Oct. 27, 2022, 11 a.m. | Jessica Davis

SC Magazine feed for Policy www.scmagazine.com

Email is typically used as a mere pivot point for threat actors. As healthcare regulations require evidence no patient data was accessed, providers must consider their PHI and data retention policies for these vulnerable platforms.

compliance email email security forensics healthcare privacy problem security security awareness social engineering

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Regional Leader, Cyber Crisis Communications

@ Google | United Kingdom

Regional Intelligence Manager, Compliance, Safety and Risk Management

@ Google | London, UK

Senior Analyst, Endpoint Security

@ Scotiabank | Toronto, ON, CA, M1K5L1

Software Engineer, Security/Privacy, Google Cloud

@ Google | Bengaluru, Karnataka, India

Senior Security Engineer

@ Coinbase | Remote - USA