an identity poses to your organization’s critical systems and data.