Health-ISAC

2023 Fall Americas Summit

San Antonio, TX | November 27 – December 1, 2023

Meet with Us

at the Health ISAC 2023 Fall Americas Summit

Healthcare organizations must be able to operate efficiently and effectively while ensuring the protection of ePHI, adhering to HIPAA Security and Privacy rules, and securing not only the IT environment, but medical devices as well.

Faced with this reality, it’s essential to adopt a proactive and multi-layered cybersecurity strategy that ensures compliance, continuous testing and security controls validation and preparedness. GuidePoint Security is here to help.

We’ll be at the Health-ISAC, Fall Americas Summit, at the JW Marriott San Antonio Hill Country Resort & Spa in San Antonio, TX, November 27 – December 1, 2023. Stop by our Booth #12 to meet with our team of security practitioners who have a wealth of expertise helping healthcare systems of all sizes navigate the complex threat and cybersecurity solution landscape and make better decisions that minimize risk.

We can help you:

  • Navigate compliance challenges related to the HIPAA Security and Privacy Rule, HITRUST, PCI DSS, NIST CSF, and the FDA’s recent requirement for ensuring cybersecurity of devices
  • Assess your Cloud, Identity and IoT environments, identify vulnerabilities, and validate the effectiveness of security controls
  • Ensure preparedness from ransomware and other cyber attacks with Incident Response [IR] and threat actor communications retainers, IR playbooks and runbooks, tabletop exercises, and more

And if you’d like to book a consultation with one of our experienced security practitioners at the show, please complete the form and we’ll get back with you promptly.

Book a Consultation

Resource Hub

Our resource hub is designed to support your healthcare business objectives with valuable insights and practical tips on identifying vulnerabilities, meeting compliance requirements, strengthening your overall security posture and more.

GRIT Ransomware Report-2023-Q3

According to the GuidePoint Research and Intelligence Team (GRIT), the ransomware ecosystem is on pace to nearly double its number of publicly posted victims year over year. Download GRIT’s Q3 ‘23 Ransomware Report to help you stay informed, adapt your security strategies and enhance your organization’s overall security posture.

[DATASHEET] Threat Actor Communications Retainer

In addition to Ransomware Investigation and Response services, our team of certified experts can communicate on your behalf with threat actors that have stolen and encrypted your sensitive information. Our team will provide a rapid, risk-informed negotiation strategy to ensure the best possible outcome for your organization.

[eBOOK] Facing Ransomware Head On

Of course you remember the iconic phone call scene in Taken. Liam Neeson’s character has been told that his daughter is being held for ransom. Does he panic? No. Instead, he stays calm, and applies his very specific expertise and skill set. Find out more in this quick read that just might give you a little coolness you’ll need if faced with a cyberattack.

[ON DEMAND TALK] Ransomware Negotiation Stories: Behind the Screens

Tune in to this month’s Brick House roundtable discussion led by Gary Brickhouse, CISO at GuidePoint Security to gain exclusive insights from our Threat Actor Communications team as they provide real-world experiences navigating these high-pressure scenarios.

[DATASHEET] Identity and Access Management Advisory Services

IAM is essential for secure business operations, enhancing agility, reducing costs via automation, improving user experience, and boosting security. Our professional services ensure a valuable ROI with an attribute-based approach.

[BLOG] Leveraging Strategic Communications for Ransomware Response

Read our blog to understand how a threat actor communications strategy can help you recover your data more quickly and mitigate the financial and reputational impact of a ransomware attack.

[ON DEMAND TALK] The State of the Cyber Insurance Market

Hear directly from our Digital Forensics & Incident Response certified experts on the varied roles and responsibilities you can expect from your IR service provider, External Counsel, Cyber Insurance, and other 3rd parties during a security incident.

[DATASHEET] Threat Intelligence Advisory Services

GuidePoint Security Intelligence Team’s Advisory Services leverage years of proven threat intelligence knowledge and expertise to meet your threat intelligence team where they are now and assist them with getting to where they want to be.

[eBOOK] Call Sign PAM: The State of Privileged Access Management

A personal narrative about one man’s quest to be a guardian of the skies, aligning his vigilance and dedication with the imperative role of safeguarding digital assets using Privileged Access Management. You are about to embark on a voyage of discovery, uncovering the shared principles of precision and vigilance in Black Hawk missions and Privileged Access Management.