Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Karen Gispanski, Hugo Chun Hin Lai, Matt Cerny, Mike Levin and Daniel Brady explore Change Healthcare lessons, AI governance frameworks and zero trust architectures for patient data protection in hybrid cloud environments.
Phil Englert, Ashley Mancuso and Anatoly Podstrelov discuss harmonizing security strategies, proactive compliance measures and fostering collaboration between security, regulatory and executive teams.
Phil Englert, Samantha Jacques and Stephen Goudreault discuss expanded technical controls, medical device inventories, PHI data flow mapping, universal encryption and third-party risk attestation challenges.
Matt Cerny, Murad Dikeidek, Rick Doten, Neal Dennis, Lisa Bazis and Edward Higgins discuss emerging AI threats, agentic AI attacks, governance committee structures and defensive AI implementation.
Edward Higgins of Quisitive exposes the critical gap between regulatory alignment and real-world resilience, covering zero trust implementation, phishing prevention and tech debt remediation for clinical environments.
Carlos-Raul Sanchez of Fortinet addresses cybersecurity challenges in cyber-physical healthcare systems, covering network segmentation for medical devices, OT visibility frameworks and AI governance for infrastructure security.
Guru Gurushankar of ColorTokens discusses progressive segmentation strategies, agentless microsegmentation for medical devices and NIST-compliant breach-readiness frameworks for EMRs.
Theresa Lanowitz of LevelBlue presents 2025 research on AI attack preparation, software supply chain management and risk mitigation strategies for healthcare innovation.
Randy Guerette of Claroty addresses asset inventory using deep packet inspection, risk prioritization for exposed devices, exploited vulnerabilities and compensating controls for unmanaged medical devices.
James Doggett of Semperis covers foundational identity system security including Active Directory assessment with Purple Knight, continuous monitoring capabilities and recovery automation for identity system compromise scenarios.
Rick Doten of Centene Corporation discusses comprehensive ransomware preparation including pre-incident strategies, containment techniques, lateral movement disruption and out-of-band recovery methods for healthcare organizations.
Richard Hector and Daniel Dopsovic show how St. Luke's University Health Network implemented network microsegmentation to isolate medical devices without disruption, achieving rapid deployment and meeting new HIPAA requirements.
Samantha Jacques of McLaren Health Care and Michael Kearns of Nebraska Methodist Health System discuss compensating control strategies, NIST risk assessment frameworks and business relationship management for legacy infrastructure decisions.
Eric Clauss of Integrity Security Services explores PKI implementation for medical device authentication, silicon-to-software security frameworks, secure enclaves, code signing protocols and post-quantum cryptography preparation.
Sumant Mauskar of Pindrop covers multifactor voice authentication frameworks, device fingerprinting, synthetic voice detection, real-time fraud detection and ROI analysis for healthcare contact centers.
Matt Cerny of Integra LifeSciences covers atomic habits frameworks for incremental modernization, cultural evolution through gamification and phased approaches balancing solutions with operations.
Rick Doten, Murad Dikeidek, Samantha Jacques, Ashley Mancuso and Robert Kerwin discuss FDA requirements, cross-disciplinary governance and vendor relationship strategies for device security.
Chris Christensen of Honeywell addresses legacy building systems vulnerabilities, common attack vectors against hospital systems, IT-OT collaboration strategies and defense-in-depth frameworks using NIST standards.
Lisa Bazis, Dave Heaney, Michael Kearns, Yazan El-Hamwi and Karen Gispanski discuss documentation frameworks, metrics-driven security validation, CIO collaboration approaches and business continuity integration.
Jacob Combs of Tandem Diabetes Care explores AI defense strategies, emerging AI risk mitigation and quantum-resistant architecture transitions for medical device security programs.