Filter By Topic
Ransomware in Healthcare: The Game Has Changed!
Ransomware attacks are on track to double this year – impacting operations and patient safety. But the nature of these attacks has changed, taking out select parts of a hospital to show they can. The key to stopping such attacks starts with finding devices that are vulnerable to these exploits and taking necessary action to remediate. Join this webcast where Salwa Rafee, Vice President, Global Development at H-ISAC and Armis experts Curtis Simpson, CISO and Chris Dobrec, VP of Product Marketing, will discuss how to find and stop ransomware exploits in healthcare environments just like yours.
Section 889 Ban: What You Need to Know
Do you fully understand the Section 889 ban on use of equipment or services from certain Chinese technology companies? Join us November 17th at 10am EST/1pm PST for a webinar featuring Nick Sinai, Former U.S. Deputy CTO, White House, and Chris Dobrec, VP of Product Marketing for Armis, as they show you how they can meet the new requirements. CPE credit eligible webinar.
URGENT11 and CDPwn – One Year Later: Unpatched, Unprepared, Unprotected
Over the course of the last year plus, there have been several high-profile vulnerabilities disclosed including URGENT/11, CDPwn and Ripple20 impacting hundreds of millions of connected devices – IT, OT, medical and IoT. These threats are real. The NSA included CDPwn as one of the Top 25 vulnerabilities being targeted by China. And the NSA & CISA jointly issued an alert about threats to OT in July. These vulnerable devices exist within mission critical operational technology systems and enterprise infrastructures. The devices themselves are being used as entry points by bad actors to gain access to the network and move laterally to mission critical environments where they can take over the devices and demand ransom. Join Ben Seri VP of Research and Chris Dobrec, VP, Product Marketing at Armis, as they share new information and levels of exposure, demonstrate how these devices can be exploited, and how you can mitigate risk for your organization.
ARMIS+SPLUNK: Close the OT Device Visibility & Security Gap
The security needs of Industrial Control Systems (ICS) and Operational Technology (OT) environments are changing. These devices are critical to production, manufacturing, power, and utilities, but they have no inherent security, and, increasingly, they are getting connected to enterprise networks. That creates a perfect storm for cyberattacks: OT devices that traditional security products can’t see or protect and vulnerable IT devices that bad actors can use to compromise manufacturing processes. Join Armis and Splunk to learn more about how our integration helps you extend your investment value in Splunk to unmanaged OT assets, analyze device behavior for risks, threats, and attacks and improve the efficiency of threat detection and incident investigation.