Healthcare providers are under pressure like never before. With the recent news bombarding us with breaches and bad stories, how do we understand what’s really happening out in the wild? In this conversation, we will speak about what we are seeing and experiencing in the real world. We will talk about recent findings from analysts, cloud providers and plain old firsthand account knowledge. We will understand what the bad guys are doing in the wild and discuss how to prevent yourself from becoming another statistic - or worse, a news story.
An analysis of the state of healthcare sector cybersecurity - including where progress is being made, but why the urgency to address the industry's top security weaknesses is growing more serious.
This session will cover:
Vendors and other third-parties have been at the heart of some of the largest breaches and security incidents we’ve ever seen. That includes mishaps involving business associates, as well as vulnerabilities and exploits involving third-party software and supply chain partners. What can entities do to reduce this vendor risk?
This session will examine:
A case study: In April 2022, Microsoft, Health-ISAC and FS-ISAC took legal and technical actions to disrupt operators of the Zloader botnet and to stop criminals from distributing Ryuk ransomware used to attack hundreds of hospitals.
This session details:
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
Billions of dollars are spent annually to set up security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.
Security is never static. New threats are constantly emerging, and misconfigurations are rampant. How do you take control of an ever-changing threat landscape? Attack yourself before hackers do. A SaaS-based breach and attack simulation - or BAS - platform, Threat Simulator continuously tests your defenses by simulating attacks across your production network and endpoints. With over 20 years of leadership in network security testing, Threat Simulator helps you identify and fix vulnerable gaps in coverage before attackers can exploit them.
It’s no secret that public cloud has provided the technical catalyst to the healthcare industry’s long-overdue modernization and the keys to the kingdom in terms of its globalization. The resulting access to usable swaths of data is invaluable – and high-risk. This session explores the unimaginable potential of global data sets and applications, the complexities of addressing multiple compliance frameworks, and the critical strategies security teams must embrace to ensure success.
Every healthcare entity needs to increase its SecOps team’s capacity to stay ahead of emerging threats. Consolidating your security tools into a holistic ecosystem that’s always learning and adapting is key. Begin your journey toward quick, reliable, simplified security as we review the genesis of XDR and how it’s breathing new life into our healthcare industry and new biomedical devices.
A look at the latest demands cyber insurers are making on healthcare sector entities in order to renew policies or obtain new coverage.
This session will examine:
What are the most disturbing fraud trends in healthcare and what can security professionals and CISOs do to help prevent and detect these schemes in their organizations, ranging from incidents involving malicious insiders, external bad actors, pandemic scams, intellectual property theft and more?
This session will explore:
Whether you are a healthcare provider, insurer, pharmaceutical or life science organization, elevating the digital experience is no longer optional—it’s essential. And while there are notable differences between each industry, they are all transforming quickly and need to deliver relevant, timely, and trusted experiences.
To deliver the best experiences for patients and members and to provide the right experience integrated across all channels, including appointments, account management, and telehealth, healthcare organizations are turning towards Customer Data Platforms (CDPs).
Join this session to hear the:
To learn more about Tealium, click here to visit our booth and chat with a representative.
All of the rapid changes in healthcare trends right now (shift to telemedicine, the consolidation of providers, record system modernization) hinge on the ability to have accurate identity information dispatched when needed–with no down time. The user experience of providers and patients alike must be held to the highest standard, while respecting sensitive PII data. This session will address why simplifying identity management is a strategic step for any modern healthcare system.
Healthcare entities face unique challenges, delivering lifesaving services amidst cybersecurity and supply chain challenges that can result in fatal disruption. Join this panel discussion for first-hand views of how healthcare security leaders are managing:
The FDA in April issued new, detailed draft guidance for the cybersecurity of pre-market medical devices. The document included proposals for how manufacturers should address security risk as part of their submissions for the FDA to give market approval for new products. What is the FDA expecting from manufacturers when it comes to enhancing medical device cybersecurity?
This session will examine:
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
Healthcare tends to be a very compliance-minded sector. But healthcare delivery organizations need to adopt a more threat-informed defense approach to securing their entities. For instance, most compliance frameworks will check for the existence of a security control but do nothing to assess or measure the efficacy of the deployed control.
This session will explore:
An update on several important HIPAA rulemaking, regulatory and enforcement efforts in the works at the agency, and an analysis of evolving breach trends
This session will examine:
All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, July 13. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
Healthcare providers are under pressure like never before. With the recent news bombarding us with breaches and bad stories, how do we understand what’s really happening out in the wild? In this conversation, we will speak about what we are seeing and experiencing in the real world. We will talk about recent findings from analysts, cloud providers and plain old firsthand account knowledge. We will understand what the bad guys are doing in the wild and discuss how to prevent yourself from becoming another statistic - or worse, a news story.
An analysis of the state of healthcare sector cybersecurity - including where progress is being made, but why the urgency to address the industry's top security weaknesses is growing more serious.
This session will cover:
Vendors and other third-parties have been at the heart of some of the largest breaches and security incidents we’ve ever seen. That includes mishaps involving business associates, as well as vulnerabilities and exploits involving third-party software and supply chain partners. What can entities do to reduce this vendor risk?
This session will examine:
A case study: In April 2022, Microsoft, Health-ISAC and FS-ISAC took legal and technical actions to disrupt operators of the Zloader botnet and to stop criminals from distributing Ryuk ransomware used to attack hundreds of hospitals.
This session details:
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
Billions of dollars are spent annually to set up security programs and operation centers across every industry and yet, according to Risk Based Security, 3,932 breaches were publicly reported in 2020 alone. Why are security programs failing? Learn how the current operating model contributes to that failure and how a simple maturity model based on outcomes and use cases can make your organization more cyber resilient.
Security is never static. New threats are constantly emerging, and misconfigurations are rampant. How do you take control of an ever-changing threat landscape? Attack yourself before hackers do. A SaaS-based breach and attack simulation - or BAS - platform, Threat Simulator continuously tests your defenses by simulating attacks across your production network and endpoints. With over 20 years of leadership in network security testing, Threat Simulator helps you identify and fix vulnerable gaps in coverage before attackers can exploit them.
It’s no secret that public cloud has provided the technical catalyst to the healthcare industry’s long-overdue modernization and the keys to the kingdom in terms of its globalization. The resulting access to usable swaths of data is invaluable – and high-risk. This session explores the unimaginable potential of global data sets and applications, the complexities of addressing multiple compliance frameworks, and the critical strategies security teams must embrace to ensure success.
Every healthcare entity needs to increase its SecOps team’s capacity to stay ahead of emerging threats. Consolidating your security tools into a holistic ecosystem that’s always learning and adapting is key. Begin your journey toward quick, reliable, simplified security as we review the genesis of XDR and how it’s breathing new life into our healthcare industry and new biomedical devices.
A look at the latest demands cyber insurers are making on healthcare sector entities in order to renew policies or obtain new coverage.
This session will examine:
What are the most disturbing fraud trends in healthcare and what can security professionals and CISOs do to help prevent and detect these schemes in their organizations, ranging from incidents involving malicious insiders, external bad actors, pandemic scams, intellectual property theft and more?
This session will explore:
Whether you are a healthcare provider, insurer, pharmaceutical or life science organization, elevating the digital experience is no longer optional—it’s essential. And while there are notable differences between each industry, they are all transforming quickly and need to deliver relevant, timely, and trusted experiences.
To deliver the best experiences for patients and members and to provide the right experience integrated across all channels, including appointments, account management, and telehealth, healthcare organizations are turning towards Customer Data Platforms (CDPs).
Join this session to hear the:
To learn more about Tealium, click here to visit our booth and chat with a representative.
All of the rapid changes in healthcare trends right now (shift to telemedicine, the consolidation of providers, record system modernization) hinge on the ability to have accurate identity information dispatched when needed–with no down time. The user experience of providers and patients alike must be held to the highest standard, while respecting sensitive PII data. This session will address why simplifying identity management is a strategic step for any modern healthcare system.
Healthcare entities face unique challenges, delivering lifesaving services amidst cybersecurity and supply chain challenges that can result in fatal disruption. Join this panel discussion for first-hand views of how healthcare security leaders are managing:
The FDA in April issued new, detailed draft guidance for the cybersecurity of pre-market medical devices. The document included proposals for how manufacturers should address security risk as part of their submissions for the FDA to give market approval for new products. What is the FDA expecting from manufacturers when it comes to enhancing medical device cybersecurity?
This session will examine:
Enhance your Summit experience by visiting the Sponsors’ Interactive Booths. Chat with Representatives at each Booth, access valuable resources, schedule a demo and more!
Healthcare tends to be a very compliance-minded sector. But healthcare delivery organizations need to adopt a more threat-informed defense approach to securing their entities. For instance, most compliance frameworks will check for the existence of a security control but do nothing to assess or measure the efficacy of the deployed control.
This session will explore:
An update on several important HIPAA rulemaking, regulatory and enforcement efforts in the works at the agency, and an analysis of evolving breach trends
This session will examine:
All content from Day 1 will be available on demand from 9 AM - 5 PM EST on Day 2, Wednesday, July 13. Don’t miss the chance to log-in and consume any content you may not have had the chance to see at your own convenience.
July 12 - 13, 2022
Healthcare Summit