
Virtual Summit
Cybersecurity in Healthcare
Virtual Summit
Join your fellow cybersecurity experts with a Virtual Cybersecurity Summit that focuses solely on the healthcare industry. As one of the primary targets for hackers, this industry has a unique responsibility to protect some of the most sensitive information of its customers and patients. That’s why its so important for the cyber experts in healthcare to stay ahead of the latest threats.
Log in to an immersive virtual platform to hear from leading experts in both the public and private sectors, and ensure that your organization is as vigilant as possible in today’s threat landscape. Cybersecurity thought leaders from hospitals and healthcare groups across the continent will offer leading-edge insights to improve your current posture.
Take a look at all Data Connectors has to offer here!
Date
Thu. Mar 03
-
Featured Speakers
John Riggi
Russia-Ukraine Conflict: Impact on Cyber Threats to US Healthcare
Carolyn CrandallRussia-Ukraine Conflict: Impact on Cyber Threats to US Healthcare
Brian BoboCyber Exec RoundTable: Is Cyber-Insurance Worth It? Yes or No?
Daniel WalshCyber Exec RoundTable: Is Cyber-Insurance Worth It? Yes or No?
Steven RamirezCyber Exec RoundTable: Is Cyber-Insurance Worth It? Yes or No?
Cecil PinedaCyber Exec RoundTable: Is Cyber-Insurance Worth It? Yes or No?
Dr. Chandana UnnithanCyber Exec RoundTable: Compliance and Security in Healthcare: Lessons Learned
Jeffrey JohnsonCyber Exec RoundTable: Compliance and Security in Healthcare: Lessons Learned
Scott DickinsonCyber Exec RoundTable: Compliance and Security in Healthcare: Lessons Learned
Hassan AsgharCyber Exec RoundTable: Compliance and Security in Healthcare: Lessons Learned
John FrushourCyber Exec RoundTable: Compliance and Security in Healthcare: Lessons Learned
Errol WeissKeynote - 2022 Cyber Threat Predictions: Health-ISAC's Annual Report
William ScandrettCyber Exec RoundTable: Protecting Patient Data: Cybersecurity Challenges in Healthcare & Life Sciences
Daniel WalshCyber Exec RoundTable: Protecting Patient Data: Cybersecurity Challenges in Healthcare & Life Sciences
Adam MansourCyber Exec RoundTable: Protecting Patient Data: Cybersecurity Challenges in Healthcare & Life Sciences
Randall FrietzscheCyber Exec RoundTable: Protecting Patient Data: Cybersecurity Challenges in Healthcare & Life Sciences
John FrushourCyber Exec RoundTable: Protecting Patient Data: Cybersecurity Challenges in Healthcare & Life Sciences
Christopher FrenzCyber Exec RoundTable: Protecting the Internet of Things in Healthcare
Chris LockeryCyber Exec RoundTable: Protecting the Internet of Things in Healthcare
Fred LangstonCyber Exec RoundTable: Protecting the Internet of Things in Healthcare
Mark SangsterCyber Exec RoundTable: Protecting the Internet of Things in Healthcare
Event Schedule
Times for this Event are in Eastern Time (EDT/EST).
The Summit will be open from 8:30 AM to 5 PM.
- Healthcare Virtual Cybersecurity Summit Welcome
-
Russia-Ukraine Conflict: Impact on Cyber Threats to US Healthcare 9:15 am
Feature Keynote, made possible by Attivo Networks
The outbreak of European conflict over the past week brings with it an unprecedented level of concern for pending cyber-attacks. In light of previous attacks and potential threats, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) issued a related-and-rare cyber “Shields Up” warning to the U.S. private sector, including health care, based upon the increased cyberthreat posed by the Russian government.
John Riggi, having spent nearly 30 years as a highly decorated veteran of the FBI, serves as the first national advisor for cybersecurity and risk for the American Hospital Association. In this feature keynote, he will be interviewed by Carolyn Crandall, Chief Security Advocate from Community Partner Attivo Network, whose business serves the healthcare industry with cybersecurity innovation.
Mr. Riggi will discuss what the elevated international cyber-threat landscape means to healthcare organizations. He will speak from his experience, and extensive recent conversation with the leaders from the AHA’s 5,000+ member hospitals and health systems.
This “Russia-Ukraine Conflict: Impact on Cyber Threats to US Healthcare” talk will touch on the concerns specific to healthcare, amid expanded remote work and the rapid move to cloud operations. It will further discuss the need for healthcare organizations to take a fresh look at identity protection that expands beyond Authentication and Multi-Factor Authentication and into security innovations for identity exposure risk mitigation and Identity Detection and Response (IDR) protection.
Speaker:
-
The State of Identity Security in Healthcare 9:45 am
Securing identities is more complex than ever as the rapid digital transformation of healthcare continues. With the rise of virtual health services and the introduction of interoperability regulations, Digital Front Door initiatives have accelerated to enable value-based care across the entire patient care journey; however, as digital health ecosystems expand, identity becomes more challenging to manage, streamline, and protect.
This session will dive into the Auth0 State of Secure Identity Report to detail the identity security challenges healthcare organizations are facing, and how a modern and centralized approach to identity fosters a secure and seamless patient-centric experience.
Speaker:
-
Cyber Exec RoundTable: Is Cyber-Insurance Worth It? Yes or No? 10:10 am
As ransomware and other cyber-attacks have been on the rise over the past few years, Cyber-Insurance premiums are up… some say by 200-300%. Hospitals, healthcare providers, and related organizations have faced a growing number of attacks. This is expected to continue in 2022. In this roundtable discussion, panelists will discuss the particular issues they face and new challenges they anticipate on the horizon.
Panel Participants:
-
AI in Cybersecurity: Assessing the Maturity of AI in Protecting Healthcare Organizations 11:10 am
Cybersecurity projects are top of mind for healthcare organizations as a target spend for 2022. For many projects AI will surface as a differentiator in tools and services that affect our top spends. Just how far has AI come in helping secure healthcare and how should these initiatives be prioritized? In this presentation Adam Mansour, CSO at ActZero will deep dive into how to rank maturity of AI across the Cybersecurity landscape to help teams choose when and how to apply these in their projects.
Speaker:
-
Don’t Phreak Out: Bring VOIP, P2P, and Server-initiated Access into the Zero Trust Era 11:30 am
It all started with phreaking the phone network and a few clever hackers. Today business runs on IP networks and VOIP is an important application used by employees, contractors, and partners. Hackers today focus on attacking these private IP networks and they target vulnerable VPNs to gain access. Consequently, organizations are turning to zero trust network access (ZTNA) to protect their networks and applications against these attacks. For the longest time only VPNs were used to enable remote access for VOIP, P2P, or server-initiated flows. That changes now. Learn how you can add VOIP, P2P, and server-initiated flows into a zero trust network access model.
Speaker:
-
Cyber Exec RoundTable: Compliance and Security in Healthcare: Lessons Learned 11:50 am
In this panel, CISOs from various healthcare concerns relate their experiences from years of working on thorny cyber issues. In regulated industries like ours, compliance is important and takes a great deal of effort. But will compliance get you all the way to good security? Within those regulations, what are the lessons learned in terms of SaMD, Tele-Health, HIPPA compliance, etc.
Panel Participants:
- Lunch Break
- Demo Session 12:50 pm
-
Keynote - 2022 Cyber Threat Predictions: Health-ISAC's Annual Report 1:10 pm
2021 was a challenging year in cybersecurity with several high-profile compromises that impacted even large and well-protected organizations. Attacks against healthcare firms, supply chains and operational technology environments show that the attackers are continuing to evolve and refine their tactics.
We must do the same.
Health-ISAC surveyed its members to rank order the greatest cybersecurity concerns and the results of the survey are presented. The concerns of healthcare organizations remained largely unchanged between 2020 and 2021 with ransomware being the top concern. The presentation will cover nation state, cyber crime and other cyber threats to healthcare organizations and forecast projections for the threat landscape in 2022.
Attendees can leverage the threat landscape report to influence cybersecurity budget and investment decisions for senior leaders and IT / security practitioners in the healthcare sector. The presentation will conclude with basic recommendations and offer additional resources attendees can use including the full threat landscape report which was a collaborative effort between Health-ISAC and Booz Allen Hamilton Cyber Threat Intelligence (CTI).
Speaker:
-
Protecting Healthcare with AI-Powered Autonomous Response 1:40 pm
As hospitals and healthcare organizations across the globe strive to provide the best possible patient care under increasingly immense strain, attackers are ramping up their efforts against them. Ransomware attacks, phishing campaigns, and an increasing number of IoT devices pose a growing threat to the healthcare industry, and holding valuable data within patient files, they remain a primary target for cyber-criminals.
Join Justin Fier, Director of Cyber Intelligence and Analysis at Darktrace, as he discusses the cyber-threats that the healthcare sector is facing today and how security teams can take a proactive approach to protect their systems, data, and ultimately, their patients.
Speaker:
-
Cyber Exec RoundTable: Protecting Patient Data: Cybersecurity Challenges in Healthcare & Life Sciences 2:00 pm
Cyber-attacks that target personal data are aiming for the ‘treasure trove’ of PII that healthcare, pharmaceutical and life sciences organizations have in their servers. In this panel, executives will talk about what they are doing to protect data at rest and in motion, what they see as the key challenges, and best practices they’d share with peer cyber leaders in the audience.
Panel Participants:
-
Approaching Zero Trust in Healthcare Cloud Environments 2:55 pm
Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand. Join the Lookout team today to find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – regardless of SaaS, IaaS or on-premises application.
Speaker:
-
Achieving Evidence-Based Security With Threat-Informed Defense 3:15 pm
While compliance-based frameworks are not without merit, it is important that they be viewed as minimum acceptable standards and not as end goals. Hospitals and other Healthcare Delivery Organizations (HDOs) need to begin to take stock of their cyber postures and ensure that they have mechanisms in place to mitigate the risks of a cyberattack. In addition to the standard recommendations of having an incident response plan, verifying backup and restore capabilities, reducing vulnerabilities at the perimeter, and other such controls, HDOs need to begin to adopt a more threat-informed defense approach to securing their organization.
In this presentation, Christopher Frenz, AVP of IT Security for Mount Sinai South Nassau hospital in New York will explain the need for leaders in HDOs to think differently. They should stop deploying security tools and assuming security, and start taking the time to ensure that effective combinations of properly configured tools, security architectures and hardened configurations exist to give them a quantitatively demonstrated and meaningful chance at resisting the threats that they are likely to face.
Speaker:
-
Cyber Exec RoundTable: Protecting the Internet of Things in Healthcare 3:35 pm
IoT attacks related to healthcare providers read like the plot of a spy novel. With thousands of devices connected, asset inventory is increasingly difficult. Issues around fast authentication in life-threatening situations, network segmentation, and sentient devices keep CISOs up at night. In this panel, executives discuss their approaches, what they have learned, and share best practices.
Panel Participants:
- Summit Closing Session and Prize Drawing 4:10 pm