Johnson & Johnson
For Executives in the Eastern Half of the U.S.
8 CPE/CEUs with full attendance
Tue, March 1, 2022
8:30AM - 5:30PM EST
Contact [email protected]
or call 212.655.4505 ext. 247
The Inaugural Cyber Security Healthcare and Pharma Summit is a one-of-a-kind conference designed for exclusively invited Healthcare Executives in need of innovative solutions to protect their company’s critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Evolving Cyber and Privacy Risks in a COVID-19 World
• How COVID-19 has shifted the cyber threat landscape
• The compliance risks that come into play as organizations adapt their systems and processes to meet needs during the pandemic
• Privacy as a partner, instead of prevention
The Healthcare & Pharma Breach: Who’s the more prominent target, the patient or the company?
• Who are the VAPs (very attacked people), and why are they being targeted?
• Top insider threat risks Healthcare organizations face in 2022
• Analysis of the Top Healthcare Breaches of 2021
• State-specific Privacy Rules, GDPR, and proposed changes to the Privacy Rule – How will this affect the landscape of future breaches?
Ransomware: It’s Climbing Impact on Healthcare Organizations
• The state of ransomware today: some of the latest cyber threats and cybercriminals’ changing tactics
• How to identify warning signs and attackers leave trails
• Creating a well-run security operations center for healthcare systems and data to protect from ransomware
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 4 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.2
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.3
Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.4
Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.6
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.7
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.8
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact [email protected] or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact [email protected] or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
In cybersecurity, the term resilience describes the ability to recognize, respond to, and to recover from cyberattacks before they have a chance to cause significant harm. With cyberattacks on the rise, the threat to our nation’s healthcare systems is acute. Deputy Director of the Cybersecurity and Infrastructure Security Agency (CISA), Nitin Natarajan, will discuss the threat landscape, share practical tips, and introduce the many resources CISA provides to help build resilience into the overall cyber ecosystem.
There’s no lack of sensationalist headlines within cybersecurity, not to mention within healthcare. The latest hair-raising headlines making the rounds of both trades are on the topic of “killware,” malware that’s intended to directly cause harm and take lives. At this point, the media attention seems to be driven more by hysteria than reality. However, the root cause of the concern has merit. Cybersecurity within healthcare is of genuine concern and poses significant risk to patients if current trends continue. In this presentation, VP of Security Response Services at ExtraHop and former healthcare CISO, Mark Bowling, will share four of the greatest forces compromising the cybersecurity of the healthcare sector, as well as strategies to combat them.
Digital transformation in the Healthcare industry is causing an explosion of hyper-connected IT, IoT and IoMT devices and, with it, a greatly expanded cyber-attack surface. With constant transformation and the explosion of interconnected devices, how do you even begin to plan for a zero trust architecture beyond the managed users and workstations?
In this session you will learn:
This panel will discuss:
Interim Leader, IT Risk Management Strategy, Policy, and PMO
Team Lead - Intelligence
Sr. Director, Product Management
Vice President of Research and Intelligence
Global CIO Healthcare and Life Sciences
This panel will discuss:
CTO - Americas
CISSP, CISA, CRISC, VP
RiskRecon / MasterCard
Chief Customer Officer
Egress Software Technologies
Sr. Healthcare Advisory SC
Chief Strategy Officer
Ransomware has dominated cybersecurity news reports for several years now, but it’s not the only threat organizations are facing today. More and more, organizations are adopting new technologies and services while still needing to maintain existing infrastructure, systems, devices and applications. With growing complexity comes an ever-increasing challenge to understand where we are most at risk and determine how best to mitigate it.
In this discussion, we’ll look at what the growing attack surface looks like for many healthcare and pharma organizations and provide strategies for adapting your security program to better understand where vulnerabilities exist across all the various types of assets in your environment and how to mitigate them before the next cyberthreat comes along.
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
This panel will discuss:
AVP of IT Security
Mount Sinai South Nassau
Head of Global Support
Rois Ni Thuama
Head of Cyber Governance
Executive Healthcare Strategist
Vice President, Global Services Technical Operations
Security Services Director
Director of Business Development
Every organization today must face the reality that your data is always at risk. Whether that risk is external attacks, system failures, or simply employee accidents, we must always be aware of where our systems are most vulnerable and how to turn a full-scale disaster into a manageable situation.
In this discussion, we will show some of the best ways you can protect your data with Synology, how this has been implemented in healthcare, as well as considerations needed for different methods of backing up your data.
As hospitals and healthcare organizations across the globe strive to provide the best possible patient care under increasingly immense strain, attackers are ramping up their efforts against them. Ransomware attacks, phishing campaigns, and an increasing number of IoT devices pose a growing threat to the healthcare industry, and holding valuable data within patient files, they remain a primary target for cyber-criminals.
Join Justin Fier, Director of Cyber Intelligence and Analysis at Darktrace, as he discusses the cyber-threats that the healthcare sector is facing today and how security teams can take a proactive approach to protect their systems, data, and ultimately, their patients.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
Chief Information Security Officer, Office of the CISO,
Check Point Software Technologies
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at [email protected] or call at 212.655.4505 ext 241.
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|