We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
CyberEd.io
  • About
    About
    Company Our values Challenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
  • About
    About
    CompanyOur valuesChallenges we solve
    Event partnerships
    NullconHardwear.ioOTSEC.World
  • Solutions
    Subscriptions
    CyberEd EssentialsCyberEd ProCyberEd Pro+Pricing
    Enterprise
    CyberEd EnterpriseCyberEd CustomCyberEd Interactives
    Interactives
    Breach of FaithEcho ChamberKill SwitchCode RedZero HourPoint of FailureCompromised Agenda
    Immersive Learning
    LabsMasterclassesInteractivesCapture the Flag (CTF)Role-based PathwaysCyberEd Communities
  • Training
    Sectors
    Financial ServicesHealthcareManufacturingPayments
    Roles
    SOC Analysts & EngineersDevSecOpsThreat Intelligence Analysts
    Disciplines
    AI Security (Adversarial AI & Defense)Artificial Intelligence (AI) in SecurityBug HuntingCloud SecurityDevice SecurityForensics & Malware AnalysisGovernance, Risk & Compliance (GRC)
    Hardware & Embedded SecurityIncident ResponseOperational Technology (OT) SecurityPlatform SecurityResearch & VulnerabilitiesSoftware Supply Chain SecurityThreat Intelligence & Threat Hunting
  • Catalog
  • Resources
  • Contact us
  • User login
Back

Healthcare Security Summit: New York

Search

Clear Expand Collapse

Managing the Explosion of Health Data

Anirudh Kannan of Google Cloud and Rob Suarez of CareFirst BlueCross BlueShield discuss mitigating AI-specific threats, implementing AI as a digital immune system, and balancing clinical innovation with regulatory compliance.

Price
Course duration Duration: 30 minutes

Securing Digital Identity in Healthcare

Jigar Kadakia of GeneDX and James Rutt of the Dana Foundation explore governing human and non-human identities, implementing phishing-resistant authentication, and establishing AI governance frameworks for healthcare systems.

Price
Course duration Duration: 30 minutes

Preventing Outages in the Quantum Era

Mike Nelson of DigiCert covers implementing certificate life cycle management automation, assessing post-quantum cryptography readiness, and building crypto agility frameworks for healthcare interoperability.

Price
Course duration Duration: 30 minutes

Cyber Resilience and Business Impact in Healthcare

Bindu Sundaresan of LevelBlue shares insights from the 2025 LevelBlue Spotlight Report and shares how to manage software supply chains and innovate while mitigating risk.

Price
Course duration Duration: 30 minutes

Building Resilience and Ensuring Continuity Beyond the Breach

Scott Gee discusses mapping critical EMR dependencies, eliminating vendor exclusivity clauses and integrating clinical continuity into regional frameworks.

Price
Course duration Duration: 25 minutes

Cybersecurity Challenges for Healthcare Organizations

Vince Crisler of Celerium covers implementing data breach defense capabilities, enforcing business associate agreements, and deploying surgical containment strategies for clinical operations.

Price
Course duration Duration: 15 minutes

Silent Intrusions: Redefining Healthcare Security

Chip Witt of Radware shares insights from Radware's Cyber Threat Intelligence data on emerging threats, defending against AI-powered account takeover, and preparing for agentic AI vulnerabilities.

Price
Course duration Duration: 25 minutes

Securing Autonomy: An Identity Playbook for the Agentic Era

Jamey Doherty of Ping Identity discusses establishing discrete identity models for AI agents, implementing tiered supervision workflows, and designing delegation frameworks with compliance-ready audit trails.

Price
Course duration Duration: 15 minutes

Latest Developments in Medical Device Cybersecurity

Dr. Suzanne Schwartz shares insights on navigating pre-market cybersecurity requirements, understanding modification thresholds and demonstrating vulnerability disclosure capabilities.

Price
Course duration Duration: 20 minutes

Building Resilience With a Cloud-Native Security Fabric

Tom Davis of Aviatrix Systems discusses implementing distributed cloud firewalls, achieving macro and micro segmentation, and integrating DevSecOps workflows with infrastructure-as-code automation.

Price
Course duration Duration: 25 minutes

Rethinking Cybersecurity Budgets in Tight Times

Russell Teague discusses prioritizing technology rationalization over workforce cuts, leveraging managed service providers, and measuring true costs of underfunding security.

Price
Course duration Duration: 30 minutes

More War Stories From Over 150,000 Pentests

Anthony Pillitiere of Horizon3.ai covers prioritizing exploitable weaknesses using likelihood and impact, validating security controls through autonomous offensive engagements, and shifting to continuous attack simulation.

Price
Course duration Duration: 30 minutes

State Cybersecurity: NY & NJ Healthcare Approaches

Donald Eckel and Thurain Nyunt discuss preparing for proposed HIPAA Security Rule requirements, balancing information blocking mandates and managing False Claims Act liability.

Price
Course duration Duration: 20 minutes

Top Federal Health Data Privacy & Cyber Regulatory Issues

Peter Halprin, Sara Goldstein and Jennifer Kreick discuss New York's Article 28 hospital requirements, New Jersey's NIST-based framework, and preparing for multi-state compliance strategies.

Price
Course duration Duration: 20 minutes

Search

Clear

Information Security Media Group

As the education division of ISMG, CyberEd.io delivers premium cybersecurity training. We advance workforce readiness through flexible, expert-led learning and continuously updated content that keeps pace with today’s challenges and tomorrow’s evolving needs.

About
  • About CyberEd.io
  • About ISMG
  • Contact us
Subscriptions
  • CyberEd Essentials
  • CyberEd Pro
  • CyberEd Pro+
  • Pricing
  • User login
Enterprise
  • CyberEd Enterprise
  • CyberEd Interactives
  • CyberEd Custom
Resources
  • Resource Center
  • Blog
+1-609-356-1499 info@cybered.io Sign Up for Our Newsletter About ISMG Privacy & GDPR Statement