
8:30 am - 9:00 am

Registration & Exhibit Browsing

ISMG’s Virtual Cybersecurity Summit will address the threats and security needs of the healthcare industry. Join more than 250 attendees and subject matter experts from around the world to learn more about telehealth, medical device security, patient privacy and other cybersecurity challenges.
All content will be driven by our global editorial team from publications such as HealthcareInfoSecurity, DataBreachtoday, BankInfoSecurity and GovInfoSecurity. These events will provide the opportunity to learn from industry influencers, earn CPE credits, and virtually meet and interact with leading technology providers.
March 16th & 17th @ 9am
Registering For a Group?
Call + 1 (609)-356-1499
Speaker:
MK Palmore, VP, Field CSO, Palo Alto Networks
What emerging security trends have been exposed in healthcare? What key insights and principles of cybersecurity can be applied to foster resiliency? And, how can you create an adaptive and agile cybersecurity culture to prevent modern threats?
Please join MK Palmore for a keynote discussion that will draw from his experiences and perspective, offering thoughts on challenges and opportunities in securing today’s digital healthcare organizations.
Speaker:
Flavio Aggio, CISO, World Health Organization
COVID-19 Cybersecurity attacks: Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and it is not only about training and awareness. It is about the way users must behave online and the IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.
Speakers:
Jason Lee, Chief Information Security Officer, ZoomRon Emerson, Global Director of Healthcare, Zoom
Join Zoom's Chief Information Security Officer, Jason Lee, and Global Healthcare Lead, Ron Emerson, RN BSN, as they discuss Zoom's security and privacy strategy, best practices for security and privacy, and key applications in healthcare for virtual care.
Speaker:
Pascal Geenens, Director, Threat Intelligence, Radware
Speakers:
Amber Johanson, Vice President Sales Engineering, North America, ForcepointDavid Finkelstein, Information Security Director, St. Luke’s University Health Network
With the global shift of a remote workforce, the walls that maintained order within healthcare organizations have since fallen. Healthcare providers across the globe have had to swiftly adapt and shift their ways of thinking to adopt new cloud security protocols and strategies. Listen to David Finkelstein and Amber Johanson, as they share best practices on how to protect your remote workforce without breaching employee or patient privacy.
In this session we will cover:
Speakers:
Allison Norfleet, Global Healthcare Lead, Industry Solutions Group, CiscoWolf Goerlich, Advisory CISO, Duo Security at Cisco
2020 was a year of rapid adaptation for everyone. Few industries faced the level of complexity inherent to healthcare, with stringent compliance standards and an environment where streamlined security workflows can mean the difference between life and death. We triaged the event, moving rapidly to telemedicine and remote work, focusing on health and safety. We made significant IT changes quickly. As we come into 2021, our attention turns toward recovery. In this session, we’ll cover the efforts to stabilize and mature remote IT services, as well as new demands of vaccine distribution. Many of these shifts are with us for the foreseeable future. Now, we turn towards resilience to handle what's come and prepare for what's next.
Speaker:
Gorka Sadowski, Chief Strategy Officer, Exabeam
89% of healthcare organizations experienced a data breach in the past two years. Many of these organizations have been struggling with failed security implementations because they still lack the specialized expertise, detection logic, and clearly mapped investigation and response workflows for the most common external and insider threats that lead to these breaches. Consequently, too many healthcare organizations have wasted precious time and resources customizing products with minimal improvement to their security coverage. So the breaches continue unencumbered. In this session, former Gartner analyst and now Exabeam Chief Strategy Officer Gorka Sadowski will discuss what he’s learned about successful vs. unsuccessful outcomes after talking to hundreds of CISOs and security analysts over many years, across healthcare and other industries. He will explain why it is critical at this time for healthcare Security Operations (SecOps) to become more use case-driven and workflow orientated. And how these approaches will drive far more successful outcomes that prevent breaches that continue to plague the industry.
Speaker:
Dave Lewis, Global Advisory CISO, Duo Security at Cisco
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Organizations should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person.
Speaker:
Thom Langford, former CISO, founder, (TL)2
The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity it is small wonder that a CISO’s role has become more complex. This leads to the inevitability of a security incident where the complex environments and inventive attacks collide.
In this presentation, Thom Langford, Security Advocate, SentinelOne, looks at three fundamentals:
Speaker:
Jason Mitchell, Senior Vice President, Engineering, Centrify
The move to remote work and a saturated digital environment has prompted many organizations to migrate to the cloud. Experts agree that the top priority for cloud migration should be data security and privacy. However, recent studies discovered that 70% of organizations experienced a public cloud security incident in the last year—including malware, exposed data, and compromised accounts. With 80% of organizations predicted to migrate toward cloud, hosting, and colocation services by 2025, new attack surfaces may arise and create greater security vulnerabilities.
To fully benefit from rapid technological transformation, it is imperative that enterprises embrace strategies for safeguarding their infrastructure both during and after cloud migration. In this session we will discuss the tools and strategies IT and security leaders are finding most effective for managing a secure transformation to the cloud.
Speaker:
Omar Khawaja, CISO, Highmark Health
Omar Khawaja, CISO of Highmark Health, describes his organization’s journey to enhance its security program while serving the needs of the business and providing internal customers with ease-of-use.
In this exclusive interview Khawaja will discuss:
Speakers:
Dr. Suzanne Schwartz, MD, Director, Office of Strategic Partnerships and Technology Innovation (OST) at FDA’s Center for Devices & Radiological Health (CDRH)Mitch Parker, CISO, Indiana University Health SystemRob Suárez, VP, CISO, BD (Becton, Dickinson and Company)
What’s the status of FDA’s latest guidance and other efforts to help strengthen the cybersecurity of medical devices – especially amid the surge in COVID-19 remote patient monitoring and shortages of certain critical medical equipment? How are medical device makers implementing better security controls and best practices, and what are healthcare delivery organizations doing to keep their patients and data safe from the latest threats facing devices? Our panel will discuss these issues, plus:
Speaker:
Sharat Chander, Director of Java Product Management, Oracle
Speaker:
Stephen Gates, Security Evangelist and Senior Solutions Specialist, Checkmarx
Today’s modern applications depend on of a substantial amount of open source components and third-party libraries. Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, many don’t effectively track or manage open source throughout their entire code base and cannot consistently address the widening hazards they face. As a result, organizations desire automated, repeatable processes for open source usage, risk management, and vulnerability remediation that fit within modern development environments.
In this session, attendees will hear recommendations from Stephen Gates, Checkmarx SME on how to effectively implement an approach to:
Speakers:
Christopher Hertz, VP of Sales for Cloud Solutions, Rapid7Thomas Martin, Founder, NephōSec and Former CIO at GE
When it comes to the security and compliance of your enterprise cloud, healthcare and life sciences organizations must have an integrated, automated, enterprise-wide, multi-cloud approach to ensure regulatory compliance and complete data protection. Join Thomas Martin, Founder at NephōSec and former CIO at GE, along with Chris Hertz, Vice President Cloud Security Sales at DivvyCloud by Rapid7, for a review of the latest global trends in cloud risk for healthcare and how to achieve continuous full life cycle security and compliance for multi-cloud environments.
Speakers:
Marty Momdjian, Healthcare Solutions Advisor, Sirius HealthcareMatthew Radcliffe, AVP, Healthcare, Sailpoint
Due to COVID-19, healthcare continues to face unprecedented challenges. With the rapid movement of clinical staff and provisioning a larger number of contingent workers, healthcare organizations are facing increased cybersecurity threats. The pandemic put a magnifying glass on identity security. First, it highlighted vulnerabilities in identity governance policies and procedures, specifically how to secure and maintain applications, platforms, and infrastructures for remote workers. Secondly, automated identity solutions with AI and ML can better address micro and macro-operational changes to improve efficiencies within or outside of the four walls.
Join Matthew Radcliffe, AVP of Healthcare for SailPoint, and Marty Momdjian, Healthcare Solutions Advisor at Sirius Healthcare, for a thoughtful discussion on the strategic approach healthcare organizations should consider to improve cybersecurity and drive compliance.
Speaker:
Ed Jackowiak, President, CyGlass
In this presentation, CyGlass CEO Ed Jackowiak will look at the unique challenges faced by small security and IT teams at healthcare organizations. Ed will then detail why gaining visibility to your network and the risks and threats hidden within is the most cost-effective approach to mitigating the threats you will face in 2021 and beyond. He will then describe how a new generation of SaaS technologies offers small teams operationally effective enterprise-class cyber defense capabilities at a fraction of the cost.
Speaker:
Ed Gaudet, CEO and Founder, Censinet
Today, cybersecurity risk is siloed throughout a health system with disparate data across different teams using manual processes and non-integrated tools. This approach clearly isn't working. To significantly reduce the occurrence of risks or the impact of an incident, it's time that we, as health system leaders and practitioners, start integrating and operationalizing risk across the enterprise. Only by consolidating risk into a single unified, operational view can we then manage, control, and remediate it, limiting our organization's cybersecurity exposure and protecting those we serve.
Speakers:
Anahi Santiago, CISO, Christiana Care Health SystemMartin Littmann, CTO and CISO, Kelsey-Seybold ClinicMatthew Hickey, Director of Sales Engineering, Sophos
Not only are cybercriminals installing ransomware to encrypt data and freeze up systems, some attacks have evolved with the exfiltration of sensitive patient data and double extortion schemes. In some cases, backup systems are being hit as well, hampering recovery efforts from these attacks. But what are the critical steps and latest strategies that healthcare sector entities can take to prevent falling victim to these highly disruptive and dangerous attacks, especially as they escalate during the COVID-19 pandemic?
Speakers:
Jim Angle, Product Manager for IT service - Information Security, Trinity HealthJohn Houston, Esq Vice President, Information Security and Privacy; Associate Counsel, UPMCMartyn Crew, Director of Solutions Marketing, Gigamon
The delivery of healthcare services using telehealth and remote medicine capabilities has soared during the COVID-19 crisis, and this is not a temporary phenomenon: telemedicine is here to stay. Not only is telemedicine here to stay, it will undoubtedly expand as healthcare organizations move to scalable hybrid cloud architectures and 5G massively increases mobile bandwidth.
But what are the emerging operational and security challenges associated with these changes? Our panel of experts will examine issues including:
Speakers:
Michael McNeil, CISO, MckessonStephen Dunkle, CISO, Geisinger Health
After the SolarWinds attack, how can an entity ever trust that any vendor’s security incident won’t become their own next crisis? Healthcare sector entities in particular deal with a complex digital supply chain that range from critical IT vendors to suppliers of life-saving network-connected patient gear, and all the other players – known and maybe unknown – in-between. Our panel will discuss:
Speakers:
Malikah Smith, TK, HHS Office of the National Coordinator for Health ITNicholas Heesters, Senior Advisor for Cybersecurity, HHS OCRVimala Devassy, Regulatory Attorney, Partner, BakerHostetler
HHS OCR issued a record number of HIPAA settlements in 2020 in cases involving patient “right of access” violations. Meanwhile, compliance with HHS’ health IT interoperability and information blocking regulations – which include provisions for providing patients secure access to their health information via smartphones and standards-based APIs – come due in April. What are the challenges involved in providing patients timely, secure access to their health information? Our panel will discuss:
Speakers:
Jacki Monson, CISO, Sutter HealthJoshua Corman, Senior adviser to the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS CISA)
Segments of healthcare sector cybersecurity have been rocky for a while, despite incremental improvements in the wake of a HHS cyber task report making key recommendations. But how has the pandemic further stressed and strained healthcare cybersecurity – and what seams and cracks are now widening? What needs to be fixed STAT, before system outages and compromises turn deadly?
Our panelists will discuss:
Speaker:
Cris Ewell, CISO, UW Medicine
Washington State was the first U.S. epicenter of the COVID-19 pandemic, and as CISO of UW Medicine Cris Ewell was supporting the first responders. How is his security organization most different today than it was a year ago? Hear his approach to:
Speaker:
Meredith Harper, VP, CISO, Eli Lilly and Company
Has there ever been a more challenging time to be CISO of a major global pharmaceutical enterprise? Meredith Harper, VP and CISO of Eli Lilly and Company, discusses how the organization has responded to COVID-19 and the new workplace. She also shares plans for:
Speaker:
MK Palmore, VP, Field CSO, Palo Alto Networks
What emerging security trends have been exposed in healthcare? What key insights and principles of cybersecurity can be applied to foster resiliency? And, how can you create an adaptive and agile cybersecurity culture to prevent modern threats?
Please join MK Palmore for a keynote discussion that will draw from his experiences and perspective, offering thoughts on challenges and opportunities in securing today’s digital healthcare organizations.
Speaker:
Flavio Aggio, CISO, World Health Organization
COVID-19 Cybersecurity attacks: Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and it is not only about training and awareness. It is about the way users must behave online and the IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.
Speakers:
Jason Lee, Chief Information Security Officer, ZoomRon Emerson, Global Director of Healthcare, Zoom
Join Zoom's Chief Information Security Officer, Jason Lee, and Global Healthcare Lead, Ron Emerson, RN BSN, as they discuss Zoom's security and privacy strategy, best practices for security and privacy, and key applications in healthcare for virtual care.
Speaker:
Pascal Geenens, Director, Threat Intelligence, Radware
Speakers:
Amber Johanson, Vice President Sales Engineering, North America, ForcepointDavid Finkelstein, Information Security Director, St. Luke’s University Health Network
With the global shift of a remote workforce, the walls that maintained order within healthcare organizations have since fallen. Healthcare providers across the globe have had to swiftly adapt and shift their ways of thinking to adopt new cloud security protocols and strategies. Listen to David Finkelstein and Amber Johanson, as they share best practices on how to protect your remote workforce without breaching employee or patient privacy.
In this session we will cover:
Speakers:
Allison Norfleet, Global Healthcare Lead, Industry Solutions Group, CiscoWolf Goerlich, Advisory CISO, Duo Security at Cisco
2020 was a year of rapid adaptation for everyone. Few industries faced the level of complexity inherent to healthcare, with stringent compliance standards and an environment where streamlined security workflows can mean the difference between life and death. We triaged the event, moving rapidly to telemedicine and remote work, focusing on health and safety. We made significant IT changes quickly. As we come into 2021, our attention turns toward recovery. In this session, we’ll cover the efforts to stabilize and mature remote IT services, as well as new demands of vaccine distribution. Many of these shifts are with us for the foreseeable future. Now, we turn towards resilience to handle what's come and prepare for what's next.
Speaker:
Gorka Sadowski, Chief Strategy Officer, Exabeam
89% of healthcare organizations experienced a data breach in the past two years. Many of these organizations have been struggling with failed security implementations because they still lack the specialized expertise, detection logic, and clearly mapped investigation and response workflows for the most common external and insider threats that lead to these breaches. Consequently, too many healthcare organizations have wasted precious time and resources customizing products with minimal improvement to their security coverage. So the breaches continue unencumbered. In this session, former Gartner analyst and now Exabeam Chief Strategy Officer Gorka Sadowski will discuss what he’s learned about successful vs. unsuccessful outcomes after talking to hundreds of CISOs and security analysts over many years, across healthcare and other industries. He will explain why it is critical at this time for healthcare Security Operations (SecOps) to become more use case-driven and workflow orientated. And how these approaches will drive far more successful outcomes that prevent breaches that continue to plague the industry.
Speaker:
Dave Lewis, Global Advisory CISO, Duo Security at Cisco
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Organizations should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person.
Speaker:
Thom Langford, former CISO, founder, (TL)2
The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity it is small wonder that a CISO’s role has become more complex. This leads to the inevitability of a security incident where the complex environments and inventive attacks collide.
In this presentation, Thom Langford, Security Advocate, SentinelOne, looks at three fundamentals:
Speaker:
Jason Mitchell, Senior Vice President, Engineering, Centrify
The move to remote work and a saturated digital environment has prompted many organizations to migrate to the cloud. Experts agree that the top priority for cloud migration should be data security and privacy. However, recent studies discovered that 70% of organizations experienced a public cloud security incident in the last year—including malware, exposed data, and compromised accounts. With 80% of organizations predicted to migrate toward cloud, hosting, and colocation services by 2025, new attack surfaces may arise and create greater security vulnerabilities.
To fully benefit from rapid technological transformation, it is imperative that enterprises embrace strategies for safeguarding their infrastructure both during and after cloud migration. In this session we will discuss the tools and strategies IT and security leaders are finding most effective for managing a secure transformation to the cloud.
Speakers:
Dr. Suzanne Schwartz, MD, Director, Office of Strategic Partnerships and Technology Innovation (OST) at FDA’s Center for Devices & Radiological Health (CDRH)Mitch Parker, CISO, Indiana University Health SystemRob Suárez, VP, CISO, BD (Becton, Dickinson and Company)
What’s the status of FDA’s latest guidance and other efforts to help strengthen the cybersecurity of medical devices – especially amid the surge in COVID-19 remote patient monitoring and shortages of certain critical medical equipment? How are medical device makers implementing better security controls and best practices, and what are healthcare delivery organizations doing to keep their patients and data safe from the latest threats facing devices? Our panel will discuss these issues, plus:
Speaker:
Sharat Chander, Director of Java Product Management, Oracle
Speaker:
Stephen Gates, Security Evangelist and Senior Solutions Specialist, Checkmarx
Today’s modern applications depend on of a substantial amount of open source components and third-party libraries. Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, many don’t effectively track or manage open source throughout their entire code base and cannot consistently address the widening hazards they face. As a result, organizations desire automated, repeatable processes for open source usage, risk management, and vulnerability remediation that fit within modern development environments.
In this session, attendees will hear recommendations from Stephen Gates, Checkmarx SME on how to effectively implement an approach to:
Speaker:
Ed Jackowiak, President, CyGlass
In this presentation, CyGlass CEO Ed Jackowiak will look at the unique challenges faced by small security and IT teams at healthcare organizations. Ed will then detail why gaining visibility to your network and the risks and threats hidden within is the most cost-effective approach to mitigating the threats you will face in 2021 and beyond. He will then describe how a new generation of SaaS technologies offers small teams operationally effective enterprise-class cyber defense capabilities at a fraction of the cost.
Speaker:
Ed Gaudet, CEO and Founder, Censinet
Today, cybersecurity risk is siloed throughout a health system with disparate data across different teams using manual processes and non-integrated tools. This approach clearly isn't working. To significantly reduce the occurrence of risks or the impact of an incident, it's time that we, as health system leaders and practitioners, start integrating and operationalizing risk across the enterprise. Only by consolidating risk into a single unified, operational view can we then manage, control, and remediate it, limiting our organization's cybersecurity exposure and protecting those we serve.
Speakers:
Jim Angle, Product Manager for IT service - Information Security, Trinity HealthJohn Houston, Esq Vice President, Information Security and Privacy; Associate Counsel, UPMCMartyn Crew, Director of Solutions Marketing, Gigamon
The delivery of healthcare services using telehealth and remote medicine capabilities has soared during the COVID-19 crisis, and this is not a temporary phenomenon: telemedicine is here to stay. Not only is telemedicine here to stay, it will undoubtedly expand as healthcare organizations move to scalable hybrid cloud architectures and 5G massively increases mobile bandwidth.
But what are the emerging operational and security challenges associated with these changes? Our panel of experts will examine issues including:
Speakers:
Michael McNeil, CISO, MckessonStephen Dunkle, CISO, Geisinger Health
After the SolarWinds attack, how can an entity ever trust that any vendor’s security incident won’t become their own next crisis? Healthcare sector entities in particular deal with a complex digital supply chain that range from critical IT vendors to suppliers of life-saving network-connected patient gear, and all the other players – known and maybe unknown – in-between. Our panel will discuss:
Speakers:
Malikah Smith, TK, HHS Office of the National Coordinator for Health ITNicholas Heesters, Senior Advisor for Cybersecurity, HHS OCRVimala Devassy, Regulatory Attorney, Partner, BakerHostetler
HHS OCR issued a record number of HIPAA settlements in 2020 in cases involving patient “right of access” violations. Meanwhile, compliance with HHS’ health IT interoperability and information blocking regulations – which include provisions for providing patients secure access to their health information via smartphones and standards-based APIs – come due in April. What are the challenges involved in providing patients timely, secure access to their health information? Our panel will discuss:
Speakers:
Jacki Monson, CISO, Sutter HealthJoshua Corman, Senior adviser to the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS CISA)
Segments of healthcare sector cybersecurity have been rocky for a while, despite incremental improvements in the wake of a HHS cyber task report making key recommendations. But how has the pandemic further stressed and strained healthcare cybersecurity – and what seams and cracks are now widening? What needs to be fixed STAT, before system outages and compromises turn deadly?
Our panelists will discuss:
Speaker:
Cris Ewell, CISO, UW Medicine
Washington State was the first U.S. epicenter of the COVID-19 pandemic, and as CISO of UW Medicine Cris Ewell was supporting the first responders. How is his security organization most different today than it was a year ago? Hear his approach to:
Speaker:
Meredith Harper, VP, CISO, Eli Lilly and Company
Has there ever been a more challenging time to be CISO of a major global pharmaceutical enterprise? Meredith Harper, VP and CISO of Eli Lilly and Company, discusses how the organization has responded to COVID-19 and the new workplace. She also shares plans for:
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismgcorp.com