Professional Documents
Culture Documents
5 real-life examples
that show why
cybersecurity is pivotal
1
BEST
CYBER
SECURITY
Companies in
HEALTHCARE
For 2021 JULY
ISSUE
00
#Self_Secure
5 Things you shouldn’t do
with your password
Rob Rhodes
Executive Vice President
C O N T E N T S
Cyble
Empowering Healthcare Service
Providers with State-of-the-Art
Cybersecurity
32 20
The Right Care
The Importance of
Independence Among Disabled
People, Particularly During
A Global Pandemic
SafeBreach Articles
Maximize Security Control Effectiveness.
Reduce the Attack Surface
16
Watch and Learn
24 5 real-life examples
that show why
cybersecurity is pivotal
28
08
sales@insightscare.com
July, 2021
Corporate Offices:
Insights Success Media Tech LLC Insights Success Media and Technology Pvt. Ltd.
555 Metro Place North, Suite 100, Office No. 22, Rainbow Plaza, Shivar Chowk,
Dublin, OH 43017, United States Pimple Saudagar, Pune, Maharashtra 411017
Phone - 302-319-9947 Phone - India: 7410033802, 74100058552
Email: info@insightscare.com Email: info@insightscare.com
For Subscription: www.insightscare.com For Subscription: www.insightscare.com
Copyright © 2021 Insights Success Media and Technology Pvt. Ltd., All rights reserved. The content and images used in this magazine should not be reproduced or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights success.
Reprint rights remain solely with Insights Success Media and Technology Pvt. Ltd. Insights Care is powered by Insights Success Media and Technology Pvt. Ltd.
Company Name Featuring Description
DataArt Eugene Goland DataArt is a global software engineering firm that takes a
dataart.com President and CEO uniquely human approach to solving problems.
HUB Security
hubsecurity.io DISCRIPTIONN
Eyal Moshe
Co-founder and CEO FORM
HUB Security is a Confidential computing, cyber security
platform for critical infrastructure, AI and financial services.
improve the “Over the past 30 years, we have What aspects make iatricSystems
delivery of care supported more than 1,300 hospitals stand out from the competition?
and provided solutions to the
through Hospital and Healthcare Market that The best way to improve the delivery
technology is to protect the privacy and security of of care through technology is to have
patient data and healthcare systems,” a team that has walked in their shoes.
have a team that says Rob Rhodes, the Executive Our solutions are built by combining
has walked in their Vice President for iatricSystems. the skills of our clinicians, nurses,
lab techs, other subject-matter
shoes. In the following interview, Rob experts, and the skills of our IT &
shares his insights on the current Information Security and Privacy
landscape of the healthcare experts.
What is your opinion on the cybersecurity—post the pandemic?
impact of the current pandemic on And how are you strategizing your Via our managed
the global healthcare sector, and company’s operations for that
how has your company fared future?
privacy services, AI-
during the pandemic? driven technology,
The pandemic continues to virtual assistants,
The pandemic put a lot of stress on underscore the need for good
the global healthcare market and has cybersecurity. Cybercriminals don’t
and relationships
required overworked healthcare take days off, and we’ve all seen the with top-notch
heroes to continue to have to do more headlines of numerous healthcare cybersecurity
with less. Despite decreasing hospital system breaches from hackers taking
margins, we’ve seen that advantage of the pandemic.
partners, we can
organizations are still committed to Organizations had to act quickly to help even the
providing the highest quality, safest, provide remote working smallest
and most secure healthcare possible. opportunities, and the pandemic has
increased opportunities for curious
organizations fight
Our company has managed the individuals to snoop on medical the bad guys.
pandemic well, as we have continued records in-house.
to do our best to support the mission
of our customers. In response to new challenges, the
healthcare technology space is should be to help clients manage
In your opinion, what could be the continuously evolving. With more threats in a way that overcomes their
future of the healthcare technology breaches happening every day, unique challenges. Hospitals have
services sector—specifically privacy and security teams need all limited budgets for staff and
the help they can get. We’ve technology, but they still need the
seen—and have made—great highest levels of security.
progress in the Artificial Intelligence
space and have already begun to How do you envision scaling
Your goal include AI in our core products to
uncover breaches before they
iatricSystems’ operations in 2021?
C
an you imagine a world without internet today? It’s
About the leader
difficult to separate information technology from
our lives. From ordering groceries online and
Beenu Arora is a Senior Technology Strategist, cybersecurity leader
opting for digital banking services to working from home
having completed his MBA from London Business School and
and looking after our health through health apps, every
Columbia Business School. He has over 15 years of extensive
aspect of our lives is impacted by the technology.
international and cross-functional experience in technology, cyber-
security, risk consulting and transformation programs in nancial
Undoubtedly technology has made our lives simpler.
and energy, utilities and mining sectors across IT and
However, it has also brought a myriad of disadvantages
OT/ICS/SCADA.
with it. As the whole world pivoted to an everything-digital
approach during the initial phase of the COVID-19
He has advised multiple FORTUNE® 50 and FORTUNE® 100
pandemic, it also presented hackers with more opportunities
organizations on engagements ranging from cybersecurity strategy
to introduce sophisticated malwares and phishing attacks.
development to program execution and operations. Beenu is also a
member of the Forbes Technology Council with 15+ years of
In such conditions, businesses choose prevention against
international cybersecurity experience prior to Cyble.
cyberattacks by availing mitigation services from cyber
intelligence companies. Established in 2019, Cyble is one
such cyber intelligence company that has been empowering
businesses with their mitigation services and cybercrime
monitoring.
Backed by Y Combinator as a part of its 2021 winter
cohort, Cyble has been recognized by Forbes as one of the
top 20 Best Cybersecurity Startups to Watch in 2020. More
recently, Cyble secured a spot as a Silver Winner at the
Cybersecurity Excellence Awards 2021 for its Threat
“
Detection, Intelligence, and Response – North America.
Beenu Arora
Cyble Founder, CEO, and Member
of Forbes Technology Council
Founded in 2019, Cyble is an Atlanta-based, AI-powered, Manish Chachada, Co-founder, and COO of Cyble, is a seasoned
and Y Combinator-backed cyber intelligence company that professional with over 15+ years of International Corporate
empowers businesses with darkweb and cybercrime Finance and Business Management experience. His experience
monitoring and mitigation services. Cyble's ultimate spans across business and nancial management, operations
objective is to provide organizations with real-time management, auditing and assurance, merger and acquisitions
visibility into their threat landscape. (M&A), international tax strategy, and capital raising. A Chartered
Accountant from the Institute of Chartered Accountants of India
Cyble has an extensive team of qualified industry experts, and an MBA from Columbia and London Business School, Manish
security researchers, and cyber security specialists. At takes a keen interest in business and technology.
Cyble, we are continually striving towards expanding our
visibility over the darkweb and updating our technology to Currently, he co-chairs the special interest technology group for
match the ever-increasing sophistication of cyberattacks.. Financial Executive Network Group (FENG), one of the largest
global networks for nance professionals. In February 2021,
Tell us more about your products and services which Manish became a part of the prestigious Forbes Business Council,
make your company stand out from the competition? an invitation-only community for world-class C-suite and business
executives.
Cyble Vision is our proprietary SaaS product that indexes
internet-wide data from the deep, dark, and surface web.
13|July 2021|www.insightscare.com
Comprising over 140B+ darkweb records, 15B+ open- records, we expect the healthcare sector to be met with an
source intelligence (OSINT) records, and 50B+ threat increased array of cybercrime in the future. As the
indicators, our extensive datasets help us analyze close to a healthcare industry adopts advanced technologies for
billion pages every day, hunting for key cyber security improved patient treatment, cybercriminals and cyber threat
events with our proprietary risk models. Cyble stands out actors can be expected to exploit the vulnerabilities that
from the competition on account of the scale, depth, may accompany these changes.
diversity, and accuracy of its constantly expanding
database. As an established leader, what would be your advice to
the budding entrepreneurs and enthusiasts aspiring to
What is your opinion on the impact of the current venture into the cyber security industry?
pandemic on the global cyber security space, and what
challenges did you face during the initial phase of the For any business, old or new, it is important to set stringent
pandemic? security protocols. As a budding entrepreneur and
cybersecurity enthusiast, its crucial to stay abreast of the
The pandemic has placed the health sector at the receiving changing threat landscape and the evolution of the
end of novel cybersecurity challenges arising from cybersecurity industry. Having data safety systems in place
cyberthreats with COVD-19 as the threat vector. As the and conducting routine security audits are a must. Another
world continues to battle the current coronavirus crisis, critical aspect is to train employees on spotting potential
cybercriminals are taking advantage of the panic to launch security problems.
sophisticated scams and phishing attacks on enterprises,
individual computing systems, and healthcare and research How do you envision on scaling your company’s
institutions. We expect cybersecurity challenges to evolve operations and offerings in 2021?
over the months to come.
Being a growing company, Cyble is actively expanding its
During the challenging time, as organizations grappled with global team in lockstep with the needs of our increasing
unprecedented changes and adjusted to measures such as client base. This helps us understand our clients' needs
work-from-home, Cyble was not left unaffected. The safety better and provide them with timely and actionable
of our employees was of paramount importance to us. intelligence.
Employee health and well-being continues to be of utmost
importance to us. With our workforce scattered across the In addition, with cybercrime showing no signs of slowing
world, our efforts continue to be directed at supporting our down in 2021, our efforts are continuously directed at
workforce and helping them navigate through the crisis. implementing innovative techniques and technologies to
further expand our visibility across the Darkweb. A
With continuous development in technologies such as AI significant aspect of scaling our capabilities also involves
and big data, what is your prediction about the future of boosting our artificial intelligence and human intelligence
the cyber security space pertaining to the healthcare to higher levels.
services?
5 EXAMPLES
THAT SHOW
WHY
CYBERSECURITY
IS PIVOTAL
of people at a time. Data breaches can their own use and did not sell it on the However, the data was posted two
often be lethal enough to change the black market, they were both sentenced years later on the internet for free,
whole course of your life. to three years of prison time. projecting new and real criminal intent
surrounding the data. Keeping in mind
Huge complications can be LinkedIn – One of the latest large- the sheer number of phone numbers
experienced by businesses, individuals, scale security breaches happened in affected and easily available on the
or even governments from having June 2021 when professional dark web, security researcher Troy
sensitive information compromised. networking giant LinkedIn saw data of Hunt added functionality to his
Hackers have ways to get you through almost 700 million of its users posted HaveIBeenPwned (HIBP) breached
emails, text messages, Bluetooth, or on a dark web forum. This number was credential checking site that would let
any other online or offline service that estimated to be 90% of its total users. users check if their phone numbers had
you use. been exposed in the breached data.
A hacker going by the alias of ‘God
Without adequate attention to detail, User’ used data scraping techniques by All these examples make a solid case
even a minor vulnerability can cause exploiting the site’s API. He first for why having potent cyber security is
you a huge data breach. Following are dumped a set of 500 million user so important. It is crucial for users at
five of the biggest data breaches that information data of LinkedIn all levels to prevent data security
occurred in recent times, causing customers. LinkedIn argued that no breaches to keep their personal and
sensitive information to leak from sensitive or personal data was exposed. confidential information safe from
some of the biggest internet platforms. However, God User posted a data being compromised.
sample that included information like
Yahoo – One of the biggest security email address, phone number, Some of the practices that help with
breaches that the modern world has geolocation record, gender, and other better security of sensitive information,
seen in recent years is Yahoo. The social media details. which everyone should follow, include
incident which took place in 2013 patching and upgrading software,
ended up costing 3 billion hacked Sina Weibo – In March of 2020, Sina enforcing strong credentials and multi-
accounts. Weibo, one of China’s largest social factor authentication, upgrading
media platforms, was hacked, devices, and generally being educated
Yahoo revealed this massive security compromising data of over 538 million about the security practices that
breach initially in 2016, saying it of its users. Personal details like real prohibit your data from getting stolen.
affected 1 billion accounts. It was later names, site usernames, gender,
exposed that the security breach location, and phone numbers were - Trishika R.
affected almost all of Yahoo user stolen from the website. Reports said
accounts. This particular security that the attacker then sold the data on
breach resulted in Yahoo losing the dark web for $250 only. China’s
millions of users. Yahoo was in an Ministry of Industry and Information
acquisition deal with Verizon during Technology (MIIT) asked Sina Weibo
this time, which was later settled at a to improve its data security measures
lesser price. to protect its users’ private information
and inform them when incidents like
Alibaba – In November 2019, data data security breaches happen.
was stolen from the database of
Alibaba, a Chinese shopping website. Facebook – Another big data security
Almost 1.1 billion counts of user data breach happened in April 2019 when
were stolen from the website over eight two datasets from Facebook apps were
months. This was done by a developer revealed to the public internet. Data of
The
Importance of INDEPENDENCE AMONG
DISABLED PEOPLE, Particularly During a
GLOBAL PANDEMIC - By Angie Conley, Founder and CEO, Abilitech™ Medical
Abilitech™ Assist Benefits Over the past few years, the team at Abilitech Medical has
conducted extensive research and worked one-on-one with
The Abilitech Assist is a powered orthotic device that disabled people and their care teams. This has given us
provides functional assistance with activities of daily living important insights into the social challenges created by
(ADLs) for many people who live with arm weakness isolation. We have woven these findings into the
caused by long-term conditions such as Muscular
One of the benefits that COVID brought was the increased Today, as social distancing guidelines lessen, the Assist can
use of telehealth. It makes sense for so many applications enable a person to hug a loved one – in person. Before the
and we believe it will reduce costs of care and increase Assist was available, hugging, handwashing, and fist-
access to healthcare. Telehealth has been lifesaving for bumping were not possible for many disabled people.
many people during the pandemic, and now those with
limited use of their arms can also have access to virtual While adequate research on the specific impact of COVID-
care, which helps close the healthcare equity gap for the 19 on the disability community is not yet available, several
disabled population. studies are underway or in the planning phase. At Abilitech
Medical, we look forward to continuing to study the impact
Abilitech Medical was quick to pivot at the early onset of our products have on the health and wellness of the disabled
COVID and developed a telehealth assessment program to population. Currently, we have a clinical study underway
meet the needs of our clients. Our assessments helped to with Muscular Dystrophy patients at the University of
determine if the person would be a good candidate for the Minnesota and Gillette Children’s Specialty Healthcare in
Assist, answer questions, gather information, and connect St. Paul, Minn.
with a patient’s care team.
We feel privileged to play a part in solving the enormous
Easing Disruptions in Social Connections and Care challenges brought on by COVID for those already
challenged by disabilities. We have witnessed a true
Research on the psychological impact of mass trauma (e.g., resilience in so many whom, in the face of adversity,
natural disasters, illness outbreaks) suggests that the demonstrate determination and hope for a better future that
pandemic might particularly harm the mental health of includes new technology to restore independence, which
marginalized populations who have less access to will have mental, physical, and social benefits.
socioeconomic resources and supportive social networks.
COVID gave many of us insight into what it feels like when
Social isolation and loneliness have also been associated a typical day is disrupted by severe limitations…just what
with increases in heart disease, dementia, and other health the disabled population lives with even without the
problems, according to the Na onal Academies of Science, presence of a pandemic. COVID opened our minds and our
Engineering, and Medicine. hearts even further to keep innovating solutions
www.insightscare.com
“
IoT device networks are increasingly commonplace. Given
this risk landscape, sophisticated threat intelligence and
advanced threat detection – powered by the latest in AI and
ISA Cybersecurity
machine learning – will become even more critical tools for
the healthcare sector.
has been recognized Threat actors are becoming increasingly sophisticated and
persistent in their attacks, so healthcare needs to be more
Password Protection:
things you
5 shouldn’t
do with your
Passwords I n the internet age, almost all of our
essential tasks are conducted
online – whether work-related or
something personal. We create
accounts on the internet for different
sites and are asked to create strong
passwords everywhere. But what is the
purpose of a password, let alone a
strong one?
Guy Bejerano is co-founder and CEO of Itzik Kotler is CTO and Co-Founder of
SafeBreach, a pioneer in the emerging SafeBreach. Itzik has more than a decade of
category of continuous security validation. experience researching and working in the
Before SafeBreach, Guy was CSO of computer security space. He is a recognized
LivePerson, leading the security of one of the industry speaker, having spoken at DEFCON,
world's largest cloud platforms and providing Black Hat USA, Hack In The Box, RSA Europe,
security for more than 1 billion web visits CCC, and H2HC. Before founding SafeBreach,
across the internet each month. Guy has Itzik served as CTO at Security Art, an
more than 24 years of deep domain expertise information security consulting firm, and
in operational, application, and network before that he was SOC Team Leader at
security, specializing in building security Radware (NASDQ: RDWR).
programs for global companies and cloud
services, including the Information Security
branch and red-team operations of the Israeli
Air Force.
Following are the most impactful capabilities that enable CISOs and SafeBreach Platform
differentiators of the SafeBreach security teams to be more strategic Customer Success Account Managers
platform in addressing customer every day, while pushing a transition to as a single point of contact
needs. more offensive security, versus SafeBreach Customer Success
Fulfills Operational Needs defensive and reactive. Managers team consists of Customer
Ÿ SafeBreach generates insights Ÿ Optimizing risk and value in a Success Account Managers (CSAM)
automatically to ensure business context. who focus on business outcome and
remediation, at scale, of the highest Ÿ Help the CISO to quantify risk. relationship management of customers
priority gaps. The platform Ÿ Support priority and investment and Technical Customer Success
correlates data-driven results from decisions in a business context. Managers (TCSM) who focus on
testing security controls against Ÿ Identify risk to revenue with the delivering technical deliverables for
numerous attack scenarios to security posture of revenue- each use case along with technical
automatically identify the highest generating business units. support. Each customer is assigned a
priority security gaps, so that teams Ÿ Communicate to the board with CSAM and TCSM with CSAM being a
can focus on the most impactful clear KPIs to show security single point of interface.
remediation efforts. program effectiveness in
systematically reducing risk. SafeBreach Customer Success Account
Ÿ Integration with SOAR platforms Ÿ Determine and justify spend on Managers (CSAM) along with
for automated remediation of security tools, based on outcome- Technical Customer Success Manager
security gaps. Tight integration driven metrics. (TCSM) assigned for each customer
with Cortex XSOAR now fully perform key functions for each
automates fast-changing IOCs such SafeBreach Labs - and 24-hour SLA customer such as use case workshops,
as hashes, IPs, and domains that on new US CERT alerts deployment of the SafeBreach platform
have been proven to breach Our research teams are dedicated to in the Customer Environment,
enterprise companies. Ensures maintaining the SafeBreach platform at Technical Support, and Proactive
security controls are updated maximum potential. They achieve this Customer Success Management with
quickly and effectively while by arming the platform with the business review and ROI assessments
orchestrating the behavioral industry leading SafeBreach Hacker’s with a single point of contact for all
indicators so your security team is Playbook of attack methods, which our post-sales needs of the customers.
aligned to defend the business. researchers work constantly to expand
and strengthen. Deployment/Professional Services
Ÿ Prioritization of vulnerability After a formal post-sale kick-off
patching based on the likelihood of SafeBreach Labs externally monitors meeting, assigned Customer Success
exploitability, impact on critical the hacker underground, sources Account Managers and Technical
assets, and external access. intelligence feeds, and collaborates Customer Success Managers for each
with external security research teams. customer account follow a structured
Ÿ Scale and maturity. We are dedicated to providing the process and engagement model to
latest attack methods to our customers work with the customer’s security
Progress from Operational to and we uphold a 24-hour SLA on teams, SOC, and CISO office bearers
Strategic adding attacks identified from US Cert to explore and review all use cases of
Ÿ 24-hour SLA for emerging threats Alerts. the customers, scope the deployment of
to deliver organizational security the SafeBreach Platform, provide
posture for imminent threats. SafeBreach Labs researchers also technical consulting, project
Ÿ Prioritization of security gaps in the continuously identify new attack management to roll out in multiple
context of the threats they methods before hackers discover them phases, provide training for all
represent. as a part of our research and customer team members and help
Ÿ Security posture assessment based development effort to simulate the customers operationalize the
on the MITRE ATT&CK hacker. This research is shared with the SafeBreach Platform.
framework to allow for a uniform security community at leading
and contextualized security conferences such as Black Hat, RSA, 24/7 Technical Support
program management around and DEFCON. SafeBreach Labs also The Customer Success Team
MITRE ATT&CK including the contributes techniques to the MITRE (Technical Customer Success
new MITRE v9 techniques. ATT&CK framework. Managers) is also responsible for
technical support of customers 24x7
Strategic Customer Success Team Designed to helping customers get their support
SafeBreach provides unique Help Customers Operationalize the issues addressed in a timely and
Complementing the assigned Technical Customer Success SafeBreach and its team have been able to win recognition
Managers, customers also are assigned a personalized and awards, including from industry-shaping entities like
support engineer who has full knowledge of the customer
Forbes, Frost & Sullivan, Gartner, CNBC, Dark Reading,
environment. This significantly speeds up resolution of
issues and dispenses with the friction and time delay of and CRN, among others.
triaging support calls. Ÿ Frost Radar 2021: Global Leader in Breach and
Continuous Product Engagement Attack Simulation Market
Our Customer Success Team acts as a bridge between Ÿ Frost & Sullivan: 2021 Company of the Year in
customers and the SafeBreach product management team to Breach and Attack Simulation
conduct various product beta programs helping early Ÿ Globee Global Excellence -- Cyber Security - for BAS
vetting and adoption of new features. Each CS team 2021
member relays key product feedback from their customers
Ÿ Forbes, 2020 - The 20 Best Cybersecurity Startups
to the product team as they come, documenting each of the
requests and tracking them until the feedback is addressed To Watch In 2020.
or new features are shipped to respective customers. The Ÿ Calcalist - 2020 The 50 Most Promising
CS Team also facilitates periodic roadmap sessions, and Cybersecurity Startups in Israel
walks customers through new features. Ÿ Hot 150 Cyber Security Companies 2020
Ÿ TAG Cyber - Distinguished Vendor 2020 (50 chosen
What is your opinion on the impact of the current
from 1700)
pandemic on the global cybersecurity space, and what
challenges did you face during the initial phase of the Ÿ CRN - 2019 Emerging Vendors to Know in 2019
pandemic? Ÿ CRN - Top Cybersecurity Startups
Companies needed to do more with less to protect against Ÿ CNBC Upstart 100 – 2018
the existing and new types of threats. Attackers were Ÿ Gartner Cool Vendor 2017
exploiting the pandemic targeting the healthcare industry Ÿ Dark Readings' Best of Blackhat Awards 2016
and the COVID-19 vaccine supply chain.
Finalist
SafeBreach experienced a significant widening in demand Ÿ RSA Sandbox Finalist 2016
for its platform from financial services to healthcare, Ÿ Network World Hot Security Companies to Watch in
manufacturing, technology, utilities, transportation, 2016
government, retail, and other industries. Ÿ SINET 2016 Innovator
Ÿ CRN Tech Innovators 2016
Using SafeBreach, security professionals can validate and
maximize the effectiveness of the controls they already
have. With SafeBreach they prioritize which security gaps
need to be fixed first. The sequence of remediation is based
on the greatest impact to the business. Security As an established leader, what would be your advice to
professionals using SafeBreach can guide their the budding entrepreneurs and enthusiasts aspiring to
organizations on where to prioritize new investments to venture into the cybersecurity industry?
lower cyber risk overall. Dream big, don't be afraid to take on a big problem, of
which there are many in the cybersecurity industry, and
With continuous development in technologies such as AI commit yourself to solving it.
and big data, what is your prediction about the future of
the cybersecurity space pertaining to healthcare How do you envision scaling your company's operations
services? and offerings in 2021?
AI and big data are valuable technologies that are becoming In 2021, we have accelerated product development, and
pervasive, and they will change healthcare as well as other expanded channel partnerships in North American and
domain problems. Having said that, they are not immune to around the world. We will continue to expand our presence
security attacks whether it's on the infrastructure or the in EMEA and APAC markets this year and next.
actual implementation and that's something to keep in mind.