VP of Cyber Risk and Compliance,
Darktrace
Upcoming Summits
For Executives in the Western Half of the U.S.
8 CPE/CEUs with full attendance
Virtual Summit
Thu, September 29, 2022
8:30AM - 5:00PM PDT
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The Cyber Security Healthcare and Pharma Summit is a one-of-a-kind conference designed for exclusively invited Healthcare Executives in need of innovative solutions to protect their company's critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry's most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Evolving Cyber and Privacy Risks in a COVID-19 World
• How COVID-19 has shifted the cyber threat landscape
• The compliance risks that come into play as organizations adapt their systems and processes to meet needs during the pandemic
• Privacy as a partner, instead of prevention
The Healthcare & Pharma Breach: Who’s the more prominent target, the patient or the company?
• Who are the VAPs (very attacked people), and why are they being targeted?
• Top insider threat risks Healthcare organizations face in 2022
• Analysis of the Top Healthcare Breaches of 2021
• State-specific Privacy Rules, GDPR, and proposed changes to the Privacy Rule – How will this affect the landscape of future breaches?
Ransomware: Its Climbing Impact on Healthcare Organizations
• The state of ransomware today: some of the latest cyber threats and cybercriminals’ changing tactics
• How to identify warning signs and attackers leave trails
• Creating a well-run security operations center for healthcare systems and data to protect from ransomware
Learn
Our conferences have been rated as one of The Top 5 InfoSec Conferences Worldwide for the last 4 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
9:10-9:40 PDT
9:40-10:25 PDT
There’s no lack of sensationalist headlines within cybersecurity, not to mention within healthcare. The latest hair-raising headlines making the rounds of both trades are on the topic of “killware,” malware that’s intended to directly cause harm and take lives. At this point, the media attention seems to be driven more by hysteria than reality. However, the root cause of the concern has merit. Cybersecurity within healthcare is of genuine concern and poses significant risk to patients if current trends continue. In this presentation, VP of Security Response Services at ExtraHop and former healthcare CISO, Mark Bowling, will share four of the greatest forces compromising the cybersecurity of the healthcare sector, as well as strategies to combat them.
10:25-10:45 PDT
10:45-11:10 PDT
67% of healthcare organizations have experienced significant security incidents in the past twelve months.1 This rise in cyberattacks combined with NIST’s first updated guidance on healthcare cybersecurity in over a decade means you need to take action. Unfortunately, the conversation we’ve been having around cyber risk is the wrong one. The right conversation is centered on business priorities and the company’s appetite for risk so informed investment choices can be made to defensibly protect your company as it operates, grows and expands.
Join us to discuss how to shift from “how” you protect to “how well” you protect, implement best practices for risk assessment and mitigation and how to deliver better outcomes with less effort.
By attending this session you will learn:
Why “how” you protect must shift to “how well” you protect
How to tie align InfoSec activities to business priorities
New approaches for reducing cyber risk across life sciences and healthcare
Why automation is the way to deliver better outcomes with less effort
11:10-11:30 PDT
Ransomware has dominated cybersecurity news reports for several years now, but it’s not the only threat organizations are facing today. More and more, organizations are adopting new technologies and services while still needing to maintain existing infrastructure, systems, devices and applications. With growing complexity comes an ever-increasing challenge to understand where we are most at risk and determine how best to mitigate it.
In this discussion, we’ll look at what the growing attack surface looks like for many healthcare and pharma organizations and provide strategies for adapting your security program to better understand where vulnerabilities exist across all the various types of assets in your environment and how to mitigate them before the next cyberthreat comes along.
11:30-12:15 PDT
This panel will discuss:
12:15-12:35 PDT
Digital transformation in the Healthcare industry is causing an explosion of hyper-connected IT, IoT and IoMT devices and, with it, a greatly expanded cyber-attack surface. With constant transformation and the explosion of interconnected devices, how do you even begin to plan for a zero trust architecture beyond the managed users and workstations?
In this session you will learn:
12:35-12:55 PDT
12:55-1:45 PDT
This panel will discuss:
1:45-2:00 PDT
2:00-2:20 PDT
2:20-2:40 PDT
As pharmaceutical companies increasingly digitize data and store it online, they become more susceptible to pharmaceutical cyberattacks. While the industry
is comprised of a number of sub-industries with different business models and technology needs, they all must control extremely sensitive and valuable information and ensure an effective security framework. Drug and device manufacturers and biotech companies retain proprietary data ranging from secret formulas for patented drugs, to patient and customer information, to scientific research and advancements.
The industry is being attacked by adversaries adept at exploiting vulnerabilities and carrying out disruptive cyber campaigns. Cyber threats are used by a variety of bad actors with a range of intended system consequences. These attackers are better resourced and more capable of accomplishing disruption than ever before. In addition to hackers seeking financial gain, pharma companies also have to worry about the full capabilities of nation-states or other pharmaceutical companies with state sponsorship.
Consequences of a successful breach are dire and may include contaminated drugs, stolen intellectual property (IP), needing to repeat clinical trials, damaged reputation, downtime, litigation, and lost revenue.
In this session, we will explore the top threats and challenges pharmaceutical companies must overcome when securing their networks, and what’s driving them.
2:40-3:30 PDT
This panel will discuss:
3:30-3:50 PDT
The last few years have brought significant change to how we work. The Pandemic forced many people to work from home or remote locations, cyber-attacks continue to become more aggressive and Russia’s invasion of Ukraine has spawned additional cyber risks. Companies continue to move to the cloud and are making robust investments in applications and infrastructure. This session will address the ever-changing technology and business climate and suggest how to protect organizations in this challenging environment.
3:50-4:15 PDT
4:15-4:50 PDT
The year 2021 was a challenging one for cybersecurity, with several high-profile compromises that impacted even large and well-protected healthcare organizations. The presentation will cover nation state, cybercrime, and other cyberthreats including hacktivism facing today’s healthcare organizations.
Attendees will be provided a copy of the Health-ISAC Annual Cyber Threat Landscape Report, which can be leveraged to influence cybersecurity budget and investment decisions for senior leaders and IT/security practitioners in the healthcare sector. The presentation will conclude with basic recommendations and offer additional resources attendees can use including the full threat landscape report.
Learning Objectives:
Learn about the top cyberthreats facing the healthcare sector.
Leverage the threat landscape report to influence cybersecurity budget and investment decisions.
Discover practical steps and resources that attendees can use to improve the cybersecurity posture of their own personal profile and business environments.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |