ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Healthcare

March 16-17, 2021

Register Now

WELCOME / Summit Overview

ISMG’s Virtual Cybersecurity Summit will address the threats and security needs of the healthcare industry. Join more than 250 attendees and subject matter experts from around the world to learn more about telehealth, medical device security, patient privacy and other cybersecurity challenges.

All content will be driven by our global editorial team from publications such as HealthcareInfoSecurity, DataBreachtoday, BankInfoSecurity and GovInfoSecurity. These events will provide the opportunity to learn from industry influencers, earn CPE credits, and virtually meet and interact with leading technology providers.

Details

Free Registration

March 16th & 17th @ 9am

Register

Registering For a Group?
Call + 1 (609)-356-1499

   Members of the ISMG Community

  • Event Gallery

Thien La

CISO, Wellmark Blue Cross Blue Shield

Tom Field

SVP - Editorial, ISMG

Jennings Aske

CISO, New York Presbyterian

Dr. Suzanne Schwartz

Director, Office of Strategic Partnerships & Technology Innovation (Acting), FDA Center for Devices and Radiological Health

Cris Ewell

CISO, UW Medicine

Marianne McGee

Managing Editor, Healthcareinfosecurity.com, ISMG

Sonia Arista

National Healthcare Practice Director, Fortinet

Mitch Parker

CISO, Indiana University Health System

Speakers / Featured Healthcare Speakers

Flavio Aggio

CISO, World Health Organization

Dave Lewis

Global Advisory CISO, Duo Security at Cisco

Thom Langford

Security Advocate, SentinelOne

Martyn Crew

Director of Solutions Marketing, Gigamon

Matthew Hickey

Director of Sales Engineering, Sophos

John Houston

Esq Vice President, Information Security and Privacy; Associate Counsel, UPMC, University of Pittsburgh Medical Center

Stephen Dunkle

CISO, Geisinger Health

Michael McNeil

CISO, Mckesson

Nicholas Heesters

Senior Advisor for Cybersecurity, HHS OCR

Jim Angle

Product Manager for IT service - Information Security, Trinity Health

Meredith Harper

VP, CISO, Eli Lilly and Company

Omar Khawaja

CISO, Highmark Health

Anahi Santiago

CISO, Christiana Care

Christopher Hertz

VP of Sales for Cloud Solutions, Rapid7

Martin Littmann

CTO and CISO, Kelsey-Seybold Clinic

Matthew Radcliffe

AVP, Healthcare, Sailpoint

Wolf Goerlich

Advisory CISO, Duo Security at Cisco

Allison Norfleet

Global Healthcare Lead, Industry Solutions Group, Cisco

Rob Suárez

VP, CISO, BD (Becton, Dickinson and Company)

Mitch Parker

CISO, Indiana University Health System

Dr. Suzanne Schwartz, MD

Director, Office of Strategic Partnerships and Technology Innovation (OST) at FDA’s Center for Devices & Radiological Health (CDRH)

Ron Emerson

Global Director of Healthcare, Zoom

Jason Mitchell

Senior Vice President, Engineering, Centrify

MK Palmore

VP, Field CSO, Palo Alto Networks

Joshua Corman

Senior adviser to the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS CISA)

Jacki Monson

CISO, Sutter Health

Marty Momdjian

Healthcare Solutions Advisor, Sirius Healthcare

Thomas Martin

Founder, NephōSec and Former CIO at GE

Ed Jackowiak

President, CyGlass

Jason Lee

Chief Information Security Officer, Zoom

Gorka Sadowski

Chief Strategy Officer, Exabeam

Cris Ewell

CISO, UW Medicine

Ed Gaudet

CEO and Founder, Censinet

Malikah Smith

TK, HHS Office of the National Coordinator for Health IT

Vimala Devassy

Regulatory Attorney, Partner, BakerHostetler

Stephen Gates

Security Evangelist and Senior Solutions Specialist, Checkmarx

Amber Johanson

Vice President Sales Engineering, North America, Forcepoint

David Finkelstein

Information Security Director, St. Luke’s University Health Network

Draft Agenda / Session Date & Times EST



  • Tuesday, March 16th

  • Wednesday, March 17th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:30 am
9:00 am - 9:30 am

Securing the Technology Transformation of Healthcare

Speaker:
MK Palmore, VP, Field CSO, Palo Alto Networks

What emerging security trends have been exposed in healthcare? What key insights and principles of cybersecurity can be applied to foster resiliency? And, how can you create an adaptive and agile cybersecurity culture to prevent modern threats?

Please join MK Palmore for a keynote discussion that will draw from his experiences and perspective, offering thoughts on challenges and opportunities in securing today’s digital healthcare organizations.

9:30 am -
10:00 am
9:30 am - 10:00 am

Addressing Cyber Attacks During a Global Pandemic

Speaker:
Flavio Aggio, CISO, World Health Organization

COVID-19 Cybersecurity attacks: Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and it is not only about training and awareness. It is about the way users must behave online and the IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.

10:00 am -
10:30 am
10:00 am - 10:30 am Track A

Zoom in Healthcare... Security and Key Applications

Speakers:
Jason Lee, Chief Information Security Officer, Zoom
Ron Emerson, Global Director of Healthcare, Zoom

Join Zoom's Chief Information Security Officer, Jason Lee, and Global Healthcare Lead, Ron Emerson, RN BSN, as they discuss Zoom's security and privacy strategy, best practices for security and privacy, and key applications in healthcare for virtual care.

10:00 am - 10:30 am Track B

Network and Application Threat Landscape

Speaker:
Pascal Geenens, Director, Threat Intelligence, Radware

Lessons learned from the past will help us secure the future. As the world is migrating their applications to new hemispheres and the weight of internet is becoming dominant in their business practices, bad actors are smelling the new opportunities and new attack vectors are forming as a dark storm cloud menacing the opportunities of digitalization. Join this session to learn about the threats to your businesses, understand who are the actors behind the threats and what are the tools they have at their disposal to disrupt your business. As you moved to remote work and accelerated your digitalization journey, a clear understanding of the threats helps you to better assess the risk and find the right balance to secure your assets and resources.
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

Protecting Your Remote Healthcare Workforce Without Breaching Employee or Patient Privacy

Speakers:
Amber Johanson, Vice President Sales Engineering, North America, Forcepoint
David Finkelstein, Information Security Director, St. Luke’s University Health Network

With the global shift of a remote workforce, the walls that maintained order within healthcare organizations have since fallen. Healthcare providers across the globe have had to swiftly adapt and shift their ways of thinking to adopt new cloud security protocols and strategies. Listen to David Finkelstein and Amber Johanson, as they share best practices on how to protect your remote workforce without breaching employee or patient privacy.

In this session we will cover:

  • Best practices around protecting your remote workforce without breaching employee or patient privacy.
  • How COVID19 forced healthcare security officers to accept more risk in order to enable remote workers.
  • How to ensure centralized data security policies across various channels: endpoint, network, and the cloud.
10:30 am - 11:00 am Track B

Post-Pandemic Tension Headache: Finding Relief

Speakers:
Allison Norfleet, Global Healthcare Lead, Industry Solutions Group, Cisco
Wolf Goerlich, Advisory CISO, Duo Security at Cisco

2020 was a year of rapid adaptation for everyone. Few industries faced the level of complexity inherent to healthcare, with stringent compliance standards and an environment where streamlined security workflows can mean the difference between life and death. We triaged the event, moving rapidly to telemedicine and remote work, focusing on health and safety. We made significant IT changes quickly. As we come into 2021, our attention turns toward recovery. In this session, we’ll cover the efforts to stabilize and mature remote IT services, as well as new demands of vaccine distribution. Many of these shifts are with us for the foreseeable future. Now, we turn towards resilience to handle what's come and prepare for what's next.

10:30 am - 11:00 am Track C

Successful Outcome-based Security Is Use Case-Driven and Workflow Oriented

Speaker:
Gorka Sadowski, Chief Strategy Officer, Exabeam

89% of healthcare organizations experienced a data breach in the past two years. Many of these organizations have been struggling with failed security implementations because they still lack the specialized expertise, detection logic, and clearly mapped investigation and response workflows for the most common external and insider threats that lead to these breaches. Consequently, too many healthcare organizations have wasted precious time and resources customizing products with minimal improvement to their security coverage. So the breaches continue unencumbered. In this session, former Gartner analyst and now Exabeam Chief Strategy Officer Gorka Sadowski will discuss what he’s learned about successful vs. unsuccessful outcomes after talking to hundreds of CISOs and security analysts over many years, across healthcare and other industries. He will explain why it is critical at this time for healthcare Security Operations (SecOps) to become more use case-driven and workflow orientated. And how these approaches will drive far more successful outcomes that prevent breaches that continue to plague the industry.

11:00 am -
11:15 am
11:00 am - 11:15 am Track A

Security Debt, Running with Scissors

Speaker:
Dave Lewis, Global Advisory CISO, Duo Security at Cisco

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Organizations should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person.

11:00 am - 11:15 am Track B

CISOs! Complexity! Containment!

Speaker:
Thom Langford, former CISO, founder, (TL)2

The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity it is small wonder that a CISO’s role has become more complex. This leads to the inevitability of a security incident where the complex environments and inventive attacks collide.

In this presentation, Thom Langford, Security Advocate, SentinelOne, looks at three fundamentals:

  • Why traditional protective approaches are no longer effective enough.
  • How complexity has made the CISO’s ability to respond more difficult.
  • The importance of automation in the response process to address this paradigm shift CISOs now face.
11:00 am - 11:15 am Track C

Modern Privileged Access Management for Cloud Transformation

Speaker:
Jason Mitchell, Senior Vice President, Engineering, Centrify

The move to remote work and a saturated digital environment has prompted many organizations to migrate to the cloud. Experts agree that the top priority for cloud migration should be data security and privacy. However, recent studies discovered that 70% of organizations experienced a public cloud security incident in the last year—including malware, exposed data, and compromised accounts. With 80% of organizations predicted to migrate toward cloud, hosting, and colocation services by 2025, new attack surfaces may arise and create greater security vulnerabilities.

To fully benefit from rapid technological transformation, it is imperative that enterprises embrace strategies for safeguarding their infrastructure both during and after cloud migration. In this session we will discuss the tools and strategies IT and security leaders are finding most effective for managing a secure transformation to the cloud.

11:15 am -
11:45 pm
11:15 am - 11:45 pm Track A

Building a Business-Focused, Customer-Centric Security Program: A Case Study

Speaker:
Omar Khawaja, CISO, Highmark Health

Omar Khawaja, CISO of Highmark Health, describes his organization’s journey to enhance its security program while serving the needs of the business and providing internal customers with ease-of-use.

In this exclusive interview Khawaja will discuss:

  • How security programs must serve the business;
  • The goals of a business-centric security program;
  • How security leaders must avoid saying “no,” and instead demonstrate “here’s how”
  • Treating the business like a paying client.
11:15 am - 11:45 pm Track B

Medical Device Cybersecurity: The Latest Challenges

Speakers:
Dr. Suzanne Schwartz, MD, Director, Office of Strategic Partnerships and Technology Innovation (OST) at FDA’s Center for Devices & Radiological Health (CDRH)
Mitch Parker, CISO, Indiana University Health System
Rob Suárez, VP, CISO, BD (Becton, Dickinson and Company)

What’s the status of FDA’s latest guidance and other efforts to help strengthen the cybersecurity of medical devices – especially amid the surge in COVID-19 remote patient monitoring and shortages of certain critical medical equipment? How are medical device makers implementing better security controls and best practices, and what are healthcare delivery organizations doing to keep their patients and data safe from the latest threats facing devices? Our panel will discuss these issues, plus:

  • The ongoing challenges involving legacy devices issues and outdated third-party software;
  • Vulnerability disclosures and patching;
  • Third-party components and a “Cybersecurity Bill of Materials”;
  • What the SolarWinds attack and connected medical devices have in common.
11:45 pm -
12:15 pm
11:45 pm - 12:15 pm

Using Java for Modern Application Development

Speaker:
Sharat Chander, Director of Java Product Management, Oracle

The need for agility has never been more important as organizations revise their processes and applications at an unprecedented pace, and that, in turn, has underscored the need for business-critical application performance, stability and security. As IT leaders guide their teams through ongoing business transformation demands to meet business needs and customer expectations, it is critical to examine how applications are managed and how risk is calculated to drive improvement. Join Argyle and Sharat Chander, Senior Director of Java Product Management at Oracle, for an insightful discussion to learn how to modernize Java applications while mitigating risk.
12:15 pm -
12:30 pm
12:15 pm - 12:30 pm

Exhibition and Networking Break

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm Track A

How to Effectively Manage the Modern Risks of Open-Source Code

Speaker:
Stephen Gates, Security Evangelist and Senior Solutions Specialist, Checkmarx

Today’s modern applications depend on of a substantial amount of open source components and third-party libraries. Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, many don’t effectively track or manage open source throughout their entire code base and cannot consistently address the widening hazards they face. As a result, organizations desire automated, repeatable processes for open source usage, risk management, and vulnerability remediation that fit within modern development environments.

In this session, attendees will hear recommendations from Stephen Gates, Checkmarx SME on how to effectively implement an approach to:

  • Identify open source with confidence.
  • Minimize open source security and license risks.
  • Prioritize exploitable vulnerabilities.
  • Accelerate informed remediation.
  • Integrate and automate open source analysis.
12:30 pm - 1:00 pm Track B

Continuous Cloud Security and Compliance for Healthcare & Life Sciences

Speakers:
Christopher Hertz, VP of Sales for Cloud Solutions, Rapid7
Thomas Martin, Founder, NephōSec and Former CIO at GE

When it comes to the security and compliance of your enterprise cloud, healthcare and life sciences organizations must have an integrated, automated, enterprise-wide, multi-cloud approach to ensure regulatory compliance and complete data protection. Join Thomas Martin, Founder at NephōSec and former CIO at GE, along with Chris Hertz, Vice President Cloud Security Sales at DivvyCloud by Rapid7, for a review of the latest global trends in cloud risk for healthcare and how to achieve continuous full life cycle security and compliance for multi-cloud environments.

1:00 pm -
1:15 pm
1:00 pm - 1:15 pm Track A

Leveraging AI to Drive Identity Security Policies and Compliance in Healthcare

Speakers:
Marty Momdjian, Healthcare Solutions Advisor, Sirius Healthcare
Matthew Radcliffe, AVP, Healthcare, Sailpoint

Due to COVID-19, healthcare continues to face unprecedented challenges. With the rapid movement of clinical staff and provisioning a larger number of contingent workers, healthcare organizations are facing increased cybersecurity threats. The pandemic put a magnifying glass on identity security. First, it highlighted vulnerabilities in identity governance policies and procedures, specifically how to secure and maintain applications, platforms, and infrastructures for remote workers. Secondly, automated identity solutions with AI and ML can better address micro and macro-operational changes to improve efficiencies within or outside of the four walls.

Join Matthew Radcliffe, AVP of Healthcare for SailPoint, and Marty Momdjian, Healthcare Solutions Advisor at Sirius Healthcare, for a thoughtful discussion on the strategic approach healthcare organizations should consider to improve cybersecurity and drive compliance.

1:00 pm - 1:15 pm Track B

Network Risk & Threat Visibility: A Small Teams Missing Weapon

Speaker:
Ed Jackowiak, President, CyGlass

In this presentation, CyGlass CEO Ed Jackowiak will look at the unique challenges faced by small security and IT teams at healthcare organizations. Ed will then detail why gaining visibility to your network and the risks and threats hidden within is the most cost-effective approach to mitigating the threats you will face in 2021 and beyond. He will then describe how a new generation of SaaS technologies offers small teams operationally effective enterprise-class cyber defense capabilities at a fraction of the cost.

1:00 pm - 1:15 pm Track C

Integrating Cybersecurity and Enterprise Risk in Healthcare

Speaker:
Ed Gaudet, CEO and Founder, Censinet

Today, cybersecurity risk is siloed throughout a health system with disparate data across different teams using manual processes and non-integrated tools. This approach clearly isn't working. To significantly reduce the occurrence of risks or the impact of an incident, it's time that we, as health system leaders and practitioners, start integrating and operationalizing risk across the enterprise. Only by consolidating risk into a single unified, operational view can we then manage, control, and remediate it, limiting our organization's cybersecurity exposure and protecting those we serve.

1:15 pm -
1:45 pm
1:15 pm - 1:45 pm Track A

Defending against the surge in ransomware and other cyberattacks in the healthcare sector during the COVID crisis

Speakers:
Anahi Santiago, CISO, Christiana Care Health System
Martin Littmann, CTO and CISO, Kelsey-Seybold Clinic
Matthew Hickey, Director of Sales Engineering, Sophos

Not only are cybercriminals installing ransomware to encrypt data and freeze up systems, some attacks have evolved with the exfiltration of sensitive patient data and double extortion schemes. In some cases, backup systems are being hit as well, hampering recovery efforts from these attacks. But what are the critical steps and latest strategies that healthcare sector entities can take to prevent falling victim to these highly disruptive and dangerous attacks, especially as they escalate during the COVID-19 pandemic?

1:15 pm - 1:45 pm Track B

Conquering the Security Challenges of the Hybrid Cloud

Speakers:
Jim Angle, Product Manager for IT service - Information Security, Trinity Health
John Houston, Esq Vice President, Information Security and Privacy; Associate Counsel, UPMC
Martyn Crew, Director of Solutions Marketing, Gigamon

The delivery of healthcare services using telehealth and remote medicine capabilities has soared during the COVID-19 crisis, and this is not a temporary phenomenon: telemedicine is here to stay. Not only is telemedicine here to stay, it will undoubtedly expand as healthcare organizations move to scalable hybrid cloud architectures and 5G massively increases mobile bandwidth.

But what are the emerging operational and security challenges associated with these changes? Our panel of experts will examine issues including:

  • As healthcare organizations adopt hybrid cloud architectures, what are the key challenges they face?
  • How can organizations secure the movement and monitoring of sensitive healthcare data traffic?
  • How will 5G impact telehealth, remote medicine and patient security?
1:45 pm -
2:15 pm
1:45 pm - 2:15 pm Track A

Digital Supply Chain Security: It’s a Matter of Trust

Speakers:
Michael McNeil, CISO, Mckesson
Stephen Dunkle, CISO, Geisinger Health

After the SolarWinds attack, how can an entity ever trust that any vendor’s security incident won’t become their own next crisis? Healthcare sector entities in particular deal with a complex digital supply chain that range from critical IT vendors to suppliers of life-saving network-connected patient gear, and all the other players – known and maybe unknown – in-between. Our panel will discuss:

  • Digital supply chain challenges spotlighted during COVID-19;
  • Healthcare sector lessons emerging from the SolarWinds and other major vendor attacks;
  • Lessons from the Urgent/11 IPnet vulnerabilities;
  • Cloud vendors and change management issues;
  • Vetting and trusting third-parties – including their software patches.
1:45 pm - 2:15 pm Track B

Secure Patient Access to Electronic Health Data: Why is This So Hard?

Speakers:
Malikah Smith, TK, HHS Office of the National Coordinator for Health IT
Nicholas Heesters, Senior Advisor for Cybersecurity, HHS OCR
Vimala Devassy, Regulatory Attorney, Partner, BakerHostetler

HHS OCR issued a record number of HIPAA settlements in 2020 in cases involving patient “right of access” violations. Meanwhile, compliance with HHS’ health IT interoperability and information blocking regulations – which include provisions for providing patients secure access to their health information via smartphones and standards-based APIs – come due in April. What are the challenges involved in providing patients timely, secure access to their health information? Our panel will discuss:

  • Common obstacles and top tips for complying with HHS’ secure patient access and information blocking regulations;
  • Critical technology considerations for providing secure patient access to digital health records
  • Secure exchange of patient information among competing healthcare providers and diverse health IT platforms
  • What’s next for HIPAA privacy, security and breach notification regulations and enforcement.
2:15 pm -
2:45 pm
2:15 pm - 2:45 pm Track A

Critical Cyber Lessons from the Pandemic: A Fireside Chat

Speakers:
Jacki Monson, CISO, Sutter Health
Joshua Corman, Senior adviser to the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS CISA)

Segments of healthcare sector cybersecurity have been rocky for a while, despite incremental improvements in the wake of a HHS cyber task report making key recommendations. But how has the pandemic further stressed and strained healthcare cybersecurity – and what seams and cracks are now widening? What needs to be fixed STAT, before system outages and compromises turn deadly?

Our panelists will discuss:

  • Risks highlighted in the HHS task force report – what’s gotten better, what’s getting worse;
  • Connected biomedical devices, telehealth, the overall push for interconnectivity – what’s the latest impact on cyber risk;
  • Delayed and compromised patient care due to cyberattacks and breaches– addressing the threats and consequences;
  • Furloughed security teams, tight security resources – what needs to be done;
  • Hit by ransomware – who should healthcare entities contact first for help;
  • Why the pandemic is an “aha” moment for healthcare cybersecurity.
2:15 pm - 2:45 pm Track B

First Responders and the Response to Cybersecurity Concerns

Speaker:
Cris Ewell, CISO, UW Medicine

Washington State was the first U.S. epicenter of the COVID-19 pandemic, and as CISO of UW Medicine Cris Ewell was supporting the first responders. How is his security organization most different today than it was a year ago? Hear his approach to:

  • Work from anywhere
  • Supply chain risk
  • Medical device security
2:45 pm -
3:15 pm
2:45 pm - 3:15 pm

Cybersecurity Leadership for the Post-Pandemic

Speaker:
Meredith Harper, VP, CISO, Eli Lilly and Company

Has there ever been a more challenging time to be CISO of a major global pharmaceutical enterprise? Meredith Harper, VP and CISO of Eli Lilly and Company, discusses how the organization has responded to COVID-19 and the new workplace. She also shares plans for:

  • Cloud transformation
  • Zero trust
  • Building a diverse workforce
View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:30 am -
9:00 am
8:30 am - 9:00 am

Registration & Exhibit Browsing

9:00 am -
9:30 am
9:00 am - 9:30 am

Securing the Technology Transformation of Healthcare

Speaker:
MK Palmore, VP, Field CSO, Palo Alto Networks

What emerging security trends have been exposed in healthcare? What key insights and principles of cybersecurity can be applied to foster resiliency? And, how can you create an adaptive and agile cybersecurity culture to prevent modern threats?

Please join MK Palmore for a keynote discussion that will draw from his experiences and perspective, offering thoughts on challenges and opportunities in securing today’s digital healthcare organizations.

9:30 am -
10:00 am
9:30 am - 10:00 am

Addressing Cyber Attacks During a Global Pandemic

Speaker:
Flavio Aggio, CISO, World Health Organization

COVID-19 Cybersecurity attacks: Cybersecurity technologies to identify, protect, detect, respond and recover are extremely important, but not sufficient. HumanOS upgrade is required to safely use the Internet and it is not only about training and awareness. It is about the way users must behave online and the IT community must openly acknowledge system vulnerabilities. Humans are the weakest and strongest links in Cybersecurity.

10:00 am -
10:30 am
10:00 am - 10:30 am Track A

Zoom in Healthcare... Security and Key Applications

Speakers:
Jason Lee, Chief Information Security Officer, Zoom
Ron Emerson, Global Director of Healthcare, Zoom

Join Zoom's Chief Information Security Officer, Jason Lee, and Global Healthcare Lead, Ron Emerson, RN BSN, as they discuss Zoom's security and privacy strategy, best practices for security and privacy, and key applications in healthcare for virtual care.

10:00 am - 10:30 am Track B

Network and Application Threat Landscape

Speaker:
Pascal Geenens, Director, Threat Intelligence, Radware

Lessons learned from the past will help us secure the future. As the world is migrating their applications to new hemispheres and the weight of internet is becoming dominant in their business practices, bad actors are smelling the new opportunities and new attack vectors are forming as a dark storm cloud menacing the opportunities of digitalization. Join this session to learn about the threats to your businesses, understand who are the actors behind the threats and what are the tools they have at their disposal to disrupt your business. As you moved to remote work and accelerated your digitalization journey, a clear understanding of the threats helps you to better assess the risk and find the right balance to secure your assets and resources.
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

Protecting Your Remote Healthcare Workforce Without Breaching Employee or Patient Privacy

Speakers:
Amber Johanson, Vice President Sales Engineering, North America, Forcepoint
David Finkelstein, Information Security Director, St. Luke’s University Health Network

With the global shift of a remote workforce, the walls that maintained order within healthcare organizations have since fallen. Healthcare providers across the globe have had to swiftly adapt and shift their ways of thinking to adopt new cloud security protocols and strategies. Listen to David Finkelstein and Amber Johanson, as they share best practices on how to protect your remote workforce without breaching employee or patient privacy.

In this session we will cover:

  • Best practices around protecting your remote workforce without breaching employee or patient privacy.
  • How COVID19 forced healthcare security officers to accept more risk in order to enable remote workers.
  • How to ensure centralized data security policies across various channels: endpoint, network, and the cloud.
10:30 am - 11:00 am Track B

Post-Pandemic Tension Headache: Finding Relief

Speakers:
Allison Norfleet, Global Healthcare Lead, Industry Solutions Group, Cisco
Wolf Goerlich, Advisory CISO, Duo Security at Cisco

2020 was a year of rapid adaptation for everyone. Few industries faced the level of complexity inherent to healthcare, with stringent compliance standards and an environment where streamlined security workflows can mean the difference between life and death. We triaged the event, moving rapidly to telemedicine and remote work, focusing on health and safety. We made significant IT changes quickly. As we come into 2021, our attention turns toward recovery. In this session, we’ll cover the efforts to stabilize and mature remote IT services, as well as new demands of vaccine distribution. Many of these shifts are with us for the foreseeable future. Now, we turn towards resilience to handle what's come and prepare for what's next.

10:30 am - 11:00 am Track C

Successful Outcome-based Security Is Use Case-Driven and Workflow Oriented

Speaker:
Gorka Sadowski, Chief Strategy Officer, Exabeam

89% of healthcare organizations experienced a data breach in the past two years. Many of these organizations have been struggling with failed security implementations because they still lack the specialized expertise, detection logic, and clearly mapped investigation and response workflows for the most common external and insider threats that lead to these breaches. Consequently, too many healthcare organizations have wasted precious time and resources customizing products with minimal improvement to their security coverage. So the breaches continue unencumbered. In this session, former Gartner analyst and now Exabeam Chief Strategy Officer Gorka Sadowski will discuss what he’s learned about successful vs. unsuccessful outcomes after talking to hundreds of CISOs and security analysts over many years, across healthcare and other industries. He will explain why it is critical at this time for healthcare Security Operations (SecOps) to become more use case-driven and workflow orientated. And how these approaches will drive far more successful outcomes that prevent breaches that continue to plague the industry.

11:00 am -
11:15 am
11:00 am - 11:15 am Track A

Security Debt, Running with Scissors

Speaker:
Dave Lewis, Global Advisory CISO, Duo Security at Cisco

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud computing and rise of IoT. Organizations should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person.

11:00 am - 11:15 am Track B

CISOs! Complexity! Containment!

Speaker:
Thom Langford, former CISO, founder, (TL)2

The traditional paradigm of investing in protection of known threats alone has been declining over recent years, as attackers become more adaptable and capable. Combine this with increased threats and attacker ingenuity it is small wonder that a CISO’s role has become more complex. This leads to the inevitability of a security incident where the complex environments and inventive attacks collide.

In this presentation, Thom Langford, Security Advocate, SentinelOne, looks at three fundamentals:

  • Why traditional protective approaches are no longer effective enough.
  • How complexity has made the CISO’s ability to respond more difficult.
  • The importance of automation in the response process to address this paradigm shift CISOs now face.
11:00 am - 11:15 am Track C

Modern Privileged Access Management for Cloud Transformation

Speaker:
Jason Mitchell, Senior Vice President, Engineering, Centrify

The move to remote work and a saturated digital environment has prompted many organizations to migrate to the cloud. Experts agree that the top priority for cloud migration should be data security and privacy. However, recent studies discovered that 70% of organizations experienced a public cloud security incident in the last year—including malware, exposed data, and compromised accounts. With 80% of organizations predicted to migrate toward cloud, hosting, and colocation services by 2025, new attack surfaces may arise and create greater security vulnerabilities.

To fully benefit from rapid technological transformation, it is imperative that enterprises embrace strategies for safeguarding their infrastructure both during and after cloud migration. In this session we will discuss the tools and strategies IT and security leaders are finding most effective for managing a secure transformation to the cloud.

11:15 am -
11:45 am
11:15 am - 11:45 am Track A

Omar Khawaja, CISO, Highmark

Speaker:
Omar Khawaja, CISO, Highmark Health

11:15 am - 11:45 am Track B

Medical Device Cybersecurity: The Latest Challenges

Speakers:
Dr. Suzanne Schwartz, MD, Director, Office of Strategic Partnerships and Technology Innovation (OST) at FDA’s Center for Devices & Radiological Health (CDRH)
Mitch Parker, CISO, Indiana University Health System
Rob Suárez, VP, CISO, BD (Becton, Dickinson and Company)

What’s the status of FDA’s latest guidance and other efforts to help strengthen the cybersecurity of medical devices – especially amid the surge in COVID-19 remote patient monitoring and shortages of certain critical medical equipment? How are medical device makers implementing better security controls and best practices, and what are healthcare delivery organizations doing to keep their patients and data safe from the latest threats facing devices? Our panel will discuss these issues, plus:

  • The ongoing challenges involving legacy devices issues and outdated third-party software;
  • Vulnerability disclosures and patching;
  • Third-party components and a “Cybersecurity Bill of Materials”;
  • What the SolarWinds attack and connected medical devices have in common.
11:45 am -
12:15 pm
11:45 am - 12:15 pm

Using Java for Modern Application Development

Speaker:
Sharat Chander, Director of Java Product Management, Oracle

The need for agility has never been more important as organizations revise their processes and applications at an unprecedented pace, and that, in turn, has underscored the need for business-critical application performance, stability and security. As IT leaders guide their teams through ongoing business transformation demands to meet business needs and customer expectations, it is critical to examine how applications are managed and how risk is calculated to drive improvement. Join Argyle and Sharat Chander, Senior Director of Java Product Management at Oracle, for an insightful discussion to learn how to modernize Java applications while mitigating risk.
12:15 pm -
12:30 pm
12:15 pm - 12:30 pm

Exhibition and Networking Break

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm

How to Effectively Manage the Modern Risks of Open-Source Code

Speaker:
Stephen Gates, Security Evangelist and Senior Solutions Specialist, Checkmarx

Today’s modern applications depend on of a substantial amount of open source components and third-party libraries. Although organizations acknowledge a heightened level of security, license, and operational risk, unfortunately, many don’t effectively track or manage open source throughout their entire code base and cannot consistently address the widening hazards they face. As a result, organizations desire automated, repeatable processes for open source usage, risk management, and vulnerability remediation that fit within modern development environments.

In this session, attendees will hear recommendations from Stephen Gates, Checkmarx SME on how to effectively implement an approach to:

  • Identify open source with confidence.
  • Minimize open source security and license risks.
  • Prioritize exploitable vulnerabilities.
  • Accelerate informed remediation.
  • Integrate and automate open source analysis.
1:00 pm -
1:15 pm
1:00 pm - 1:15 pm Track A

Fireside Chat: New York-Presbyterian Hospital CISO Jennings Aske

Speaker:
Jennings Aske, CISO, New York-Presbyterian

New York-Presbyterian Hospital CISO Jennings Aske describes his organization's COVID-19 security challenges and response, and the critical lessons learned while dealing with a pandemic in the nation's top hot spot for disease outbreak.
1:00 pm - 1:15 pm Track B

Network Risk & Threat Visibility: A Small Teams Missing Weapon

Speaker:
Ed Jackowiak, President, CyGlass

In this presentation, CyGlass CEO Ed Jackowiak will look at the unique challenges faced by small security and IT teams at healthcare organizations. Ed will then detail why gaining visibility to your network and the risks and threats hidden within is the most cost-effective approach to mitigating the threats you will face in 2021 and beyond. He will then describe how a new generation of SaaS technologies offers small teams operationally effective enterprise-class cyber defense capabilities at a fraction of the cost.

1:00 pm - 1:15 pm Track C

Integrating Cybersecurity and Enterprise Risk in Healthcare

Speaker:
Ed Gaudet, CEO and Founder, Censinet

Today, cybersecurity risk is siloed throughout a health system with disparate data across different teams using manual processes and non-integrated tools. This approach clearly isn't working. To significantly reduce the occurrence of risks or the impact of an incident, it's time that we, as health system leaders and practitioners, start integrating and operationalizing risk across the enterprise. Only by consolidating risk into a single unified, operational view can we then manage, control, and remediate it, limiting our organization's cybersecurity exposure and protecting those we serve.

1:15 pm -
1:45 pm
1:15 pm - 1:45 pm

Conquering the Security Challenges of the Hybrid Cloud

Speakers:
Jim Angle, Product Manager for IT service - Information Security, Trinity Health
John Houston, Esq Vice President, Information Security and Privacy; Associate Counsel, UPMC
Martyn Crew, Director of Solutions Marketing, Gigamon

The delivery of healthcare services using telehealth and remote medicine capabilities has soared during the COVID-19 crisis, and this is not a temporary phenomenon: telemedicine is here to stay. Not only is telemedicine here to stay, it will undoubtedly expand as healthcare organizations move to scalable hybrid cloud architectures and 5G massively increases mobile bandwidth.

But what are the emerging operational and security challenges associated with these changes? Our panel of experts will examine issues including:

  • As healthcare organizations adopt hybrid cloud architectures, what are the key challenges they face?
  • How can organizations secure the movement and monitoring of sensitive healthcare data traffic?
  • How will 5G impact telehealth, remote medicine and patient security?
1:45 pm -
2:15 pm
1:45 pm - 2:15 pm Track A

Digital Supply Chain Security: It’s a Matter of Trust

Speakers:
Michael McNeil, CISO, Mckesson
Stephen Dunkle, CISO, Geisinger Health

After the SolarWinds attack, how can an entity ever trust that any vendor’s security incident won’t become their own next crisis? Healthcare sector entities in particular deal with a complex digital supply chain that range from critical IT vendors to suppliers of life-saving network-connected patient gear, and all the other players – known and maybe unknown – in-between. Our panel will discuss:

  • Digital supply chain challenges spotlighted during COVID-19;
  • Healthcare sector lessons emerging from the SolarWinds and other major vendor attacks;
  • Lessons from the Urgent/11 IPnet vulnerabilities;
  • Cloud vendors and change management issues;
  • Vetting and trusting third-parties – including their software patches.
1:45 pm - 2:15 pm Track B

Secure Patient Access to Electronic Health Data: Why is This So Hard?

Speakers:
Malikah Smith, TK, HHS Office of the National Coordinator for Health IT
Nicholas Heesters, Senior Advisor for Cybersecurity, HHS OCR
Vimala Devassy, Regulatory Attorney, Partner, BakerHostetler

HHS OCR issued a record number of HIPAA settlements in 2020 in cases involving patient “right of access” violations. Meanwhile, compliance with HHS’ health IT interoperability and information blocking regulations – which include provisions for providing patients secure access to their health information via smartphones and standards-based APIs – come due in April. What are the challenges involved in providing patients timely, secure access to their health information? Our panel will discuss:

  • Common obstacles and top tips for complying with HHS’ secure patient access and information blocking regulations;
  • Critical technology considerations for providing secure patient access to digital health records
  • Secure exchange of patient information among competing healthcare providers and diverse health IT platforms
  • What’s next for HIPAA privacy, security and breach notification regulations and enforcement.
2:15 pm -
2:45 pm
2:15 pm - 2:45 pm Track A

Critical Cyber Lessons from the Pandemic: A Fireside Chat

Speakers:
Jacki Monson, CISO, Sutter Health
Joshua Corman, Senior adviser to the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (DHS CISA)

Segments of healthcare sector cybersecurity have been rocky for a while, despite incremental improvements in the wake of a HHS cyber task report making key recommendations. But how has the pandemic further stressed and strained healthcare cybersecurity – and what seams and cracks are now widening? What needs to be fixed STAT, before system outages and compromises turn deadly?

Our panelists will discuss:

  • Risks highlighted in the HHS task force report – what’s gotten better, what’s getting worse;
  • Connected biomedical devices, telehealth, the overall push for interconnectivity – what’s the latest impact on cyber risk;
  • Delayed and compromised patient care due to cyberattacks and breaches– addressing the threats and consequences;
  • Furloughed security teams, tight security resources – what needs to be done;
  • Hit by ransomware – who should healthcare entities contact first for help;
  • Why the pandemic is an “aha” moment for healthcare cybersecurity.
2:15 pm - 2:45 pm Track B

First Responders and the Response to Cybersecurity Concerns

Speaker:
Cris Ewell, CISO, UW Medicine

Washington State was the first U.S. epicenter of the COVID-19 pandemic, and as CISO of UW Medicine Cris Ewell was supporting the first responders. How is his security organization most different today than it was a year ago? Hear his approach to:

  • Work from anywhere
  • Supply chain risk
  • Medical device security
2:45 pm -
3:15 pm
2:45 pm - 3:15 pm

Cybersecurity Leadership for the Post-Pandemic

Speaker:
Meredith Harper, VP, CISO, Eli Lilly and Company

Has there ever been a more challenging time to be CISO of a major global pharmaceutical enterprise? Meredith Harper, VP and CISO of Eli Lilly and Company, discusses how the organization has responded to COVID-19 and the new workplace. She also shares plans for:

  • Cloud transformation
  • Zero trust
  • Building a diverse workforce
View Schedule

SPONSORS / Supporting Organizations

Centrify
Checkmarx
Cisco Systems
exabeam
DUO Security
Forcepoint
Gigamon
Palo Alto Networks
Radware
Rapid7
SentinelOne
Sirius/Sailpoint
Sophos
Zoom

VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.

ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismgcorp.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data