Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Anirudh Kannan of Google Cloud and Rob Suarez of CareFirst BlueCross BlueShield discuss mitigating AI-specific threats, implementing AI as a digital immune system, and balancing clinical innovation with regulatory compliance.
Jigar Kadakia of GeneDX and James Rutt of the Dana Foundation explore governing human and non-human identities, implementing phishing-resistant authentication, and establishing AI governance frameworks for healthcare systems.
Mike Nelson of DigiCert covers implementing certificate life cycle management automation, assessing post-quantum cryptography readiness, and building crypto agility frameworks for healthcare interoperability.
Bindu Sundaresan of LevelBlue shares insights from the 2025 LevelBlue Spotlight Report and shares how to manage software supply chains and innovate while mitigating risk.
Scott Gee discusses mapping critical EMR dependencies, eliminating vendor exclusivity clauses and integrating clinical continuity into regional frameworks.
Vince Crisler of Celerium covers implementing data breach defense capabilities, enforcing business associate agreements, and deploying surgical containment strategies for clinical operations.
Chip Witt of Radware shares insights from Radware's Cyber Threat Intelligence data on emerging threats, defending against AI-powered account takeover, and preparing for agentic AI vulnerabilities.
Jamey Doherty of Ping Identity discusses establishing discrete identity models for AI agents, implementing tiered supervision workflows, and designing delegation frameworks with compliance-ready audit trails.
Dr. Suzanne Schwartz shares insights on navigating pre-market cybersecurity requirements, understanding modification thresholds and demonstrating vulnerability disclosure capabilities.
Tom Davis of Aviatrix Systems discusses implementing distributed cloud firewalls, achieving macro and micro segmentation, and integrating DevSecOps workflows with infrastructure-as-code automation.
Russell Teague discusses prioritizing technology rationalization over workforce cuts, leveraging managed service providers, and measuring true costs of underfunding security.
Anthony Pillitiere of Horizon3.ai covers prioritizing exploitable weaknesses using likelihood and impact, validating security controls through autonomous offensive engagements, and shifting to continuous attack simulation.
Donald Eckel and Thurain Nyunt discuss preparing for proposed HIPAA Security Rule requirements, balancing information blocking mandates and managing False Claims Act liability.
Peter Halprin, Sara Goldstein and Jennifer Kreick discuss New York's Article 28 hospital requirements, New Jersey's NIST-based framework, and preparing for multi-state compliance strategies.