Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, February 25, 2026
    10:30 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    11:00 am
    [Opening Keynote] Securing Autonomous Agents: The New Trust Frontier in Healthcare
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    The healthcare and life science industry is transitioning from simple chatbots to Agentic AI—autonomous systems that take action. This shift introduces a systemic vulnerability: the “Agentic Gap.”

    This session explores the evolution from data theft to logic hijacking. We examine how threat actors target “Shadow Agents” within workflows using indirect prompt injection to manipulate AI decision-making. In this era, attackers may not “hack” systems but rather “convince” agents to bypass instructions.

    We provide strategic guidance for governing agents and establishing rules of engagement. Attendees will gain a holistic approach to securing autonomous tools, ensuring patient safety as teams are empowered by AI.

    Learning Objectives:

    • Distinguish “Shadow AI” from “Shadow Agents” to identify risks in autonomous workflows
    • Assess logic hijacking and prompt injection for better AI risk evaluation
    • Build a governance architecture to secure data and patient safety
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    What to Expect Post Incident from HHS OCR
    • session level icon
    Focus Areas: Incident Response / SIEM; Privacy; Ransomware; Malware
    speaker photo
    Cybersecurity and Privacy Attorney, Clark Hill PLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Most healthcare entities have to report incidents that impact Protected Health Information to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR). What does the initial reporting look like? What comes next? Will HHS OCR have follow-up questions or audit our cybersecurity practices? If so, what will they look for? How do we survive these audits? What are the likely and potential penalties?

    12:00 pm
    Beyond the Link: A Deep Dive into Telegram’s Shadow Economy
    • session level icon
    Focus Areas: Digital Forensics, Crypto Crime, Cyber Investigation, Telegram
    speaker photo
    Network Intrusion Forensic Analyst, Denver Field Office, United States Secret Service
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In the modern threat landscape, a single malicious link is often just the entryway into a sophisticated, multi-layered financial ecosystem. For investigators, the trail doesn’t end at the malware execution; it leads into the increasingly complex world of encrypted messaging platforms that function as their own parallel networks.

    This session provides a “play-by-play” forensic breakdown of a live cryptocurrency scam investigation. Led by a Network Intrusion Forensics Analyst from the U.S. Secret Service, we will deconstruct the anatomy of an attack from the initial infection vector to the final laundering stages.

    Attendees will gain insight into:

    • The Initial Pivot: How forensic artifacts from malware lead investigators directly into the heart of Telegram-based command and control structures.
    • The Telegram Infrastructure: An exploration of the app’s evolution into a decentralized ecosystem, featuring its own internal currency and parallel network capabilities.
    • The Crypto Lifecycle: How scammers leverage decentralized finance (DeFi) to move and obfuscate illicit funds.
    • Investigative Methodology: Real-world techniques used by federal analysts to map out global scam networks operating within “untraceable” apps.

    Join us for a deep dive into the digital underground, where we strip away the layers of encryption to reveal the machinery of modern financial crime.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Healthcare's Data War Has Begun
    • session level icon
    Focus Areas: Healthcare Security, Cloud Security, Artificial Intelligence, Data Governance, Leadership & Strategy
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Healthcare is living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how patient care is delivered and how Protected Health Information (PHI) is managed. In this new era, your most valuable asset—patient trust and data—is under constant threat, not just from cybercriminals targeting hospitals, but from the rapid digitization of your own clinical infrastructure.

    In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots healthcare organizations face as they race to adopt clinical AI and migrate to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional hospital defenses, how AI is both a weapon against privacy and a shield for defense, and why the cloud isn’t inherently secure for medical data—unless you make it so.
    Whether you’re a CEO, CISO, or healthcare leader, this session will empower you with actionable frameworks to:
    The convergence is already here. The question is, are you leading with confidence, or leaving your patient data on life support?
    1:00 pm
    Pick Your Poison: The Healthcare Leadership Face-Off
    • session level icon
    Focus Areas: Healthcare Security, Leadership & Strategy, Risk Management, Incident Response, IoT / Medical Device Security
    speaker photo
    Director of Information Security, Children's Hospital of Philadelphia
    speaker photo
    CISO, Advarra
    speaker photo
    CISO, Cambridge Health Alliance
    speaker photo
    Deputy CISO, Collective Health
    speaker photo
    Professor, University of Denver
    speaker photo
    Digital Event Director, SecureWorld
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    In the high-stakes world of healthcare cybersecurity, there are rarely perfect solutions—only difficult trade-offs. Join us for an unscripted, high-energy session where top Health Sector leaders face off on the industry’s toughest hypothetical scenarios.

    Moderated in a rapid-fire game show format, our panelists will be presented with difficult “Would You Rather” choices ranging from ransomware dilemmas and legacy IoT risks to budget constraints and insider threats. They won’t just pick a side; they have to defend it.
    Attendees will gain a unique window into the minds of security leaders, understanding how they weigh patient safety against data privacy, and operational uptime against regulatory compliance. Come ready to vote on who makes the best case for the worst situations.

    1:00 pm
    Speaking the Language of Risk: Bridging the CISO-CFO Divide
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    For years, the relationship between security leadership and finance has been defined by a fundamental “language barrier.” While the CISO talks in vulnerabilities and threat vectors, the CFO thinks in terms of ROI, capital allocation, and fiscal resilience. This session moves beyond the myth that “security is too expensive” to address the real issue: a lack of shared vocabulary. Join a veteran vCISO and a seasoned CFO for a candid conversation on how to align technical requirements with business objectives. Attendees will learn how to transform security metrics into financial risk data that commands boardroom respect and secures long-term investment. The problem isn’t the budget; it’s the dictionary.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Your Weakest Link: Saying Goodbye to Vendor-Induced Chaos
    • session level icon
    Focus Areas: PHI; Third-Party Risk; Vendor Management; Data Breach
    speaker photo
    Associate, Baker & Hostetler LLP
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Healthcare continues to lead all sectors in third‑party data breaches, with large‑scale events like the Change Healthcare incident underscoring how deeply vendor failures can disrupt operations and expose PHI. In today’s increasingly interconnected world, third‑party incidents pose significant operational, security, and compliance risks.
    For InfoSec teams, this means incident readiness must extend beyond your own network. Proactive vendor‑risk management is critical: risk‑based vendor tiering, rigorous pre‑engagement security assessments, stronger BAA and contract terms, continuous monitoring of vendor controls, and routine reassessment of high‑risk partners. With regulators increasing scrutiny of vendor oversight and response timelines, organizations must also ensure alignment with evolving regulatory expectations.
    This session will give IT and security professionals a streamlined view of today’s third‑party threat landscape, practical guidance for managing and responding to vendor incidents, and actionable steps to build a more resilient vendor‑risk program before the next outage, breach, or supply‑chain event hits.
    2:00 pm
    Healthcare Cyber Debrief
    • session level icon
    Focus Areas: Healthcare Security, Geopolitics & Cyber Warfare, Critical Infrastructure, Nation-State Threats, Operational Resilience
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Healthcare is no longer on the sidelines of global conflict; it is a primary target. This session connects the dots between global geopolitical volatility and the immediate risks to hospital operations and patient safety. We will examine how conflicts involving major players like Russia, China, and the EU are reshaping the cyber threat landscape, specifically targeting medical research, critical infrastructure, and the healthcare supply chain.

    The discussion will pivot to the “internal” threat, analyzing the rapid evolution of AI in diagnostics and administration, and the resulting privacy minefield. From financially motivated ransomware gangs to state-aligned actors seeking to disrupt care, we will profile the adversaries threatening the sector. Join us for a 2026 outlook that moves beyond compliance, offering a battle-tested framework for maintaining resilience in the face of global instability.

    2:00 pm
    [Panel] Threat Landscape: Defeating BEC, Ransomware, and Supply Chain Chaos in Healthcare
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    For today’s healthcare organizations, “security” is no longer about preventing a breach—it’s about ensuring clinical continuity. Business Email Compromise (BEC) and Ransomware have become industrialized, targeting the interconnected web of vendors and cloud services that hospitals rely on every day.

    This session provides a pragmatic blueprint for securing the modern healthcare ecosystem against its most frequent attackers. We will move past the hype of “black swan” events to look at high-probability solutions for hardening the human element against BEC, exposing the “East-West” lateral movement used by ransomware, and leveraging cloud-native infrastructure for rapid recovery. Attendees will learn how to build a defense-in-depth strategy that ensures when the network is under fire, patient care doesn’t stop.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Inside the Digital Mind: How Cyberpsychology Shapes Behavior, Risk, and the Cyber Landscape
    • session level icon
    Focus Areas: Social Engineering, Security Awareness & Culture, Human-Centric Security, Cyber Psychology, Risk Management
    speaker photo
    Associate CISO, St. Luke's University Health Network
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    This session explores how human behavior in digital environments directly shapes modern cyber risk. Drawing from the research of forensic cyberpsychologist and author Mary Aiken, this talk reveals why people think, react, trust, click, overshare, and make decisions differently online — and how attackers exploit those predictable patterns. Participants will learn how digital psychology influences threat exposure, identity compromise, misinformation, social engineering, and organizational security culture. Attendees will walk away with practical, human-centered strategies for building safer digital environments and strengthening security programs by aligning controls with real human behavior.

    3:00 pm
    Resilience Is Not a Backup Plan: Designing Secure Health Systems That Can Adapt Under Fire
    • session level icon
    Focus Areas: Cyber Governance, Healthcare IT, Risk Management, Digital Transformation, Safety Culture
    speaker photo
    CDO & CDTO | Board Member & Advisor | Podcaster
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Healthcare organizations don’t fail because of cyber incidents — they fail when systems are brittle, fragmented, and unable to adapt under stress. This talk explores resilience as a design principle across people, technology, and governance, connecting cybersecurity decisions directly to patient safety and care continuity. Drawing on real healthcare leadership experiences, we’ll examine why resilience cannot be delegated to IT — and what leaders must do differently to build systems that bend instead of break.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    [Closing Keynote] Critical Condition: The Health-ISAC Global Threat Report
    • session level icon
    Focus Areas: Healthcare Security; Cyber Threat Intelligence; Supply Chain Security; Patient Safety; Operational Resilience
    speaker photo
    Strategic Threat Analyst, Health-ISAC
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Healthcare is no longer just a target for data theft; it is a battleground for patient safety and operational resilience. In this exclusive session, the Health-ISAC (Health Information Sharing and Analysis Center) unpacks their Annual Global Threat Report, revealing the most dangerous trends facing the sector today. From the evolution of extortion tactics and supply chain vulnerabilities to the weaponization of AI, we will dissect the adversaries’ new playbook. Join us to move beyond the headlines and get the vital intelligence needed to immunize your digital estate against the next generation of cyber threats.

Exhibitors
  • Google Cloud Security
    Booth: n/a

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Health-ISAC
    Booth: n/a

    Health-ISAC (Health Information Sharing and Analysis Center) plays an essential role providing situational awareness around cyber and physical security threats to the Health Sector so that companies can detect, mitigate, and respond to ensure operational resilience.

    The non-profit, private sector organization connects thousands of health security professionals globally to share peer insights, real-time alerts, and best practices in a trusted, collaborative environment.

    As the go-to source for timely, actionable, and relevant information, Health-ISAC is a force-multiplier that enables global health organizations of all sizes to enhance situation awareness, develop effective mitigation strategies, and proactively defend against threats every single day.

  • Ping Identity
    Booth: n/a

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Richard Halm
    Cybersecurity and Privacy Attorney, Clark Hill PLC

    Rick Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. Rick's breadth of experience within the incident response landscape—from leading incident response at the cyber insurance level, to experience at one of the nation’s largest health insurers, to his time in private practice—all blend together to allow him to approach cybersecurity and privacy incidents from a unique vantage point. As a U.S. Army veteran, he blends this vantage point with an ability to bring order and calm to complex and high-stress incidents.

  • speaker photo
    Jared Lobato
    Network Intrusion Forensic Analyst, Denver Field Office, United States Secret Service

    With a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification.  Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Sharon Finney
    Director of Information Security, Children's Hospital of Philadelphia

    With more than two decades of experience in the field, I am a highly accomplished and forward-thinking Chief Information Security Officer (CISO) specializing in integrating security solutions across enterprises, fostering innovation, and enhancing business outcomes. I'm passionate about staying at the cutting edge of security initiatives, leading change, and propelling the growth of organizations.

    Throughout my career, I've consistently demonstrated my ability to lead change and modernize initiatives with security at the forefront. I have an extensive track record of implementing effective policies, solutions, and frameworks to ensure long-term sustainability and drive organizational success. My expertise extends to talent management, fostering professional growth, and driving continuous learning.

    My dedication to maximizing bottom-line results in complex situations, aligning technology with business objectives, and streamlining security operations has allowed me to excel in diverse industries, including healthcare and technology. My signature strengths encompass strategic planning and execution, technology risk management, governance, risk, and compliance, incident response, and more.

  • speaker photo
    Esmond Kane
    CISO, Advarra

    Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.

  • speaker photo
    Astrid Lambert
    CISO, Cambridge Health Alliance

    Astrid Lambert is a seasoned leader with expertise in information security, healthcare analytics, database administration, and website development. Known for her forward-thinking leadership and innovative approach, she currently serves as CISO/Senior Director in the IT department at Cambridge Health Alliance, where she oversees strategic initiatives critical to the organization's success.

    Astrid's expertise has enabled Cambridge Health Alliance to make data-driven decisions, driving efficiency and improvements across multiple domains. A strong advocate for information security, she implements robust measures to protect sensitive healthcare data and ensure compliance with regulatory standards. She holds degrees in Industrial-Organizational Psychology and Industrial Engineering and is a Certified Information Systems Security Professional (CISSP).

    Beyond her professional accomplishments, Astrid is committed to making a positive impact on the broader healthcare community. She volunteers her time and expertise with various organizations, sharing her knowledge and helping others develop creative solutions to complex challenges.

  • speaker photo
    Arpine Long
    Deputy CISO, Collective Health
  • speaker photo
    Richard Staynings
    Professor, University of Denver

    Richard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised numerous government and industry leaders on their healthcare security strategy and defensive posture and has served as a subject matter expert on government Committees of Inquiry into some of the highest profile healthcare breaches.

    Richard is currently Chief Security Strategist for Cylera, a pioneer in the space of medical device and HIoT security. He is also author of Cyber Thoughts, a leading healthcare cybersecurity blog, teaches postgraduate courses in cybersecurity, health informatics and healthcare management at the University of Denver University College, and is a retained advisor to a number of governments and private companies.

    A recovering CISO, with more than 25 years’ experience of both cybersecurity leadership and client consulting in healthcare, Richard has lived in over 30 countries and delivered innovative solutions to organizations in all of them. When he’s not on a plane or speaking at an event, he can usually be found in the Rocky Mountains of Colorado, USA

    Some of his more notable successes include work for: Amgen, Cisco, CSC (now DxC), PricewaterhouseCoopers, Intel, Microsoft, Zurich Financial, and a long list of hospital and health systems.

  • speaker photo
    Tom Bechtold, Moderator
    Digital Event Director, SecureWorld

    Tom has been part of the SecureWorld team for more than 14 years, having launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the "Remote Sessions" webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.

  • speaker photo
    Kip Boyle
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Stefanie Ferrari
    Associate, Baker & Hostetler LLP

    A member of the Healthcare Privacy and Compliance team, Stefanie Ferrari is consistently called on as a key team member when complex HIPAA issues arise. Stefanie works closely with clients across the healthcare industry on responding to cybersecurity and data privacy incidents, regulatory defense and state and federal privacy compliance. Her hands-on approach recognizes the importance of prioritizing patient care and dealing with the unique challenges healthcare providers face. When a breach occurs, Stefanie guides clients through the initial response and investigation, while helping to ensure their regulatory obligations are met. Stefanie also has significant experience in dealing with vendor-related breaches and appreciates the nuances that arise on both the healthcare provider and vendor sides.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.

    Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.

  • speaker photo
    Google Cloud Security Representative
  • speaker photo
    Ping Identity Representative
  • speaker photo
    Krista Arndt
    Associate CISO, St. Luke's University Health Network

    Krista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.

    Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

    When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.

  • speaker photo
    Amy Yee
    CDO & CDTO | Board Member & Advisor | Podcaster

    Amy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.

  • speaker photo
    Ethan Muntz
    Strategic Threat Analyst, Health-ISAC

    Ethan Muntz is a Strategic Threat Analyst at Health-ISAC, where he specializes in identifying emerging threats to the global health sector and developing proactive risk mitigation strategies. With a strong background in Open Source Intelligence (OSINT) and dark web investigations, Ethan previously served as a task force member for the Anti-Human Trafficking Intelligence Initiative and led cybercrime operations at the Center for International Cyber Intelligence.
    He holds a Master of Science in Cyber Security and Privacy from the University of Central Florida and a B.S. in Global Security and Intelligence Studies. His expertise spans machine learning, incident handling, and geopolitical analysis, supported by his specialization in Chinese and Asian studies.

Learn and earn 6 CPE credits!

Hear from cybersecurity leaders on strategies and best practices for defending healthcare.