Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, February 25, 202610:30 amNetworking Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
11:00 amOPENING KEYNOTERegistration Level:
Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmBeyond the Bedside: Securing Healthcare in a CrisisRegistration Level:
Open Sessions
12:00 pm - 12:45 pmHospitals are more than just places of healing; they are critical infrastructure vital to national security. This session explores the unique challenges faced by healthcare security teams in safeguarding patients, staff, and sensitive data during large-scale events. From natural disasters to cyberattacks and pandemics, we’ll examine how to build resilience, ensure continuity of care, and protect this vital sector. We will discuss how Operational Technology plays into the security of the org.
12:00 pmMedical Device CybersecurityPractical information on the evolving medical device cybersecurity ecosystemRegistration Level:
Open Sessions
12:00 pm - 12:45 pmThe recent escalation of cyber-attacks and the potential for combined cyber and physical attacks means the healthcare industry must better secure itself. We’ll describe “whole of community” approaches to medical device vulnerability management and proactively developing regional plans that integrate cyber into overall emergency preparedness and response.
12:00 pmSecuring the Supply ChainRegistration Level:
Open Sessions
12:00 pm - 12:45 pmA discussion of managing third-party risk and how to manage expectations and contracts with vendors.
12:00 pmAI Governance in HealthcareRegistration Level:
Open Sessions
12:00 pm - 12:45 pmSession description to come.
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:00 pmLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmAI-Driven Cybersecurity: The Good, the Bad, and the UglyRegistration Level:
Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pm[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsRegistration Level:
Open Sessions
1:00 pm - 1:45 pmThis panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Three cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.1:00 pmZero Trust Is a Good Start—Continuous Adaptive Trust Is the GoalRegistration Level:
Open Sessions
1:00 pm - 1:45 pmLegacy network security models that assume a rigid perimeter and implicitly trust everything inside are vulnerable to attack. Unfortunately, this describes the state of many health care systems today. Because so many people with differing roles interact with healthcare data, zero trust principles can mitigate such vulnerabilities and bring health care systems into the modern age. However, zero trust principles are only a starting point. Ultimately, some trust must be extended or nothing happens. Context-aware continuous adaptive trust offers more flexibility than simple binary allow-or-block decisions. Context can change, so it should be continuously evaluated, which might require adapting the level of trust. By balancing trust against risk, well-secured health care systems can match the type of access to the value of protected information assets.
In this session, you’ll learn the following about zero trust strategies:
- the prerequisites and goals
- the importance of signals as a foundation
- why combining context and content is so effective
- a high-level framework for implementation
1:00 pmMapping Healthcare Risks: Medical Device Exposures TrendsRegistration Level:
Open Sessions
1:00 pm - 1:45 pmThis session will provide an in-depth analysis of the current landscape of medical device exposures, leveraging insights from global scans and data trends. Attendees will explore the evolving attack surface in the healthcare sector, gain visibility into prevalent vulnerability trends, and uncover actionable strategies to enhance their cybersecurity posture. Designed for healthcare security executives, this session equips organizations to identify and prioritize exposure risks, ensuring patient safety and organizational resilience in the face of emerging threats.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmHIPAA's Digital Evolution: Understanding the 2024 Security Rule OverhaulRegistration Level:
Open Sessions
2:00 pm - 2:45 pmThe healthcare industry stands at the threshold of its most significant cybersecurity transformation in over a decade with the December 2024 HIPAA Security Rule update. This presentation unpacks the sweeping changes proposed in the Office of Civil Rights’ 330+ page Notice of Proposed Rulemaking, highlighting how these modifications will reshape healthcare cybersecurity practices.
At its core, the update eliminates the ambiguous “addressable” implementation specifications that have long allowed healthcare organizations to sidestep crucial security measures. The new rule mandates specific security controls including bi-annual vulnerability scanning, annual penetration testing, encryption requirements, multi-factor authentication, and network segmentation.
We’ll explore how these changes reflect the evolution from paper-based records to today’s digital healthcare ecosystem, and why traditional compliance approaches will no longer suffice. The presentation will detail practical implications for healthcare organizations, including new documentation requirements, specific timeframes for access management, and enhanced backup and contingency planning protocols.
Whether you’re a healthcare administrator, IT professional, or compliance officer, understanding these forthcoming requirements is crucial for maintaining HIPAA compliance and protecting patient data in an increasingly complex threat landscape.
2:00 pmSecure and Explainable AI in HealthcareRegistration Level:
Open Sessions
2:00 pm - 2:45 pmHealthcare technology organizations are quickly adopting AI solutions to enhance clinical processes, patient engagement, and operational efficiency. Technology and cybersecurity leaders must embrace the challenge of securing AI solutions while maintaining ethical integrity and regulatory compliance. This session offers a step-by-step blueprint for designing, deploying, and sustaining AI systems in a secure, ethical, explainable, and compliant manner. Drawing on case studies, you will learn about proven strategies for integrating cybersecurity, privacy, and regulatory controls for ethical and explainable implementation of AI solutions in the healthcare industry.
2:00 pmDefend and Recover: How MHXDR Shields Healthcare from Its Most Visible ThreatsRegistration Level:
Open Sessions
2:00 pm - 2:45 pmHealthcare is under siege—not only from ransomware, but from the systemic complexity that undermines fast, effective cyber defense. Traditional detection tools leave healthcare systems blind to gaps, siloed in response, and slow to adapt. It’s time for a shift. Join Blackwell Security for a strategic dive into Healthcare-Specific XDR (MHXDR) and how tailored threat operations create speed, precision, and resilience in the face of relentless threats.
This session will explore how our Helix threat operations team and Blackwell Pulse platform work together to unify telemetry, automate triage, and leverage both internal and external threat intelligence—including dark web monitoring—for real-time enrichment and contextual response. We’ll walk through how our Managed Detection & Response (MDR) offering ensures that every alert is relevant, every response is decisive, and every client benefits from collective intelligence. More importantly, we’ll cover how our ransomware resilience layer (Blackwell Aegis) enables near-immediate recovery from attacks that evade traditional EDR, with automated isolation, recovery, and response—because in healthcare, delays cost lives.
Whether you’re a CISO or security architect, this session will offer a pragmatic view of how to prevent what you can, respond faster when it counts, and recover without the chaos.
2:00 pm[Panel] The Current Threat Landscape in HealthcareRegistration Level:
Open Sessions
2:00 pm - 2:45 pmJoin us as we dive into several of the top concerns in Healthcare. From deep web cards to BECs, ransomware, and more! Bring your questions for the panel.
2:45 pmNetworking BreakRegistration Level:
Open Sessions
2:45 pm - 3:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmCybersecurity in the Age of Machine Learning and Artificial IntelligenceRegistration Level:
Open Sessions
3:00 pm - 3:45 pmArtificial Intelligence (AI) coupled with Machine Learning (ML) has tremendous potential to strengthen defenses, but the benefits of ML/AI in cust be contextualized against the risks it poses. The usage of ML/AI has increased exponentially, but security and privacy governance and policies have not expanded at the same rate. Moreover, the pace of instituting AI and privacy regulations varies across the globe, creating a rather complex governance structure for cybersecurity personnel to operate under. This presentation delves into the security and privacy implications of using ML/AI in the organization, whether it is using ML/AI-based security tools or ensuring security of ML/AI-based products developed by the organization.
3:00 pm[Panel] Challenges in Healthcare LeadershipRegistration Level:
Open Sessions
3:00 pm - 3:45 pmHealthcare information security leadership faces a dynamic and intensifying threat landscape. This panel of experts will address critical challenges, including escalating ransomware attacks, stringent privacy regulations, and the complexities of managing insider threats. Discussions will explore strategies for mitigating risks associated with third-party vendors, addressing staffing shortages in cybersecurity, and finding downtime to recharge. Panelists will share insights on balancing patient safety with data protection, navigating compliance requirements, and building resilient security programs in an increasingly interconnected healthcare environment.
3:00 pmExploiting the Human Side: Phishing, Social Engineering, and Con ArtistsRegistration Level:
Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:45 pmNetworking BreakRegistration Level:
Open Sessions
3:45 pm - 4:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmCLOSING KEYNOTERegistration Level:
Open Sessions
4:00 pm - 4:45 pm
Hear from cybersecurity leaders on strategies and best practices for defending healthcare.