Healthcare & Pharma Virtual Cybersecurity Summit

  • Virtual Summit

Don't wait for a breach to happen; take action and safeguard your digital assets now!  This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the 2024 Healthcare & Pharma Virtual Cybersecurity Conference.  Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors.

Admission is $25 for each attendee, which includes access to all educational presentations, keynote speakers, training, panel discussions, 8 CPE credits, and the solutions showcase virtual exhibits.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

The Summit is a unique remote conference tailored exclusively for invited Executives seeking innovative solutions to safeguard their company’s critical data and infrastructure. This forward-thinking event offers our top notch fully immersive and interactive virtual platform for business leaders to stay up to date with the latest developments in the cyber threat landscape. Attendees will have the opportunity to evaluate cutting-edge solutions through direct connections with emerging and established solution providers, subject matter experts, and influential cyber thought leaders.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
09:00 AM to 09:55 AM
Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet and engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
09:55 AM to 10:00 AM
Introduction
General Sessions
Data Connectors logo
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
10:00 AM to 10:30 AM
Tiered Resiliency as the Next Evolution of Back-Up
General Sessions
Andy Stone
CTO at PureStorage
Add to Calendar 02/29/2024 10:00 AM 02/29/2024 10:30 AM Tiered Resiliency as the Next Evolution of Back-Up

The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

The world of data backup and recovery has evolved with ransomware to highlight the need for a resiliency architecture that gives an organization the ability to quickly and reliably get back up and running after a cyber attack. This session will dive into how an attack (such as ransomware) unfolds and key considerations to give before, during and after so that the post-event recovery needs of the business can be achieved.

10:30 AM to 11:00 AM
Expert Panel Discussion: Cyber Insurance
General Sessions
event-simple-logo
Errol Weiss
Chief Security Officer at Health ISAC
Cecil Pineda
Senior Vice President & Chief Information Security Officer at R1 RCM, Inc.
Richard Weiss
VP, Chief Information Security Officer at AccentCare
Erin Sherman
Intelligence Analyst at FBI
Phil Englert
VP of Medical Device Security at Health-ISAC
11:10 AM to 11:25 AM
A Healthier View on Compliance
General Sessions
Jason Kikta
CISO/SVP of Products at Automox
Add to Calendar 02/29/2024 11:10 AM 02/29/2024 11:25 AM A Healthier View on Compliance

Too often, we regard compliance as an anchor, not a sail to our goals. We will explore the types of compliance and the root causes of negative attitudes towards it. More importantly, we will discuss strategies around using compliance to your advantage and how you can balance it with security imperatives.

Too often, we regard compliance as an anchor, not a sail to our goals. We will explore the types of compliance and the root causes of negative attitudes towards it. More importantly, we will discuss strategies around using compliance to your advantage and how you can balance it with security imperatives.

11:25 AM to 11:55 AM
Expert Panel Discussion: Compliance and Security in Healthcare, Lessons Learned
General Sessions
event-simple-logo
Errol Weiss
Chief Security Officer at Health ISAC
Scott Dickinson
CISO at AnMed Health
Irina Singh
Director IT, Office of the CISO at Baxter international
Dee Young
Chief Information Security Officer at UNC Health
Brian Shea
Chief Information Officer at MedOne Health
11:55 AM to 12:15 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:15 PM to 12:40 PM
Keynote Presentation: Seeing Through the Security Illusion
General Sessions
event-simple-logo
Christopher Frenz
AVP of IT Security at Mount Sinai South Nassau Hospital
Add to Calendar 02/29/2024 12:15 PM 02/29/2024 12:40 PM Keynote Presentation: Seeing Through the Security Illusion

A disturbing trend should be top of mind for anyone following the security industry in recent years. We have seen a large uptick in investment in security tools by organizations, but we have not observed a corresponding decrease in breaches and ransomware attacks. This paradox should be raising a serious question among security leaders as to what we as an industry are strategically doing wrong. Why are we not getting improved outcomes against attackers with all of this increased investment? 

 

This presentation will answer the question by demonstrating an evidence-based framework for information security management that focuses on using emulation of attacker techniques as a means of quantitatively measuring control efficacy. Examples will be given to illustrate the evidence-based approach and how it readily reveals that security tooling alone does not often provide the level of protection that one might assume. The presentation will illustrate how to identify weaknesses in current tooling and control sets and develop needed compensating controls to ensure that security teams are providing actual security to their organizations and not just the illusion of security.

A disturbing trend should be top of mind for anyone following the security industry in recent years. We have seen a large uptick in investment in security tools by organizations, but we have not observed a corresponding decrease in breaches and ransomware attacks. This paradox should be raising a serious question among security leaders as to what we as an industry are strategically doing wrong. Why are we not getting improved outcomes against attackers with all of this increased investment? 

 

This presentation will answer the question by demonstrating an evidence-based framework for information security management that focuses on using emulation of attacker techniques as a means of quantitatively measuring control efficacy. Examples will be given to illustrate the evidence-based approach and how it readily reveals that security tooling alone does not often provide the level of protection that one might assume. The presentation will illustrate how to identify weaknesses in current tooling and control sets and develop needed compensating controls to ensure that security teams are providing actual security to their organizations and not just the illusion of security.

12:40 PM to 01:15 PM
Healing a Broken Philosophy that Keeps Hurting Healthcare
General Sessions
Francois Driessen
COO at ADAMnetworks Inc.
Add to Calendar 02/29/2024 12:40 PM 02/29/2024 01:15 PM Healing a Broken Philosophy that Keeps Hurting Healthcare

Conventional security paradigm created an environment where the adversary gets to make the first move. How did we get here and how do we change the philosophy to establish a true proactive posture? Explore the concept of Zero Trust connectivity and how it is applied to IoT in the medical and OT environments.

Conventional security paradigm created an environment where the adversary gets to make the first move. How did we get here and how do we change the philosophy to establish a true proactive posture? Explore the concept of Zero Trust connectivity and how it is applied to IoT in the medical and OT environments.

01:25 PM to 01:50 PM
Reducing the Risk of Data Loss in Healthcare
General Sessions
safetica logo digital positive RGB.png_hd
Jan Lakatos
Head of Product Management
Add to Calendar 02/29/2024 01:25 PM 02/29/2024 01:50 PM Reducing the Risk of Data Loss in Healthcare

This session will cover the latest trends in data protection, proactive measures for mitigating insider threats, and the importance of continuous risk evaluation. Improve your data security posture and safeguard your patients' trust with proven approaches and expert guidance from Safetica.

This session will cover the latest trends in data protection, proactive measures for mitigating insider threats, and the importance of continuous risk evaluation. Improve your data security posture and safeguard your patients' trust with proven approaches and expert guidance from Safetica.

01:50 PM to 02:20 PM
Expert Panel Discussion: Protecting the Internet of Things (IoT) in Healthcare
General Sessions
event-simple-logo
Errol Weiss
Chief Security Officer at Health ISAC
Christopher Frenz
AVP of IT Security at Mount Sinai South Nassau Hospital
Fred Langston
Exec. VP & Chief Product Officer at Critical Insight
William Scandrett
CISO at Allina Health
Arielle Baine
Arielle Baine, Chief of Cybersecurity, Region 3 at DHS
Jeff Norman
Network Intrusion Forensics Analyst at USSS
02:30 PM to 02:50 PM
Guest Keynote Presentation: Sorry, the bad news just gets worse.... 2024 Outlook of Cyberthreats in Healthcare
General Sessions
H-ISAC_Logo_CMYK_72
Errol Weiss
Chief Security Officer at Health-ISAC
Add to Calendar 02/29/2024 02:30 PM 02/29/2024 02:50 PM Guest Keynote Presentation: Sorry, the bad news just gets worse.... 2024 Outlook of Cyberthreats in Healthcare

A disturbing trend should be top of mind for anyone following the security industry in recent years. We have seen a large uptick in investment in security tools by organizations, but we have not observed a corresponding decrease in breaches and ransomware attacks. This paradox should be raising a serious question among security leaders as to what we as an industry are strategically doing wrong. Why are we not getting improved outcomes against attackers with all of this increased investment? 

 

This presentation will answer the question by demonstrating an evidence-based framework for information security management that focuses on using emulation of attacker techniques as a means of quantitatively measuring control efficacy. Examples will be given to illustrate the evidence-based approach and how it readily reveals that security tooling alone does not often provide the level of protection that one might assume. The presentation will illustrate how to identify weaknesses in current tooling and control sets and develop needed compensating controls to ensure that security teams are providing actual security to their organizations and not just the illusion of security.

A disturbing trend should be top of mind for anyone following the security industry in recent years. We have seen a large uptick in investment in security tools by organizations, but we have not observed a corresponding decrease in breaches and ransomware attacks. This paradox should be raising a serious question among security leaders as to what we as an industry are strategically doing wrong. Why are we not getting improved outcomes against attackers with all of this increased investment? 

 

This presentation will answer the question by demonstrating an evidence-based framework for information security management that focuses on using emulation of attacker techniques as a means of quantitatively measuring control efficacy. Examples will be given to illustrate the evidence-based approach and how it readily reveals that security tooling alone does not often provide the level of protection that one might assume. The presentation will illustrate how to identify weaknesses in current tooling and control sets and develop needed compensating controls to ensure that security teams are providing actual security to their organizations and not just the illusion of security.

02:50 PM to 03:20 PM
The rise of 3D Phishing: Strategies for Healthcare & Pharma Defense
Solutions Showcase
Patrick Harr
CEO at SlashNext
Add to Calendar 02/29/2024 02:50 PM 02/29/2024 03:20 PM The rise of 3D Phishing: Strategies for Healthcare & Pharma Defense

The healthcare sector is under siege from a new breed of phishing attacks, known as 3D phishing. These attacks are more dangerous because they exploit multiple channels—email, social media, and mobile messaging—to craft highly convincing threats. SlashNext will uncover the dark impact of 3D phishing on healthcare, showcasing real incidents we see in healthcare environments. We will also explore healthcare attacks like the UnitedHealth Group breach, which exposed over 3.3 million patient records. 

 

We will reveal how cybercriminals deceive healthcare professionals using multichannel tactics to steal sensitive data. Discover the hidden dangers of supply chain attacks, exemplified by the UnitedHealth breach originating from Change Healthcare. SlashNext will propose a robust, multi-layered defense strategy designed for healthcare, helping organizations strengthen their defenses against these evolving threats. Attendees will gain actionable insights to protect patient data and maintain trust in their cybersecurity measures.

The healthcare sector is under siege from a new breed of phishing attacks, known as 3D phishing. These attacks are more dangerous because they exploit multiple channels—email, social media, and mobile messaging—to craft highly convincing threats. SlashNext will uncover the dark impact of 3D phishing on healthcare, showcasing real incidents we see in healthcare environments. We will also explore healthcare attacks like the UnitedHealth Group breach, which exposed over 3.3 million patient records. 

 

We will reveal how cybercriminals deceive healthcare professionals using multichannel tactics to steal sensitive data. Discover the hidden dangers of supply chain attacks, exemplified by the UnitedHealth breach originating from Change Healthcare. SlashNext will propose a robust, multi-layered defense strategy designed for healthcare, helping organizations strengthen their defenses against these evolving threats. Attendees will gain actionable insights to protect patient data and maintain trust in their cybersecurity measures.

03:20 PM to 03:50 PM
Beyond the Hype: Making Autonomous Security Operations a Reality
General Sessions
Kumar Saurabh
CEO at AirMDR
Add to Calendar 02/29/2024 03:20 PM 02/29/2024 03:50 PM Beyond the Hype: Making Autonomous Security Operations a Reality

The relentless growth of cyber threats and the increasing complexity of modern IT environments have stretched security teams to their breaking point. Autonomous solutions promise much-needed relief, but CISOs are rightly cautious. This session cuts through the hype, providing a pragmatic roadmap for incorporating autonomous capabilities into your security operations. 

 

We'll explore the spectrum of autonomy, from basic automation (Level 4) to true AI-driven decision-making (Level 5), clarifying what's possible today and what lies on the horizon. Discover the compelling reasons driving the need for autonomous alert triage and response and understand the critical role of the "virtual analyst" in this evolution. 

 

This session will equip you with the knowledge to: 

- Demystify "autonomous" and its varying levels. 

- Grasp the urgency for autonomous solutions in modern security operations. 

- Conceptualize the "virtual analyst" and its potential impact. 

- Learn key criteria for evaluating virtual analyst solutions. 

- Understand the challenges in building and deploying virtual analysts. 

- Define the evolving role of human analysts in an autonomous future. 

 

Join us to explore a realistic path toward autonomous security operations and prepare your organization for a more secure tomorrow.

The relentless growth of cyber threats and the increasing complexity of modern IT environments have stretched security teams to their breaking point. Autonomous solutions promise much-needed relief, but CISOs are rightly cautious. This session cuts through the hype, providing a pragmatic roadmap for incorporating autonomous capabilities into your security operations. 

 

We'll explore the spectrum of autonomy, from basic automation (Level 4) to true AI-driven decision-making (Level 5), clarifying what's possible today and what lies on the horizon. Discover the compelling reasons driving the need for autonomous alert triage and response and understand the critical role of the "virtual analyst" in this evolution. 

 

This session will equip you with the knowledge to: 

- Demystify "autonomous" and its varying levels. 

- Grasp the urgency for autonomous solutions in modern security operations. 

- Conceptualize the "virtual analyst" and its potential impact. 

- Learn key criteria for evaluating virtual analyst solutions. 

- Understand the challenges in building and deploying virtual analysts. 

- Define the evolving role of human analysts in an autonomous future. 

 

Join us to explore a realistic path toward autonomous security operations and prepare your organization for a more secure tomorrow.

03:50 PM to 04:05 PM
Closing Session and Prize Drawing
General Sessions
event-simple-logo
Closing Remarks of todays Summit and Prize Drawing.
04:05 PM to 05:00 PM
Solutions Showcase
Virtual
event-simple-logo
Meet and engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.

Gold Parnters

  • Pure Storage
  • safetica logo digital positive RGB.png_hd
  • 4VLfYWh6R3CXTBDORGLC_Lockup-Outlined-1
  • SlashNext_Logo_Color_L1R1

Silver Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.