- Home
- Analytics
- Hackers Want Your Data: What You Must Do To Strengthen Cybersecurity Before and After an Imminent Attack
Hackers Want Your Data: What You Must Do To Strengthen Cybersecurity Before and After an Imminent Attack
Hackers Want Your Data: What You Must Do To Strengthen Cybersecurity Before and After an Imminent Attack
What you'll learn
Join QTS to learn three actions you can take to minimize risks and costs and recover more quickly when an attack happens. This panel discussion will focus on why hackers target healthcare organizations and three ways to strengthen your cybersecurity. Our experts will tell you how to proactively identify risks, transfer risks and effectively manage costs, and why you need to move your data to a trusted cloud provider.
During this webinar, you’ll learn:
- Why hackers love to target healthcare
- How to proactively identify and address risks
- Completing and taking action on a cybersecurity assessment
- Transfer risks and more effectively manage costs
- Why Cyber insurance coverage makes sense
- Moving your data and processing to a qualified and trusted cloud provider
- Healthcare has begun to embrace the cloud - what you should look for in a cloud provider
- Consider the cloud trusted by healthcare organizations - QTS Healthcare Community Cloud (HCC)
Andrew Wild
Chief Information Security Officer
QTS Datacenters
Bio info: Andrew has more than 25 years of experience in information security and network engineering. His areas of expertise...
Andrew has more than 25 years of experience in information security and network engineering. His areas of expertise include securing cloud and virtualized environments, secure implementation of cloud services (both SaaS and IaaS), network security, security policy and practices development, and compliance program management. Formerly with Lancope, Andrew managed all areas of their information security program, including risk management, IT security, and compliance of their internal enterprise as well as product security.
Prior to that, he was the CSO at Qualys, a leading provider of cloud security and compliance solutions.
Andrew received his Bachelor of Science degree in electrical engineering from the United States Military Academy at West Point, and his Master of Science degree in electrical engineering from George Washington University. He was a U.S. Army Signal Corps officer responsible for leading and supervising soldiers in the design, installation and operation of voice and data communications in support of U.S. Army tactical missions, and participated in operations Desert Shield and Desert Storm.
Michael Born
Vice President, Global Technology and Privacy Practice
Lockton Companies
Bio info: Michael provides expertise in the areas of data security, privacy liability, media, and specialty errors and...
Michael provides expertise in the areas of data security, privacy liability, media, and specialty errors and omissions insurance. He has more than 25 years of experience in the professional liability insurance industry. Michael is a member of Lockton’s Cyber and Technology Practice.
Michael is a frequent speaker and panelist regarding data security and privacy issues. He has presented on this topic for the Professional Liability Underwriter’s Society (PLUS), the Risk and Insurance Management Society (RIMS), the Public Risk and Insurance Management Association (PRIMA), the American Society of Association Executives (ASAE), the Claims and Litigation Management alliance (CLM), and many others. Michael has also been interviewed regarding cyber liability exposures in Business Insurance and Property Casualty 360 magazines.
Michael is licensed to practice law in Kansas, Missouri, Texas, and Illinois as well as several federal jurisdictions. He has been at Lockton since 2012.
Tim Burke
Details

Event Type : On Demand
Date : Oct 21, 2016 01:00 PM CT
Cost : Complimentary
Credits : CPHIMS, CAHIMS
Duration : 62 minutes
Speaker(s) : Andrew Wild, Michael Born, Tim Burke
Register