The healthcare industry is confronting the increasing frequency and debts of data breaches around the world. On average, these breaches increase hospital mortality rates and cost each breached hospital $6.5 million (USD) or $429, on an individual basis, per patient.

67% of first-year costs follow, as hospitals work to resurrect systems and operations. These expenses include making legal, technical, and regulatory amends, notifying and communicating with affected patients, and heightening data security following the incident. On top of these expenses, more money is lost as hospital business decreases as a result of waning customer trust, damage to their reputation, and system shutdowns during reparation. After hospitals find themselves on a steady path to recovery, small to medium medical organizations have spent 5% of their yearly revenue, which on average, totals to $2.5 million.

An additional layer of data security may be the answer to fears and ignite preventative action. Blockchain, defined as, “a distributed ledger for recording transactions and tracking assets”, can secure healthcare data and shield against breaches. Wearable and remote monitors, telehealth, gamification, and health data NFTs are a few blockchain tools that can make a world of difference.

Wearable and remote devices include narcolepsy, blood pressure, seizure, pulse, sleep apnea, and diabetic monitors among others. These devices can be connected to databases that retain each individual’s recorded information. Healthcare personnel can retrieve patient data as it’s being recorded, patients can have more personalized care, and paramedics can better treat patients according to recent data when they arrive. With better security, less errors in data reporting, and longer-lasting technologies, these devices offer many benefits that can aid both data safety and the productiveness of patient-professional relationships.

Telehealth on its own poses notable risks, as few fully-fleshed out regulations and protocols regarding the storage and distribution of data exist and personal information can be shared with marketers and other parties without consent. By implementing blockchain, telehealth security heightens and becomes more dependable. Blockchain can infuse secure storage systems for medical records and compile data to give medical professionals a more comprehensive account of patient history.  By augmenting customer trust in the system and providing more efficient forms of data exchange, adding blockchain components to telehealth could be another guard against data breaches.

Gamification and health data NFTs go hand-in-hand. With gamification, patients are more focused through strategies that facilitate orientation toward their health-related objectives and openness to adopting new skills and habits. Those who attend doctor’s appointments, complete surveys, take prescriptions, and abide by doctor’s orders are rewarded with cryptocurrency tokens. Medical professionals, in turn, minimize losses as a result of improved, motivated outcomes. 

NFTs for health data describes the utilization of non-fungible tokens to protect an individual’s health record, guarding against theft and fraud. Patients benefit from increased control over their data, the possibility of gaining a profit from sharing select data with third parties, and being able to verify the legitimacy of personal information. 

Blockchain is being adopted into systems by both long-standing and up-and-coming healthcare companies, as they improve services and transactions and guard against the toll that data breaches can take on any organization. Learn more about blockchain and health to see how it can secure your service and operations too.

INFOGRAPHIC: A Line of Defense for Healthcare

Infographics Posted by Jen Greco on Mar 2, 2022

If you were feeling optimistic about the direction 2022 is going, the World Economic Forum’s “Global Risk Report” is here to quell that sunny disposition.

While this annual release may not cross most cyber execs’ desks, it contains a statement that many in the industry already know: cybersecurity is among the world’s greatest vulnerabilities.

This analysis – the result of survey data from 1,000 global leaders in both policy, business and economics – found cybersecurity to be a major risk in both the short- and medium-terms. In fact, “cybersecurity failures” beat out “infectious diseases” on the topic of “global risks that have worsened since the Covid-19 pandemic.”

Nearly 20% of the respondents cited “cybersecurity failures” as both significant and growing on an international basis. However, cybersecurity wasn’t widely considered among the longer-term threats. In the current pandemic climate with a “growing dependency on digital systems,” the report’s digest  stated:

“ … [C]ybersecurity threats are growing and outpacing societies’ ability to effectively prevent or respond to them. Attacks on critical infrastructure, misinformation, fraud and digital safety will impact public trust in digital systems and increase costs for all stakeholders. As attacks become more severe and broadly impactful, already-sharp tensions between governments impacted by cybercrime and governments complicit in their commission will rise as cybersecurity becomes another wedge for divergence, rather than cooperation, among nation states.”

Respondents seemed to support the idea that there has been no collective international mitigation when it comes to cross-border cyberattacks and related misinformation, according to the digest.

“Converging technological platforms, tools and interfaces connected via an internet that is rapidly shifting to a more decentralized version 3.0 are at once creating a more complex cyber threat landscape and a growing number of critical failure points,” the full report stated. “As society continues to migrate into the digital world, the threat of cybercrime looms large, routinely costing organizations tens—even hundreds—of millions of dollars. The costs are not just financial: critical infrastructure, societal cohesion and mental well-being are also in jeopardy.”

Cybersecurity Failures Among Top Internatio …

Industry News Posted by Jen Greco on Jan 13, 2022

This Week in Cyber takes a look at a few of the top news stories across the industry for the week of Jan. 10. Plus, get a peek at what’s coming up on the Data Connectors Community calendar.

Is 2022 the year of cryptomining? Signs, so far, point to yes. Users everywhere were buzzing over the addition of a cryptomining component in Norton 360 software over the last week. The news has landed in some mainstream publications, where authors are citing public outrage over the addition, including Wired magazine which says “you should absolutely not do this,” as it is an environmental drain and a potential security risk. There’s also the inherent hypocrisy involved; this software should seek to prevent cryptomining from threat actors rather than cashing in on it.

For a quick definition, ExtraHop defines cryptomining as the process where a user’s computing resources are used to mine cryptocurrencies like Bitcoin or, in the case of Norton 360, Ethereum. Threat actors have been known to do this surreptitiously uses a systems CPU and sometimes GPU to perform complex mathematical calculations that result in long alphanumeric strings called hashes.

And as for the cash payouts, Norton is keeping 15% of all earnings.

Once is chance, twice is coincidence… Krebs on Security is reporting that fellow virus scanner software Avira followed in Norton’s footsteps, putting some 500 million users’ PCs to work in the old Ethereum mines. Similar backlash has ensued. The question remains: is there space for cryptomining within security software offerings?

 

The cover-up is the crime. Remember back in 2016 when Uber fumbled 56 million users’ and drivers’ data? Then-security chief Joseph Sullivan is racking up charges for the behind-the-scenes coverup, most recently three counts of wire fraud to previously filed felony obstruction and misprision charges, according to a statement from the Department of Justice. 

The lesson for CSOs everywhere? Don’t make six-figure deals with hackers in exchange for their silence; don’t attempt to cover up a data leak from the people it affects, and definitely don’t try to hide it from the feds in the Federal Trade Commission.

 

Log4january updates? CISA Director Jen Easterly gave her thoughts on the status of the end-of-the-year fire drill we all experienced in 2021, saying that most government agencies here in the US are in the clear from log4shell vulnerabilities, in part due to vigilant cybersecurity engineers. However, the reach of this thing is so massive, we’ll be living with it for a long, long time.

 

Ten days into 2022, how are your resolutions going? If you started this year with a goal of reading more, you’re in luck. The Data Connectors Holiday Reading List is still live and ready for your consumption. https://info.dataconnectors.com/holiday-reading-list-2021 Get access to white papers and analyst reports that will keep you sharp in the new year.

On the road again. The Data Connectors team is starting the year in the Grand Canyon state, with an all-star lineup at its Phoenix Cybersecurity Conference on Wednesday, Jan. 12. We’re joined by Dr. Jonathan D.T. Ward, a world-renowned expert on China and Russia, who will be sitting down and taking audience questions in a Fireside Chat format.

Phoenicians (and other locals) can catch their local Secret Service Supervisory Special Agent Ingrid Rush, as well as FBI Special Agent Suzanne Allen, plus an all-star panel discussion titled “What Your Left Out of Your 2022 Cybersecurity Plan (And How to Fix It).”

This session will be followed up with another Cybersecurity Conference out in Salt Lake City on Jan. 27, as well as the SouthWest Virtual Cybersecurity Summit on Feb. 2-3.

Before you go… Don’t lose your seat at the CyberConnect Web Briefing on Jan. 20, where a panel of CISOs will be discussing the topic, “Automating Risk Management at Scale for the Modern CISO.” This is a can’t-miss discussion, particularly in a world after log4j. 

This Week in Cyber: The Year of Cryptomining?

Hot Topics in Cybersecurity Posted by Jen Greco on Jan 11, 2022

Fifth Patch Released:

 

Log4j continues to make news during the final week of 2021, as Apache issues the fifth patch, 2.17.1, since the initial vulnerability was uncovered earlier this month.

This patch fixes CVE-2021-44832, an arbitrary code execution flaw, which could be used by threat actors to run malicious code.

Per the CVE description: “Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.”

 

Joint Guidance Issued:

 

Federal law enforcement agencies from the US, Australia, Canada, New Zealand, and the United Kingdom issued a joint statement on the log4j vulnerabilities.

The notice includes CISA’s previously issued guidance, with steps including:

  • Identifying assets affected by Log4Shell and other Log4j-related vulnerabilities, 

  • Upgrading Log4j assets and affected products to the latest version as soon as patches are available and remaining alert to vendor software updates, and

  • Initiating hunt and incident response procedures to detect possible Log4Shell exploitation. 

Download a pdf this joint report here.

 

Consequences from the Chinese Government:

 

Bloomberg News reported that the vulnerability was initially found by an Alibaba software developer in late November and reported to Apache.

The developer’s organization, Alibaba Cloud, has been suspended from an information sharing partnership by regulators for six months for reporting the issue to Apache prior to reporting it to the Chinese Ministry of Industry and Information Technology, according to reports from ZDNet.

 

Cyber Experts Offer Insights on the Future of Log4j:

 

CEO and Founder of Check Point Software Technologies Gil Shwed appeared on CNBC to explain the impact of this vulnerability.

“What makes it very dangerous is that it’s very infectious,” Shwed said in the interview. He stated that the cybersecurity industry’s response has been very good, however, the shrewdness and skill of the hackers has improved so much in recent years. There are about 60 variants of this vulnerability, Shwed said.

In Case You Missed It: Log4j’s Holiday Week

Hot Topics in Cybersecurity Posted by Jen Greco on Dec 29, 2021

Thanks to the log4j vulnerabilities, businesses across the world got a not-so-friendly reminder earlier this month, that it’s vital to ensure that all third-party software within the organization is assessed frequently.

Following the news and the subsequent patches, organizations can take the wake-up call to complete a full third-party risk assessment, according to a report from Security Scorecard in their latest release, “Log4j Vulnerability Technical Report.” 

After you’ve assessed your organization and the internal impact, there are several important steps to take, including assessing your vendors and seeing if they have an older version of log4j (earlier than 2.17.0, as of this publication), according to the report. “We have published a new informational signal in SecurityScorecard called Vulnerable Log4j Version Detected. This informational signal does not impact scores and appears on Scorecards where a vulnerable Log4j instance was detected as of December 14th. If you see this signal on a vendor’s scorecard, reach out to them right away,” the report read.

Another way to assess your third-party damage is to download the Log4Shell Questionnaire, provided by Security Scorecard, and send it to all your software vendors, and then share your findings with your business partners.

 

BEYOND LOG4J

Third-party risk management is not just something an organization should do after a breach; for security experts, it should be top-of-mind according to “Best Practices for Trusted Third Party Risk Management,” also issued by Security Scorecard.

“Third parties are a necessary part of your enterprise. They are your vendors, your suppliers, your contractors, and your partners. Without them, you can’t do business,” according to the report. “Unfortunately, third parties are also a major source of cyber risk. Cybercriminals often target third-party providers to target their clients’ data and networks, such as the notorious SolarWinds breach at the end of 2020.”

Learn more about the important steps for Automated Risk Management at the CyberConnect Web Briefing on January 20, 2022. Register today.

Third Party Risk Assessment Gains Importanc …

Hot Topics in Cybersecurity Posted by Jen Greco on Dec 21, 2021

A second log4j vulnerability (CVE-2021-45046) was uncovered on Dec. 15 and has already been patched. In the description, it is stated that the original fix to address CVE-2021-44228 “was incomplete in certain non-default configurations.” The release of log4j 2.16.0 fixed the issue by removing support for message lookup patterns, according to the CVE record.

“The safest thing to do is to upgrade Log4j to a safe version or remove the JndiLookup class from the log4j-core jar,” according to the Apache Log4j Security Vulnerabilities page.

The Cybersecurity and Infrastructure Security Agency (CISA) updated its Vulnerability Guidance page to reflect this second vulnerability. In the update, the agency added: “A remote attacker can exploit this second Log4j vulnerability to cause a denial-of-service (DOS) condition in certain non-default configurations. Note: affected organizations that have already upgraded to Log4j 2.15.0 will need to upgrade to Log4j 2.16.0 to be protected against both CVE-2021-44228 and CVE-2021-45046.”

CISA has issued guidance telling vendors and affected organizations to ensure they’ve now updated to 2.16.0 in order to protect from both vulnerability.

The exploits on log4j are officially getting more sophisticated, according to Microsoft, including state-sponsored hackers from China, Iran, North Korea and Turkey.

This includes Chinese state-sponsored group HAFNUIM (of Microsoft Exchange hack fame), which has been using a DNS service “typically associated with testing activity to fingerprint systems,” Microsoft stated.

“The bulk of attacks that Microsoft has observed at this time have been related to mass scanning by attackers attempting to thumbprint vulnerable systems, as well as scanning by security companies and researchers,” Microsoft wrote in its security blog.

One of the targets currently includes Minecraft servers, according to Microsoft. Minecraft is a popular sandbox and survival video game which is regarded as the best-selling video game of all time with nearly 140 million monthly active users.

“Microsoft can confirm public reports of the Khonsari ransomware family being delivered as payload post-exploitation, as discussed by Bitdefender. In Microsoft Defender Antivirus data we have observed a small number of cases of this being launched from compromised Minecraft clients connected to modified Minecraft servers running a vulnerable version of Log4j 2 via the use of a third-party Minecraft mods loader,” Microsoft wrote on its blog post.

Patch Released for Second Log4j Vulnerability

Hot Topics in Cybersecurity Posted by Jen Greco on Dec 16, 2021

This guest post was originally posted on LinkedIn and has been reposted with permission.

If you are just finding out about log4j, here’s what you need to know as a defender:

1. It’s bad. VERY bad. The level of badness can’t be overstated.

2. Don’t think you’re exposed because you don’t use java? I guarantee you at least one of your SaaS vendors/cloud hosting providers/web server providers does.

Java was the most popular programming language of the 90s and early 00s. Hell, it’s still in Stack Overflow’s Top 10 and taught widely in high school & college.

Java is EVERYWHERE.

3. Go through EVERY app, website, and system that you own/use that talks to the internet. This includes self-hosted installs of vendor products and cloud-based services.

Focus on systems that are internet-facing that contain sensitive data, secrets, etc. Focus on older “legacy” vendors.

4. This exploit is not only publicly known, the barrier to entry is LOW. Anyone, including your 5yo playing Minecraft, can use this exploit. It’s as simple as typing in a few characters into a chat box.

5. Don’t think you’re protected because aUthEnTiCatIoN. This exploit is pre-auth. Which means an attacker DOESN’T NEED TO SIGN IN to your web app/system/whatever in order to pop you.

6. Once you finish assessing your hosted apps, vendor systems, etc. – move on to endpoint applications. Java-based apps like WebEx, Minecraft, JetBrains IDEs, Citrix, Filezilla FTP are all
vulnerable. You need to patch, patch, patch. If no patch is available, uninstall.

7. Once you’re done with endpoint apps, make sure all your work from home folks update their personal devices and home routers.

Yes, home routers are susceptible.

I told you it was bad.

Note – don’t rely on your work from home folks to do this right, even with clear instructions.

A lot of them will ignore you.
Prepare for this eventuality.
Make nice with your IT team.
You’re gonna need them.

7. Your immediate reaction will be to set gateway rules to block the exploit string.

Don’t. It won’t work.

There are an infinite number of ways to obfuscate the string. Your regex will be no match, I assure you.

8. Instead, focus on patching. Focus on limiting outbound traffic.
If you can block the LDAP/LDAPS protocol entirely from your outbound traffic, do it.

If you can’t, well, at least block the default LDAP/LDAPS ports. It’s not much, but it’s something.

9. Lastly, communicate with your senior leaders. They should be in the know about this one.

If your leaders ignore you, go to the leadership level above them.

If they ignore you, go to the CEO.

If the CEO ignores you, go to the board.

I told you it was bad.

10. Don’t think this is going to go away any time soon. We’re just starting to get a glimpse of what is being tried out there in the wild.
Buckle up. It’s going to be a wild Christmas.

One final thing to add: if you don’t have edge protection, you can still set firewall rules at the host level. Send outbound traffic to only trusted IPs. This should be a small list.

• • •
To recap:
1. log4j is very bad
2. you are susceptible
3. patch & filter outbound traffic
4. get IT to help you
5. tell your senior leaders

 

Naomi Buckwalter is an experienced CISO and non-profit director, and is a featured speaker among the Data Connectors Cybersecurity Community. Find her on LinkedIn. 

Ten Things You Must Know About Log4j

Hot Topics in Cybersecurity Posted by Naomi Buckwalter on Dec 14, 2021

The following is a statement shared by the US Secret Service’s Gateway Cyber Task Force at the St. Louis Field Office for the benefit of the public.

DHS – CISA and its partners, through the Joint Cyber Defense Collaborative, are tracking and responding to active, widespread exploitation of a critical remote code execution vulnerability (CVE-2021-44228) affecting Apache Log4j software library versions 2.0-beta9 to 2.14.1. Log4j is very broadly used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information. An unauthenticated remote actor could exploit this vulnerability to take control of an affected system.

CISA has created a webpage, Apache Log4j Vulnerability Guidance and will actively maintain a community-sourced GitHub repository of publicly available information and vendor-supplied advisories regarding the Log4j vulnerability.

CISA urges organizations to review its Apache Log4j Vulnerability Guidance webpage and upgrade to Log4j version 2.15.0, or apply the appropriate vendor recommended mitigations immediately.

Please follow this link for more information.

CISA Develops Web Page for Apache Log4j Vul …

Hot Topics in Cybersecurity Posted by Data Connectors Newsroom on Dec 14, 2021

For a cybersecurity strategy to succeed, collaboration is vital – whether that’s between teams, organizations or federal agencies.

That was one of many key takeaways at the State of Cyber Conference held in downtown St. Louis on Dec. 1-2.  This event was the result of the country’s top law enforcement agencies coming together to discuss the current cyber threat landscape.

Developed along with the St. Louis InfraGard Alliance and the local offices of the Federal Bureau of Investigation and the US Secret Service, with presentations from the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), this conference was attended by hundreds of senior cybersecurity professionals from across the region.

“When we first started State of Cyber [in 2016], our goal was to get more partnership between the fed agencies and local resources for the 16 critical infrastructures that InfraGard serves,” said David Wren, president of St. Louis InfraGard.

The conference featured content that was exclusive for attendees only, including a briefing from the FBI on the current state of cybersecurity in the region – namely, its work in combatting ransomware. Attendees also heard from the Department of Homeland Security CISA on how their organizations can partner with the agency to protect themselves against the many threats that are out there.

The two-day conference closed with an inter-agency panel, featuring representatives from:

  •       The US Secret Service
  •       St. Louis Fusion Center
  •       Missouri Department of Public Safety
  •       DHS-CISA
  •       Missouri State Highway Patrol

During this exclusive session, the experts discussed ways their agencies collaborate with each other and with the public to ensure a high-end cybersecurity infrastructure in the region.

AS SEEN ON TV

It wasn’t just the local cybersecurity pros who took notice of the State of Cyber Conference. Several local news organizations took note of the high-profile speakers list and timeliness of the event.

“The State of Cyber 2021 is a great opportunity for the Secret Service to meet with corporations and security directors to talk about the trends and tactics we’re seeing imposed on the civilian population and also corporations themselves,” US Secret Service Special Agent in Charge Thomas Landry told Fox2Now. Landry is based in the St. Louis field office, and was featured as a key speaker during the conference. His session, given in collaboration with USSS Senior Special Agent Brian Cockrill, was titled “The USSS Cyber Fraud Task Force Model.” This session gave attendees a better understanding of how the agency, which is (in part) designed to fight financial crimes against US citizens, can aid organizations when it comes to avoiding, combatting and reporting cyber crimes. 

Data Connectors CEO Dawn Morrissey highlighted ransomware as one of the biggest cyber threats for KMOV4 viewers regarding one of the biggest cyber threats facing companies of all sizes: ransomware.

“It’s continued to increase, not only the amount of ransom demands, but the frequency of attacks,” she said in the news report. “And it’s affecting everyone from businesses, all the way up to large corporations.”

IN CASE YOU MISSED IT

The Data Connectors team is continuing to partner with InfraGard to present the State of Cyber Virtual Cybersecurity Summit – a complementary, fully online session intended for cyber professionals in the Midwest and Great Lakes region on Dec. 14-15.

This fully virtual experience features similar panels and discussions from the high-profile lineup of speakers, including an interactive inter-agency panel. Registration is still available.

“State of Cyber 2021” Connects Executiv …

Industry News Posted by Jen Greco on Dec 8, 2021

Law Enforcement, Chief Information Security Officers from Region’s Largest Organizations Convene to Get Ahead of Expanding Cyber Threats

 

ST. LOUIS, MO – November 29, 2021. Data Connectors, representing the largest cybersecurity community in North America, confirmed the details for the State of Cyber 2021 Conference, which will take place December 1st and 2nd, 2021. In partnership with the St. Louis InfraGard Alliance and local field offices of the Federal Bureau of Investigation (FBI) and the US Secret Service, the Chesterfield, MO-based firm will present this year’s in-person and online gatherings, a return from last year’s all-virtual format.

“The United States Secret Service is proud to collaborate with our local, state, and federal partners at the State of Cyber 2021 Conference. Sharing intelligence with them and the organizations responsible for a private infrastructure operating in the St. Louis metropolitan area furthers our investigative mission to thwart crimes against the financial infrastructure of the United States,” stated Thomas Landry, Special Agent in Charge, U.S. Secret Service – St. Louis Field Office.

Landry also headlines the agenda on Wednesday, December 1st.

The conference features prominent Chief Information Security Officer (CISO) executives from the region, as well as industry luminaries, cybersecurity solutions experts, and representatives from government agencies. The two-day agenda represents a combination of the St. Louis Cybersecurity Conference, which has been run annually since 2003, the St. Louis InfraGard Alliance’s State of Cyber event started in 2016, and an annual update for local cyber professionals conducted by the St. Louis Office of the United States Secret Service’ Cyber Fraud Task Force.

Validated professionals in the community that attend the Conference will receive briefings from the Department of Homeland Security (DHS) Cyber Infrastructure Security Association (CISA), and hear from local peer executives from organizations such as Mastercard, First Bank and TikTok.

The Conference will also feature a panel discussion on the State of Cyber Inter-Agency Cooperation, and keynotes from public and private sector executives:

  • Richard Quinn, Special Agent in Charge, FBI St. Louis Division
  • Erin Hug, Cyber Intelligence Analyst, Cybersecurity Forensics & Intelligence Unit at Missouri State Highway Patrol
  • Angela Robinson, Cybersecurity Specialist with the Department of Public Safety (DPS)
  • Derek Rieger, Deputy Director of the St. Louis Fusion Center
  • Brian Cockrill, Senior Special Agent – Technical Staff Assistant at the United States Secret Service – St. Louis Field Office
  • Christopher Cockburn, Cybersecurity Advisor at CISA
  • D. Henry, Cyber Security Advisor & Indiana Cybersecurity State Coordinator at CISA

Over 300 members of the Data Connectors Cybersecurity Community are expected to attend this conference. More than 30 community partners and affiliate organizations will also be a part of the gathering including Auth0, Attivo Networks, Darktrace, and Noname Security.

The Conference will take place on Wednesday and Thursday, December 1-2, starting at 8:00 a.m. CST at the Hyatt Regency St. Louis at The Arch, 315 Chestnut St., St. Louis, MO 63102. Registration is FREE for qualified professionals, who can also obtain Continuing Professional Education (CPE) credits for participation.

More information for the Summit can be found at dataconnectors.com/state-of-cyber.

+++++++++

About Data Connectors
Since 1999, Data Connectors (dataconnectors.com) has facilitated collaboration between senior cybersecurity professionals, government/law enforcement agencies, industry luminaries, and solution providers. Today, the community comprises over 650,000 members and 250 Community Partners across North America. Members enjoy informative education, networking and support via award-winning Virtual Summits, live conferences, Web Briefings, and regular communications.

# # #

Note to reporters: If you wish to attend these sessions at no charge, please contact Michael Hiskey, Chief Strategy Officer, at +1.636.778.9495, or info@dataconnectors.com.

“State of Cyber 2021” Brings Together H …

Press Releases Posted by Emily Ramsey on Nov 29, 2021