George Vukotich
University of Illinois Chicago (USA)
Cybersecurity and Healthcare: Taking a Zero-Trust Approach
In this session, we get an overview of cybersecurity hacks and how perimeter defense alone is no longer enough. Chances are bugs are already in your systems in many areas and are just waiting to be triggered. Taking a Zero-Trust approach is defined as a security framework requiring that all users, within and outside the organization's network be authenticated, authorized, and continuously validated for security configuration and posture before they are granted or retain access to applications and data. We'll look at the Seven Pillars of Zero Trust and what needs to be considered in protecting each of these areas. We will also look at things from a safety view and provide insights into how tools such as multi-factor authentication and permissions on user and data access can help catch and limit unauthorized access, along with how Security Information and Event Management help detect, analyze, and respond to security threats before they harm business operations.