The threat landscape has changed tremendously. What are the major threats impacting enterprises globally? What are some significant changes and challenges cybersecurity leaders face? IS it good to depend on AI and ML for every problem?
This session will discuss:
How to evaluate a good feed
How to set the right ...
Daminda Kumara, Head of Cybersecurity and Risk, West Farmers Industrial and Safety
Daniel Pludek, Global CTO, Kip McGrath
Amit Chaubey, Head of Security Risk, Governance and Compliance, Ausgrid
A major Australian broadcaster recently was hit by ransomware – just the latest strike against ...
New technologies have been a boon to all industries specifically in cost and efficiency optimization. Organizations have been incorporating new tech over the years. While the CISOs have been busy managing and securing IT assets, this new tech is slipping in unnoticed. Today an organization's infrastructure not only ...
Many businesses are implementing software security solutions. But as hackers get more sophisticated, threats are attacking the hardware layer. Hardware-based security features built-in to the hardware provide an important layer of protection for business devices, applications, and data. The Intel vPro® platform ...
The IoXT Alliance is an industry group that has come together to help solve three major challenges for connected devices: Security, Upgradability and Transparency. In this exclusive session, Brad Ree, CTO of the Alliance, shares insights on:
The state of connected device security
Where the cybersecurity needle is ...
IoT technologies that are carefully aligned with business use cases enable process optimization, enhanced product offerings, and can transform customer and employee experiences. However, use of IoT technologies leads to heightened risk for the organization. However, many orgs continue to struggle with immature ...
Scientist, educator, government official. Kevin Fu is a pioneer in the battle to achieve medical device cybersecurity, and he has played multiple roles. From his current position within the FDA, Fu discusses the state of medical device security, including:
Archaic engineering principals
From baby monitors to printers to tablets and automobiles, home branch offices are loaded with smart devices that share two common traits: They are internet connected, and they are hackable.
Join this expert panel for a discussion about understanding and remediating the risks from connected devices, ...
By 2025, researchers predict that we will have 41.6 billion connected devices in play. That’s a lot of real estate to protect. In this session, veteran cybersecurity expert Diana Kelley examines the risk inherent in these vulnerable devices, and she shares her vision of how to secure them via seven principles of an ...
HHS OCR issued a record number of HIPAA settlements in 2020 in cases involving patient “right of access” violations. Meanwhile, compliance with HHS’ health IT interoperability and information blocking regulations – which include provisions for providing patients secure access to their health information via ...
Today, cybersecurity risk is siloed throughout a health system with disparate data across different teams using manual processes and non-integrated tools. This approach clearly isn't working. To significantly reduce the occurrence of risks or the impact of an incident, it's time that we, as health system leaders and ...
Throughout 2020 organizations widely adopted a zero trust architecture in response to the pandemic and it is now fast replacing traditional VPN approaches. As the zero trust approach continues to evolve, the challenge for organizations in 2021 and beyond lies in how to implement this approach across environments, ...
A longtime cybersecurity practitioner and thought-leader, Chirag Joshi currently serves as business information security office at AMP, as well as director of ISACA’s Sydney chapter. He also has published this book: 7 Rules to Influence Behavior and Win at Cyber Security Awareness. In this session, he shares some of ...
Fixing a breach is far more costly than prevention. Organizations are under pressure to respond to it faster. More often than not, though, it can be weeks or months before you’ve even realized that you’ve suffered one.
The session will discuss:
Understanding the legal implications of the incident and plan a ...
New Zealand was one of the country’s hit least by the COVID-19 pandemic. And yet its healthcare system was hardly immune to the seismic telehealth changes that struck the entire world in 2020.
In this exclusive session, the CISO of Health Alliance New Zealand opens up on
How healthcare delivery has evolved ...
Director of Threat Intelligence, Fortiguard Labs Australia
Glenn works at Fortiguard Labs, heading up
Threat Intelligence operations for Australia.
FortiGuard Labs build the security intelligence that underpin advanced security technologies
like AI, antivirus , intrusion prevention, and email & web security.
Glenn works closely Fortinet front & back
office teams, the Australian Cyber Organisations,
CERTs, partners, and customers to build resilient defence systems via intelligence led
Glenn has degrees in Business (Management) and Science (ICT); and diplomas in Security
Risk Management & Project Management. Glenn is married with two daughters and a son,
and spends his free time on his farm near Canberra.
Director of Security Solutions, Fortinet (Australia)
Corne has more than 15 years experience in network security and delivering cyber-resilient solutions. He has a focus on hybrid cloud environments and artificial intelligence to ensure organisations are enabled while also safeguarding their data and applications.
In his role as Director of Security Solutions, Corne acts as the evangelist for Fortinet activities across Australia and the advanced technology that underpins its success. His role is to provide leadership and strategy for technical, pre-sales and support initiatives. He works closely with partners and customers to understand their business drivers and risk posture and to reduce their risk to an acceptable level.
Proud military veteran (Army Aviation), separated from the military to enter in the technology field. I have worked for more than 20-years in the critical infrastructure and information security arena. Supported the federal government and Intelligence Community for over 20 years before transitioning to the commercial sector. Outside of work, enjoy reading and international travel.X
Acting Director, Medical Device Cybersecurity, FDA Center for Devices and Radiological Health
Kevin Fu, PhD, is associate professor of electrical engineering and computer science at the University of Michigan. He directs the university's Archimedes Research Center for Medical Device Security. Previously, Fu served as an associate professor of computer science and adjunct associate professor of electrical and computer engineering at the University of Massachusetts, Amherst. He is also a co-founder, CEO and chief scientist at Virta Laboratories, a healthcare cybersecurity company.
Vice President of Western and LATAM Sales, Entrust
Brad Beutlich, Vice President of Western and LATAM Sales at Entrust, is an information security professional who has worked with numerous US based companies over the past 20 years, providing security solutions ranging from end-point, to data security. The last 13 years he has worked for nCipher Security providing security solutions that protect customer data, financial transactions and IoT device manufacturing. Brad holds a BS in Electrical Engineering Technology from Bradley University, and is an award-winning writer and speaker on numerous security topics. His passion as a historian is on brass-era (pre 1913) automobiles, of which he owns a 120-year-old car that runs on steam. As an avid skier, he hits the slopes on the weekends when possible. Brad resides with his wife and three children in Southern California.
He began his professional career as an Electrical Control Engineer designing automated and integrated systems, robotic solutions, and optical rotary encoders (Visible Light Communication enabled sensors). Over the past 20 years, he has worked as adjunct professor, technical and research lead, program director, business development manager, chief product officer, chief technology officer, chief executive officer and technology, innovative, IIoT and digital/smart factory transformation consultant at multi-national corporations including Dupont/DJ chemical, Delphi/Aptiv Automotive, Ford/Comau Robotics, Homag/Dü, Haworth, SteelCase, Boeing, Stryker; as well as for US Government agencies including the Consumer Products Safety Commission (CPSC), and the US Census Bureau.
As an entrepreneur he has founded/co-founded 7 different businesses and organizations and served as a top executive and board member. He now serves as the Chief Technology Officer of AASA, where he also co-founded the technology spinoff, 01LightCom. His recent focus includes the COVID-19 impact on the industry, manufacturing and IoT/IIoT, and co-founding Touchless Technology LLC. serving as Chief Executive Officer, with the objective of developing a smart wrist band that can help and provide social distancing and track and tracing in workspace and manufacturing and also prevents workforce from touching their faces; the prototype of this product is finalized and is under final tests.
Currently, he also serves as Chair of Smart factory and Steering Committee member of Industrial Internet Consortium.
CTO and Founding Partner, SecurityCurve & former Cybersecurity Field CTO, Microsoft
Diana Kelley is the Cybersecurity Field CTO for Microsoft and a cybersecurity architect, practitioner, executive advisor and author. At Microsoft, she leverages her 25+ years of cyber risk and security experience to provide advice and guidance to CSOs, CIOs and CISOs at some of the world's largest companies and is a contributor the Microsoft Security Intelligence Report (SIR). She was the Global Executive Security Advisor at IBM Security where she built and managed the IBM Security Research Community Newsroom process and was a regular contributor to IBM X-Force research. Kelley is a faculty member with IANS Research, an Industry Mentor at the CyberSecurity Factory and a guest lecturer at Boston College's Master of Science in Cybersecurity program. She serves on the Board of Directors at the non-profit Sightline Security, was an IEEE "Rock Star of Risk" in 2016, speaks frequently at major conferences and co-authored the book Cryptographic Libraries for Developers.
With nearly 20 years of experience representing healthcare industry
professionals and entities, Vimy Devassy provides her clients with an indepth understanding of industry compliance and regulatory issues.
She has broad experience structuring complex transactions among
healthcare providers, negotiating a broad spectrum of industry relevant
contracts, and advising clients on day-to-day regulatory and compliance
matters, including fraud and abuse laws and health information laws.
Certified as a Health Care Information Security and Privacy Practitioner
(HCISPP) as well as an Information Privacy Professional (CIPP) by the
International Association of Privacy Professionals, Vimy has extensive
experience managing issues related to confidentiality, privacy and security
of health information, including compliance with the rubric of laws relating
to health information privacy such as the Health Insurance Portability and
Accountability Act (HIPAA). Her work includes helping clients understand
how to align their privacy and information security programs in compliance
with applicable laws, respond to potential breach and security incidents,
permissibly utilize and share their health data, and navigate complex
privacy and security laws as they consider innovative new technologies
and business opportunities.
Attorney, Senior advisor for Cybersecurity, HHS Office for Civil Rights
Nicholas Heesters is a certified information privacy professional with over 25 years of experience supporting technology and information security efforts in many diverse industries including financial services, government, defense, education and healthcare. He earned a Master of Engineering in Computer and Software Engineering from Widener University and his Juris Doctor from the Widener University School of Law. Currently, Heesters works for the U.S. Department of Health and Human Services Office for Civil Rights supporting HIPAA compliance and enforcement activities.
Ms. Malikah “Mikki” Smith serves as the Chief Information Security Officer
(CISO) and Director of the Cybersecurity and Enterprise Architecture Division (CEAD), within
the Office of the Chief Operating Officer (OCOO) at HHS’s Office of the National Coordinator
for Health IT. Mikki tenure of government service with ONC has included serving as the
resident cybersecurity expert for HealthIT policy and governance, operational technology and
cross organizational collaboration.
Mikki joined the ONC organization in 2015, bringing a wide breadth of Cybersecurity
experience from multiple Federal and private sector roles spanning 15+ years of IT,
Cybersecurity and Security Program acumen. She is considered an industry leader and expert in
the area of information system security policies and procedures, applications and network
security architectures, DoD and Management & Budget (OMB) and Federal IA and Security
requirements. She has authored articles, contributed to key legislative and congressional
publications, and leads global cyber initiatives.
Mikki Smith has served as a Cybersecurity leader for agencies such as the Defense Health
Agency (DHA), Department of the Interior (DOI) and Federal Emergency Management Agency
(FEMA). She has led large, complex, multi-disciplined and multi-geographical cybersecurity
teams and programs within the private sector and government space.
A Certified Information Systems Security Professional (CISSP), Project Management
Professional (PMP) and Certification and Accreditation Professional (CAP) she has been
recognized and is continually awarded for her leadership and technical expertise
Ed is the CEO and Founder of Censinet. With more than 30 years of software experience across various executive leadership, product, marketing and sales roles, Ed has spent the last 10 years helping healthcare providers modernize and automate their cyber risk and security infrastructure. Ed is a member of the HHS CISA 405d CyberSecurity Working Group and various Health Sector Coordinating Council task groups for Cybersecurity, Supply Chain Risk Management, Medical Technology Contracts Language, and Emerging Technology