Topic Highlights
CISA’s Vital Role in Safeguarding Healthcare Infrastructure
Generative AI in Cyber Healthcare
Essential Considerations for HIPAA Compliance and Data Protection
Updates and Enhancements to the HICP Guide
ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges.
View our ISMG Event Experience video to see what your peers are saying about their participation.
Washington DC
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
CISA’s Vital Role in Safeguarding Healthcare Infrastructure
Generative AI in Cyber Healthcare
Essential Considerations for HIPAA Compliance and Data Protection
Updates and Enhancements to the HICP Guide
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, at interactive workshops and networking events. Learn from the who’s who in the cybersecurity industry, passionate about the latest tools and technology to defend against threats.
Government Toward Zero Trust Cybersecurity Principles (2022). As articulated by NIST in Special Publication 800-207 Zero Trust Architecture, using information about the “current state of assets network infrastructure and communications” to improve an enterprise’s security posture is a fundamental tenet of zero trust and the ability to observe “all network traffic” is a requirement.
By deploying network traffic visibility, an enterprise will be able to:
1. Map critical data flows during the segmentation process, to avoid inadvertent business and operational disruption;
2. Maintain visibility into data in motion within and between segments, to maintain lateral movement by adversaries.
The analysis of data about network traffic can help detect anomalies in traffic that cannot or should not be decrypted, validate the integrity of logs generated by network components and monitor/secure network components that do not support EDR solutions.
.
Nitin Natarajan, Deputy Director, CISA
From brazen crypto fraud schemes to landmark arrests and an historic executive order, 2022 has been a watershed year for cryptocurrency. But how is the U.S. federal government both using and regulating crypto, and what is the global outlook/influence?
Join this session for an entertaining and informative look at government’s approach to crypto, including:
Priscilla Sandberg, Director Healthcare Strategy, Pure Storage
In this session, you will learn about the three distinct types of threats in the modern cybersecurity landscape and what steps you can take to reduce your risk.
Theresa Lanowitz, Head of Cybersecurity Evangelism, AT&T Business
“Right of Boom” is a bad place to be. It means that “Boom” has already occurred, significant damage has been inflicted and enormous unforeseen and unprogrammed resources are being expended.
John Frushour, VP and CISO, NewYork-Presbyterian Hospital
Anahi Santiago, CISO, ChristianaCare
Despite years of technology and personnel investments, the volume and sophistication of business email compromise attacks continues to rise. What are some of cutting-edge techniques adversaries are pursuing to obtain email compromise, and how can individuals and organizations more effectively defend themselves?
Join the FBI’s Hadley Etienne and Steve Dougherty of the U.S. Secret Service for a look at the latest in BEC, including:
John Fahey, Cybersecurity Specialist, Infoblox
In this exclusive session, attendees will:
Melanie Fontes Rainer, Director, Department of Health and Human Services’ Office for Civil Rights
The session will cover:
Romanus Prabhu Raymond, Director of Product Support, ManageEngine
To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session co-moderated by a CyberEdBoard member and an esteemed security leader.
Tom Field, senior vice president of Editorial at ISMG, will kick off the session with a fictitious security scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world security scenarios.
Michael DeNicola, Supervisory Special Agent, The FBI New York Office, Cyber Branch
Through a combination of small group discussions, expert attendees will work through the life cycle of a business email compromise, BEC, attack.
What does participation in the Solution Room look like?
To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session. Tom Field, senior vice president of Editorial at ISMG, will kick off the session with a fictitious BEC scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world BEC scenarios.
Rocco Grillo, Managing Director, Alvarez & Marsal
Peter Halprin, Partner, Pasich LLP
Anahi Santiago, CISO, ChristianaCare
John Frushour, CISO, NewYork Presbyterian Hospital
Regardless, this administration has gone all-in, publishing a Zero Trust Strategy and directing civilian agencies to implement Zero Trust architectures. Additionally, the Department of Defense has published a Zero Trust reference architecture and created a Zero Trust program office.
In this exclusive session with the CIO’s of HHS and GSA and the CISO of Program Executive Office Soldier, we will dive into:
Phillip Englert, VP Medical Devices Security, Health ISAC Inc
Suzanne Schwartz, Director for Strategic Partnerships & Technology Innovation at the Center for Devices and Radiological Health, FDA
Oren J. Falkowitz lifts the lid on the recent evolution of sophisticated methods of phishing and the impact it is having, citing odd horror stories along the way. By analyzing some of these incidents, the workshop also provides techniques and methodologies to protect against these attacks, overviewing the role of your security incident response team and forecasting what future phishing attacks may present.
Oren J Falkowitz, Security Officer, Cloudflare
RSVP here to attend our events. You can select for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
Our Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Upcoming ISMG Events
Upcoming ISMG Events