CMIO,
U.S. Veterans Affairs
Upcoming Summits
Cybersecurity Summit
6 CPE/CEUs with full attendance
Virtual Summit
Thu, June 13, 2024
9:00AM - 4:00PM EDT
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 225
The Healthcare & Pharma Cybersecurity Summit is a one-of-a-kind conference designed for exclusively invited Executives in need of innovative solutions to protect their company’s critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) stands as a cornerstone of data privacy legislation in the United States. Its primary aim is to safeguard health information through stringent security requirements. HIPAA’s significance has grown significantly, particularly amidst the surge in cyberattacks targeting healthcare providers. Consequently, it has emerged as a pivotal framework for healthcare cybersecurity. To realize its goals, the Department of Health and Human Services has issued both the HIPAA Privacy Rule and the HIPAA Security Rule. These rules establish nationwide standards for protecting electronic health information (e-PHI), outlining technical and non-technical safeguards that covered entities must implement to secure such data.
Phishing & Ransomware Attacks
Phishing represents the foremost cybersecurity threat facing the healthcare sector. It involves the dissemination of seemingly harmless emails containing malicious links. Email phishing is the most common form, wherein these messages often exploit familiar medical concerns to lure recipients into clicking on the provided links.
In a ransomware attack, malware infiltrates a network, encrypting sensitive data until a ransom is paid. Typically initiated through phishing, this malicious software capitalizes on hackers’ awareness of healthcare’s imperative to maintain uninterrupted operations. Consequently, during ransomware incidents, healthcare organizations often experience panic as they grapple with the potential regulatory fallout from compromised patient data.
Digital Workplace Security
Ensuring security in the digital workplace is multifaceted. It involves the constant safeguarding, governance, and protection of sensitive patient data while ensuring swift access for relevant staff during emergencies. Balancing these contrasting needs necessitates the implementation of various processes and technologies to establish a secure yet accessible system. The growing prevalence of mobile device usage, flexible work arrangements, and interconnected medical devices further underscores the significance of robust digital workplace security measures. Key technologies enabling this include single sign-on, web access management, digital signatures, endpoint detection and response, and network access control.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
9:00-10:00 EDT
10:00-10:30 EDT
10:30-10:55 EDT
Learn about the intricacies of identity based cyber threats, exploring real-world examples and illustrating the potential consequences for businesses. From phishing attacks to credential stuffing and insider threats, we’ll provide a comprehensive overview of the evolving threat landscape including top tips on how to protect identities.
10:55-11:25 EDT
11:25-11:50 EDT
Amid rapid-pace advancements in medicine and technology, healthcare organizations are confronted with pivotal decisions regarding AI integration. In this session, Cindi Carter, Global CISO-Americas will address the crucial considerations for the application of AI in healthcare and its potential to enhance health outcomes, secure patient data, as well as opportunities to improve operating efficiencies. Learning objectives:
– How our relationship with technology and healthcare has evolved, and how new relationships are being created with the advent of Generative AI
– Tips that showcase the tangible benefits for healthcare, including workforce scalability and development
– A practical checklist for maximizing AI value for optimal outcomes
11:50-12:15 EDT
Application security professionals are struggling. The transition to agile, DevOps, cloud, and the growing use of AI is empowering distributed development teams to build software with greater speed and autonomy. In contrast to the remarkable strides in development methodologies, AppSec teams are still playing catchup, both outnumbered and out-resourced. Given all these challenges, is it truly possible to “master” AppSec?
In this session, we will review the foundations of AppSec program building and key concepts. We will also introduce ASPM (Application Security Posture Management) its core principles, and how AppSec practitioners and leaders can apply them in order to build, manage and scale a risk-based AppSec program.
You’ll see first-hand how the application security posture management (ASPM) functionality of Snyk AppRisk, enables AppSec teams to discover, cover, and prioritize application assets in order to get the fix with the most business risk.
12:15-12:45 EDT
12:45-1:15 EDT
1:15-1:50 EDT
1:50-2:15 EDT
In an era where healthcare is increasingly reliant on digital technologies, safeguarding patient data has never been more critical. This webinar will explore the unique cybersecurity challenges faced by the healthcare sector and provide actionable strategies for mitigating risks. Chris Lockery, Vice President, Chief Information Security Officer, and Head of Infrastructure Services at Help at Home, will share his insights on the latest threats, best practices for protecting sensitive information, and how to create a robust cybersecurity framework. Attendees will learn about the importance of risk management, the role of advanced threat detection, and the necessity of fostering a culture of security within healthcare organizations. Whether you are a cybersecurity professional, healthcare executive, or IT specialist, this webinar will equip you with the knowledge to enhance your organization’s defenses against cyber threats. Join us to ensure that your healthcare organization remains a secure and trusted environment for patient care.
2:15-2:35 EDT
Due to the explosion of Generative AI, much has been discussed about the potential of AI for cybersecurity. However, for many Security Leaders and practitioners, it remains unclear how the implementation of automation and AI can solve the problems faced by the Security Operations Teams. This talk will delve into the specific examples of AI and automation for SOC teams.
2:35-2:55 EDT
2:55-3:25 EDT
Agenda:
· Cybersecurity – Industry Trends and Common Threats
· How AI-driven services enhance proactive cybersecurity
· Insights into cutting-edge AI tools and technologies for cybersecurity.
· Security Best practices and recommendations
· Real-world scenarios
· Demo
3:25-4:00 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |