The past year has seen a drastic change in healthcare’s threat landscape. The sector has consistently remained a leading target for cyberattacks in recent years, which were amplified amid the national crisis and reached peak-levels with a massive ransomware wave this fall. As 50 percent of ransomware attacks lead to data exfiltration and many incidents can spur EHR downtime, how can providers better balance both resources and the need to secure the enterprise infrastructure?

The Privacy and Security Virtual Summit, hosted by HealthITSecurity will address some of the largest risks facing the sector, as well as the steps healthcare organizations must take to educate the workforce, implement the right processes and technologies to combat the modern threat landscape, and better balance the need for access with keeping patient data secure.

This Summit has passed, however we have more Virtual Summits Coming Soon...Learn More

Tuesday, April 27 at 11:00 ET
For the last year, healthcare delivery organizations have battled two massive threats: the COVID-19 pandemic and nefarious cybercriminals without scruples. From the rapid deployment of new technologies for supporting the response, to the shift in leveraging extortion to force victim’s to pay, the threat landscape has expanded to critical levels. Attend this keynote to:
  • Get an overview of the latest cyber threat evolution posed to the healthcare industry
  • Walk away with strategies for how to make the most of their teams and toolset
  • Understand the challenges that CIOs will need to overcome in the current business environment
Michael Archuleta, MBA, Chief Information Officer and HIPAA & Information Security Officer, Mt. San Rafael Hospital

Tuesday, April 27 at 12:30 ET
The fact is the Ransomware problem is enormous, and we cannot ignore it. Organized crime, and now in some cases, nation-state actors, have seen substantial earnings by taking healthcare networks hostage, predominantly from care providers and hospitals battling COVID-19 on the front lines. With each success and ransom paid, more ransomware attacks are guaranteed. 

While this may sound like a technology problem, and it is, that is not all it is. In healthcare, there are downstream effects for everything that happens. Whatever happens with data eventually affects a human being. In the case of Ransomware taking systems offline, patients don’t get the care they need. 

There are steps we can and must take to prevent becoming a victim. With Ransomware, knowledge is power. Understanding why it is happening, how it is happening, and to whom is critical. Gaining insights into how you can detect intruders and knowing the methods they use to gain access is necessary if you are going to stop them before the harm is substantial. Ransomware attacks have warning signs, and attackers leave trails. Takeaways include advice to help prevent you from becoming a victim including:
  • Analysis of the anatomy and psychology of a ransomware attack
  • Overview of the workings of different forms of ransomware
  • Shoring up defenses against the imminent threats
  • Ways to prevent a compromise
Chris Bowen, CISSP, CCSP, CIPP-US, CIPT - Founder, Chief Privacy & Security Officer, ClearDATA

Tuesday, April 27 at 2:00 ET
Rapidly changing work styles and increased use of SaaS applications have resulted in the Zero Trust model becoming one of the most important forms of alternative security. Join us to learn how you can utilize VMware’s Workspace ONE and Carbon Black solutions to build a dynamic and highly secure architecture that builds trust on a broader and deeper basis while greatly simplifying management and compliance enforcement. Additionally we will cover:
  • How to provide users with a unified platform accessible through any device
  • How to give end users the ability to access all workload associated applications through a single sign on process
  • How to achieve advanced cybersecurity through behavioral analytics
Nick Wager, VMware Pre-Sales System Engineer, Carahsoft

Tuesday, April 27 at  3:30 ET
Third Party Risk Management (TPRM) is quickly becoming an actualized discipline with formal standards, certified professionals, and increased requirements from industry regulators. In this webinar, we will examine the key concepts behind TPRM and why it is such an important part of any information security and compliance program. We will also provide a set of best practices based on Identity, Control, and Audit that will make your TPRM program a success.
Attend this talk to learn more about:

  • The exponential growth of third party risk due to the pandemic, increased outsourcing, and new tactics and attack vectors by serious cybercrime organizations
  • An overview of the principles of TPRM and its importance for security and compliance
  • Action items for implementing and managing a TPRM program
Joel Burleson-Davis, Chief Technology Officer, SecureLink

Wednesday, April 28 at 12:30 ET
Several recent high-profile cyber-attacks on healthcare and life sciences companies have shown that remote workforces, busier than ever and always on-call is not a good combination for data security and privacy. Join Jeff Sizemore, Chief Governance Officer at Egnyte and Alok Tayi, VP of Egnyte for Life Sciences as they demonstrate how innovative companies are not only coping with data governance, but thriving in our increasingly remote, increasingly regulated, and increasingly risky world.
Alok Tayi, PhD, Vice President of Life Sciences, Egnyte
Jeff Sizemore, Chief Governance Officer, Egnyte
James Allgood, Product Marketing, Egnyte for Life Sciences

Thank You To Our Sponsors
The Privacy & Security Virtual Summit is part of the Xtelligent Healthcare Media Network