Prescribing Cyber Resilience: Protecting Patients and Systems Alike

Healthcare networks remain prime ransomware and data theft targets, with attackers exploiting connected medical devices, third-party vendors, and underfunded IT systems. Security teams face the dual challenge of safeguarding patient safety while meeting strict regulatory standards.

The Healthcare Security Summit unites CISOs, clinicians, and policymakers to tackle the intersection of cybersecurity and care delivery. Sessions will focus on securing IoMT, improving incident response readiness, and integrating cyber risk into patient safety frameworks to keep hospitals operational and patients protected.

Key Issues Covered at The Official Cybersecurity Summit

Cyber Meets Patient Safety: Making Security a Clinical Risk Conversation

In healthcare, cybersecurity isn’t just an IT problem—it’s a care delivery risk. This panel brings together security leaders and clinical stakeholders to explore how cyber events translate into patient harm: delayed procedures, diverted ambulances, inaccessible imaging, medication administration disruptions, and downtime-driven errors. Panelists will discuss how to integrate cyber risk into existing patient safety and quality frameworks, align priorities across clinical/biomed/IT, and build governance that treats resilience as a clinical mission—without drowning staff in security friction.

Top 6 Reasons to Attend the Cybersecurity Summit

1
Learn

Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.

2
Evaluate Demonstrations

Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.

3
Time, Travel & Money

Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.

4
Engage, Network, Socialize & Share

Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.

5
CEUs / CPE Credits

By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.

6
A Worthwhile Investment

By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.

Questions

For any questions, please contact our
Registration Team.

Sponsor

To sponsor at an upcoming summit, please fill out the
Sponsor Form.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
 
Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
 
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
 
Please note these qualifications pertain to all attendees, including members of our partner organizations.

Agenda

The Official Cybersecurity Summit delivers high-impact sessions designed to help leaders strengthen resilience, protect critical infrastructure, and align security with business goals.

Attendees will gain actionable insights from expert panels, explore cutting-edge solutions, and connect directly with top industry innovators - making this a can’t-miss agenda for CISOs and security executives.

11:00-11:05
Opening Keynote with J.D. Miller

11:05-11:15
Innovation Spotlight - Google Cloud: Your AI Agent Has More Access Than Your CISO

Healthcare's AI agents can now authenticate to EHRs, process claims and make decisions about patient care with more privileges than most employees and fewer controls than any of them. This session, based on the Secure AI Framework (SAIF), delves into agentic AI governance in healthcare, grounded in frontline incident data from Mandiant, emerging HIPAA requirements, and real-world breach analysis, you’ll leave with three actions your team can execute this quarter to get secure.


11:15-12:00
Panel 1: Cyber Meets Patient Safety: Making Security a Clinical Risk Conversation

In healthcare, cybersecurity isn’t just an IT problem—it’s a care delivery risk. This panel brings together security leaders and clinical stakeholders to explore how cyber events translate into patient harm: delayed procedures, diverted ambulances, inaccessible imaging, medication administration disruptions, and downtime-driven errors. Panelists will discuss how to integrate cyber risk into existing patient safety and quality frameworks, align priorities across clinical/biomed/IT, and build governance that treats resilience as a clinical mission—without drowning staff in security friction.


12:00-12:20
Lunch Break
12:20-1:05
Panel 2: Securing IoMT and Medical Devices: Visibility, Segmentation, and Practical Controls

Connected medical devices expand attack surfaces through aging operating systems, hard-to-patch endpoints, vendor remote access, and unpredictable network behavior. This panel focuses on pragmatic IoMT security: building accurate device inventories, understanding device risk, applying compensating controls (segmentation, allowlisting, monitoring), and managing vendor relationships without interrupting care. Panelists will share what works in the real world—especially in environments where patching is slow, devices are life-critical, and clinical uptime is non-negotiable.


1:05-1:15
Innovation Spotlight - Terra Security: From Point-in-Time Pentests to Continuous Validation: How WELL Health Scaled Offensive Security Across a Healthcare Enterprise

In healthcare, CISOs must demonstrate resilience beyond compliance. Iain Paterson explains how WELL Health moved from point-in-time pentesting to continuous validation aligned to real-world threats. He will share the gaps this approach closed, how it improved risk visibility, and the lessons learned during implementation. Designed for security leaders modernizing offensive security without disrupting care delivery.


1:15-2:00
Panel 3: Ransomware Readiness for Hospitals: Rapid Containment, Safe Operations, and Recovery Under Pressure

Healthcare ransomware response is uniquely complex: downtime can endanger patients, data theft triggers regulatory exposure, and recovery must restore clinical systems in a safe order. This panel dives into readiness strategies that work during real disruptions—incident command structures, clinical downtime procedures, network containment, identity recovery, and restoration sequencing that prioritizes care delivery. Panelists will discuss how to test plans realistically, reduce recovery time, and make tough decisions fast while balancing patient safety, operations, communications, and compliance.


2:00-2:30
Presentation with Raphael O. Adeyemo, Founder, The Pathfinders' Network: Trusted Autonomy: Governing Agentic AI in Clinical Environments

Healthcare now runs on digital trust. When systems fail, care is disrupted, outcomes change, and cybersecurity incidents become clinical events. In 2026, patient safety is directly tied to cyber resilience.

This keynote examines how ransomware, legacy infrastructure, supply chain exposure, and insecure connected devices translate into bedside impact. Drawing on recent healthcare disruptions and evolving regulatory mandates, it reframes cybersecurity as a core component of quality management and product safety.

As hospitals scale toward millions of connected and AI-enabled devices, the risk surface expands. Agentic AI will only be as trustworthy as the infrastructure it inherits. The path forward requires secure-by-design development, visibility into device ecosystems, blast-radius containment, workforce resilience, and tight integration between clinical and cyber leadership.

Trusted autonomy is not about adding intelligence. It is about governing it safely, so innovation strengthens care rather than putting it at risk.


Speakers

Our speakers bring unmatched expertise and real-world experience in cybersecurity, risk management, and business strategy. Through engaging keynotes, panels, and discussions, they deliver actionable insights and practical solutions that help CISOs and security leaders stay ahead of evolving threats.

Sponsors

The Official Cybersecurity Summit connects innovative solution providers with the cybersecurity leaders who evaluate and influence purchasing decisions. With a dynamic exhibition hall and a packed agenda of interactive panels and engaging sessions, this event offers unmatched opportunities to showcase solutions and build meaningful connections.

Partners

The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.

Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.

Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.

Please note these qualifications pertain to all attendees, including members of our partner organizations.