Cybersecurity Roadmap: Global Healthcare Security Architecture
Nick H. Yoo, Chief Security Architect, Global Healthcare IT
Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed global security architecture outlining foundational and differentiated controls for their most sensitive applications.
https://www.rsaconference.com/events/us17
Видео Cybersecurity Roadmap: Global Healthcare Security Architecture канала RSA Conference
Using NIST cybersecurity framework, one of the largest healthcare IT firms in the US developed global security architecture outlining foundational and differentiated controls for their most sensitive applications.
https://www.rsaconference.com/events/us17
Видео Cybersecurity Roadmap: Global Healthcare Security Architecture канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Virtual Session: NIST Cybersecurity Framework Explained](https://i.ytimg.com/vi/nFUyCrSnR68/default.jpg)
![Guide to Developing a Cybersecurity Strategy & Roadmap](https://i.ytimg.com/vi/TGPHB2wq-IQ/default.jpg)
![Security Modelling in ArchiMate](https://i.ytimg.com/vi/Bt1xRZQ5T58/default.jpg)
![A Cloud Security Architecture Workshop](https://i.ytimg.com/vi/4TxvqZFMaoA/default.jpg)
![Modern Cybersecurity Architecture](https://i.ytimg.com/vi/S7FZrrZKzXI/default.jpg)
![The Fallacy of the "Zero-Trust Network"](https://i.ytimg.com/vi/tFrbt9s4Fns/default.jpg)
![Kubernetes Security Best Practices - Ian Lewis, Google](https://i.ytimg.com/vi/wqsUfvRyYpw/default.jpg)
![Aviation Cybersecurity: Keeping the Wings On](https://i.ytimg.com/vi/5_yutTO6q1M/default.jpg)
![The Five Secrets of High-Performing CISOs](https://i.ytimg.com/vi/18FcTlIm7Tg/default.jpg)
![](https://i.ytimg.com/vi/qtoHcO-7MOg/default.jpg)
![Three Keys to CISO Success](https://i.ytimg.com/vi/N40pCn77fcE/default.jpg)
![Managing Cyber-risk: Unlocking the Mystery of the Boardroom](https://i.ytimg.com/vi/K9o67m3B_Ec/default.jpg)
![Security Operations 2018: What Is Working? What Is Not.](https://i.ytimg.com/vi/REHay69Q6SM/default.jpg)
![How to Make Sense of Cybersecurity Frameworks](https://i.ytimg.com/vi/dt2IqidgpS4/default.jpg)
![CYBER SECURITY - HOW TO INTERVIEW PERFECTLY (2021) | Cybersecurity Interview Questions and Strategy](https://i.ytimg.com/vi/5NqAs5dJmlM/default.jpg)
![Less Tech, More Talk: The Future of the CISO Role](https://i.ytimg.com/vi/PJ9_U83wzXo/default.jpg)
![Top Five Emerging Cybersecurity Challenges | Srini Sampalli | TEDxDalhousieU](https://i.ytimg.com/vi/ylxd_UwgvJU/default.jpg)
![Cyber Security Full Course for Beginner](https://i.ytimg.com/vi/U_P23SqJaDc/default.jpg)
![How to Plan for and Implement a Cybersecurity Strategy](https://i.ytimg.com/vi/u-EQHbqWY60/default.jpg)
![What I do as a Cloud Security Engineer](https://i.ytimg.com/vi/8fBEQCgFPMU/default.jpg)