Fortified Health Security is healthcare’s recognized leader in cybersecurity – protecting patient data and reducing risk throughout the Fortified healthcare ecosystem.

VTM in Healthcare
What You Need to Know

The Many Ways to Utilize a Vulnerability Threat Management Program in Healthcare Cybersecurity

Healthcare VTM Program: On-Demand Webinar

Doing more with less is a common theme in many IT departments. Overcoming that challenge is getting tougher and cybersecurity professionals are becoming harder to find.

According to a recent HIMSS survey*, 40% of surveyed IT professionals said 6% or less of their IT budget was devoted to cybersecurity. Last year cyber-attacks caused by exploiting unpatched software increased by 33% and accounted for 44% of ransomware attacks*.

(ISC)² conducted a poll* on the impact of Log4J, this past December on cybersecurity teams, and more than 50% of respondents spent weeks or months remediating the vulnerability. Additionally, almost half spent weekends or holidays to handle the challenge.

Cybersecurity teams should proactively and efficiently address vulnerabilities to reduce risk and staffing burnout, a Vulnerability Threat Management (VTM) program can help.

Watch this webinar to learn how a VTM program fits into your organization and why it's an important addition to your healthcare cybersecurity posture. Agenda for this webinar: 
• Factors Driving the Need for VTM Adoption
• What is a Healthcare VTM Program
• Examples of Utilizing VTM
• How to Start a VTM Program

About Our Speaker

TJ Ramsey
Director, Threat Assessment Operations
Seasoned IT security professional with 18 years of progressive experience in the Information Security and Defense Intelligence industries covering Healthcare and the Department of Defense. Mr. Ramsey has held roles as Security Analyst, Vulnerability and Threat Management Lead, Penetration Tester, and Penetration Testing Manager. Mr. Ramsey is well-versed in cyber security principles and best practices and an effective communicator in diverse groups of varied technical experiences. Additionally, he is comfortable in volatile situations with a proven ability to resolve complex problems. Expertise includes but is not limited to Advisory Services, Managed Services, Advanced Testing Services, Threat Management, Incident Response, Risk Management, and Senior Leadership engagement.




References and Sources

HIPAA Journal, 2.17.22
Newsroom IBM, 2.23.22
HealthIT Security, 2.23.22

Contact Us to Learn More