Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Episode 25–Tabletop Drills, Real‑World Outages. With Greg Surla

Автор: The Cyber Survivor Podcast

Загружено: 2026-01-21

Просмотров: 1

Описание:

A cyberattack on a vendor shouldn’t be the moment a hospital learns how interconnected its world really is. We sit down with Greg Surla, Chief Information Security Officer at FinThrive, to unpack how third‑party risk, revenue cycle platforms, and frontline care are woven together—and why resilience depends on planning with partners before the crisis hits. From joint tabletop exercises that include critical vendors to pre-approved workarounds like VDI access and hardened loaner devices, we map the moves that keep care running when networks go dark.

Greg shares blunt lessons from breaches and acquisitions: forgotten cloud servers, weak asset inventories, and the relentless toll of a three‑week ransomware fight. The takeaway isn’t fear; it’s preparation. We dig into ransomware‑specific drills, cyber insurance that funds expert responders, and the automation needed to triage the daily flood of vulnerabilities. We also explore culture as a control, showing how life‑first security education—holiday scams, tax fraud, device safety—builds habits that protect both home and hospital, and creates the groundswell that gets C‑suite support.

As AI supercharges attackers and budget pressures squeeze providers, cybersecurity has to be framed as a business enabler. Secure revenue cycle equals payroll, access to care, and community trust. Greg explains how to translate risk for boards, align controls to clinical and financial goals, and replace reflexive “no” with “yes, if” to stay part of the conversation that shapes strategy. The result is a practical, human playbook for healthcare security: automate the routine, practice the hard days with partners, invest in asset visibility, and collaborate across the industry. Subscribe, share with a colleague who handles vendor risk, and leave a review with your top resilience tactic—we’ll feature the best ideas in a future show.

Episode 25–Tabletop Drills, Real‑World Outages. With Greg Surla

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends

2025 Threat Intelligence Index: Dark Web, AI, & Ransomware Trends

Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED

Cybersecurity Expert Answers Hacking History Questions | Tech Support | WIRED

Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes

Cybersecurity Trends in 2026: Shadow AI, Quantum & Deepfakes

The Cycle of Cyber Threat Intelligence

The Cycle of Cyber Threat Intelligence

Открытие Варбурга: 4 переключателя, которые мешают раку расти | Здоровье с Доктором

Открытие Варбурга: 4 переключателя, которые мешают раку расти | Здоровье с Доктором

Что такое управление уязвимостями? (объяснение экспертов)

Что такое управление уязвимостями? (объяснение экспертов)

POA Town Hall 1.20.26

POA Town Hall 1.20.26

Удар по Темрюку, Трамп в Давосе, Адам идет на поправку. Галлямов, Касьянов, Филиппенко

Удар по Темрюку, Трамп в Давосе, Адам идет на поправку. Галлямов, Касьянов, Филиппенко

How to become a World Class CISO (Chief Information Security Officer) | Life of a CISO Episode 1

How to become a World Class CISO (Chief Information Security Officer) | Life of a CISO Episode 1

ЗАЧЕМ ТРАМПУ ГРЕНЛАНДИЯ? / Уроки истории @MINAEVLIVE

ЗАЧЕМ ТРАМПУ ГРЕНЛАНДИЯ? / Уроки истории @MINAEVLIVE

Understanding Threats, Risks, and Vulnerabilities for CC & Security+ Success

Understanding Threats, Risks, and Vulnerabilities for CC & Security+ Success

Изучите управление уязвимостями Qualys (домашняя лаборатория)

Изучите управление уязвимостями Qualys (домашняя лаборатория)

Trump’s next Greenland move will ‘blow the GOP to bits’ | Scott Lucas

Trump’s next Greenland move will ‘blow the GOP to bits’ | Scott Lucas

Nessus Vulnerability Scanner Tutorial (Cyber Security Tools)

Nessus Vulnerability Scanner Tutorial (Cyber Security Tools)

Episode 18- Bridging Talent Gaps: Educating the Next Cyber Warriors. With Dr. Bradley Fowler

Episode 18- Bridging Talent Gaps: Educating the Next Cyber Warriors. With Dr. Bradley Fowler

Эпизод 24 — Как безопасность медицинских устройств защищает качество медицинской помощи в больших...

Эпизод 24 — Как безопасность медицинских устройств защищает качество медицинской помощи в больших...

Cybersecurity Threat Hunting Explained

Cybersecurity Threat Hunting Explained

The Complete Cybersecurity Roadmap: Land a Cybersecurity Job in 10 Months

The Complete Cybersecurity Roadmap: Land a Cybersecurity Job in 10 Months

How Become an CISO Step By Step Process

How Become an CISO Step By Step Process

7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)

7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: infodtube@gmail.com