Stop them: Combating identity attacks on your health system
Protecting health systems from cyberattacks is a 24/7 responsibility. CrowdStrike OverWatch reveals 75% of detections are malware-free, using stolen credentials to bypass unmanaged endpoints. Adversaries are often "logging in," not "breaking in."
Watch this on-demand session with CrowdStrike healthcare strategists Todd Felker and Wael Younan as they discuss preventing identity-related attacks and leveraging cross-domain visibility to detect lateral movement, uncover attack paths, and identify malicious activity.
Key takeaways:
- Adversaries’ use of identity attacks in healthcare
- RMM tools, social engineering, and Access Brokers
- Solutions to detect and prevent sophisticated access methods