Chief of Cybersecurity, Region 3,
Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Upcoming Summits
Nationwide Virtual Conference
Earn CPE/CEUs with full attendance
Virtual Summit
Fri, October 20, 2023
10:00AM - 3:05PM EDT
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The Second Annual Cyber Security Healthcare and Pharma Summit is a one-of-a-kind conference designed for exclusively invited Healthcare Executives in need of innovative solutions to protect their company’s critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
9:30-10:30 EDT
10:30-10:55 EDT
10:55-11:15 EDT
Join Cisco Advisory CISO Wolfgang Goerlich for a practical discussion on the promises and the realities of zero trust architecture for the enterprise. Past the buzzwords and lofty promises, can zero-trust strategies help build better defenses where the rubber hits the road? In this talk, you’ll learn which types of organizations are most likely to have adopted zero-trust initiatives and how they are handling their legacy systems and assets.
11:15-11:45 EDT
Today, every company (and CISO) is confronting questions about how AI will apply to them and their industries. Whether it means a significant pivot in their operating models, or an opportunity to scale and broaden their offerings, all organizations – especially healthcare – must assess their readiness to deploy AI responsibly without perpetuating harm to patients and the world at large. In this talk, Cindi Carter will share thought-provoking, actionable advice on this topic for all audiences.
11:45-12:35 EDT
As the healthcare industry becomes more technologically connected, the risk of cyber theft also increases. The two types of theft are outside theft and insider misuse.
• Outside theft: Hackers from a location outside of a healthcare organization penetrate patient and medical systems to steal and collect data, mainly for financial gain.
• Insider misuse: Insider misuse often comes in the form of theft of patient data for financial gain or malicious intent. Other types of insider misuse include curiosity (unwarranted access to data not related to delivery of care) and convenience (overriding security protocols to make a job easier). Unintentional actions such as human error, including mistyping information into EHRs or clicking on a phishing email, make up the rest of insider misuse cases.
12:35-1:00 EDT
1:00-1:25 EDT
1:25-1:45 EDT
The US Food and Drug Administration (FDA) has mandated SBOMs for medical devices running any kind of software must create and maintain a Software Bill Of Materials (SBOM) starting on October 1, 2023. It’s now Oct 20th, what have you done to take these steps? Do you know the next steps? Loreli will help you understand SBOMs and get you on the right track.
1:45-2:00 EDT
2:00-2:50 EDT
During a ransomware attack, malware is injected into a network to infect and encrypt sensitive data until a ransom amount is paid. This malicious software is usually injected into a system through a phishing attack. Ransomware attacks are a growing threat amongst healthcare providers according to an analysis last year. More than 1 in 3 healthcare organizations globally fell victim to a ransomware attack in 2022. The reason for its prevalence is that hackers understand how critical it is for the healthcare sector to minimize operation disturbances. During a ransomware attack, healthcare victims panic, fearing the regulatory consequences that follow the theft of patient data.
Bradford Rand
President & Founder
Official Cyber Security Summit
Tamra Durfee
CISO & Founding Member
WiCyS HealthCare Affiliate
Bob West
CSO, Prisma Cloud
Palo Alto Networks
Chelsee Purvis
Cyber Security Expert
Cloudflare
Ryan Braunstein
Security Engineer
Automox
Albert Caballero
Field CISO Americas
SentinelOne
Romanus Prabhu
Head of Global Support
ManageEngine UEM
2:50-3:05 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |