Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, February 25, 2026
    10:30 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    11:00 am
    [Opening Keynote] Securing Autonomous Agents: The New Trust Frontier in Healthcare
    • session level icon
    Focus Areas: Risk Management, Shadow IT, Shadow AI, Logic hijacking, Governance
    speaker photo
    Cloud Security Architect, Google Cloud
    speaker photo
    Cloud AI Security Architect, Google Cloud
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    The healthcare and life science industry is transitioning from simple chatbots to Agentic AI—autonomous systems that take action. This shift introduces a systemic vulnerability: the “Agentic Gap.”

    This session explores the evolution from data theft to logic hijacking. We examine how threat actors target “Shadow Agents” within workflows using indirect prompt injection to manipulate AI decision-making. In this era, attackers may not “hack” systems but rather “convince” agents to bypass instructions.

    We provide strategic guidance for governing agents and establishing rules of engagement. Attendees will gain a holistic approach to securing autonomous tools, ensuring patient safety as teams are empowered by AI.

    Learning Objectives:

    • Distinguish “Shadow AI” from “Shadow Agents” to identify risks in autonomous workflows
    • Assess logic hijacking and prompt injection for better AI risk evaluation
    • Build a governance architecture to secure data and patient safety
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    What to Expect Post Incident from HHS OCR
    • session level icon
    Focus Areas: Incident Response / SIEM; Privacy; Ransomware; Malware
    speaker photo
    Cybersecurity and Privacy Attorney, Clark Hill PLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Most healthcare entities have to report incidents that impact Protected Health Information to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR). What does the initial reporting look like? What comes next? Will HHS OCR have follow-up questions or audit our cybersecurity practices? If so, what will they look for? How do we survive these audits? What are the likely and potential penalties?

    12:00 pm
    Beyond the Link: A Deep Dive into Telegram’s Shadow Economy
    • session level icon
    Focus Areas: Digital Forensics, Crypto Crime, Cyber Investigation, Telegram
    speaker photo
    Network Intrusion Forensic Analyst, Denver Field Office, United States Secret Service
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In the modern threat landscape, a single malicious link is often just the entryway into a sophisticated, multi-layered financial ecosystem. For investigators, the trail doesn’t end at the malware execution; it leads into the increasingly complex world of encrypted messaging platforms that function as their own parallel networks.

    This session provides a “play-by-play” forensic breakdown of a live cryptocurrency scam investigation. Led by a Network Intrusion Forensics Analyst from the U.S. Secret Service, we will deconstruct the anatomy of an attack from the initial infection vector to the final laundering stages.

    Attendees will gain insight into:

    • The Initial Pivot: How forensic artifacts from malware lead investigators directly into the heart of Telegram-based command and control structures.
    • The Telegram Infrastructure: An exploration of the app’s evolution into a decentralized ecosystem, featuring its own internal currency and parallel network capabilities.
    • The Crypto Lifecycle: How scammers leverage decentralized finance (DeFi) to move and obfuscate illicit funds.
    • Investigative Methodology: Real-world techniques used by federal analysts to map out global scam networks operating within “untraceable” apps.

    Join us for a deep dive into the digital underground, where we strip away the layers of encryption to reveal the machinery of modern financial crime.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Healthcare's Data War Has Begun
    • session level icon
    Focus Areas: Healthcare Security, Cloud Security, Artificial Intelligence, Data Governance, Leadership & Strategy
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Healthcare is living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how patient care is delivered and how Protected Health Information (PHI) is managed. In this new era, your most valuable asset—patient trust and data—is under constant threat, not just from cybercriminals targeting hospitals, but from the rapid digitization of your own clinical infrastructure.

    In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots healthcare organizations face as they race to adopt clinical AI and migrate to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional hospital defenses, how AI is both a weapon against privacy and a shield for defense, and why the cloud isn’t inherently secure for medical data—unless you make it so.
    Whether you’re a CEO, CISO, or healthcare leader, this session will empower you with actionable frameworks to:
    The convergence is already here. The question is, are you leading with confidence, or leaving your patient data on life support?
    1:00 pm
    Pick Your Poison: The Healthcare Leadership Face-Off
    • session level icon
    Focus Areas: Healthcare Security, Leadership & Strategy, Risk Management, Incident Response, IoT / Medical Device Security
    speaker photo
    CISO, Advarra
    speaker photo
    CISO, Cambridge Health Alliance
    speaker photo
    Deputy CISO, Collective Health
    speaker photo
    Professor, University of Denver
    speaker photo
    Digital Event Director, SecureWorld
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    In the high-stakes world of healthcare cybersecurity, there are rarely perfect solutions—only difficult trade-offs. Join us for an unscripted, high-energy session where top Health Sector leaders face off on the industry’s toughest hypothetical scenarios.

    Moderated in a rapid-fire game show format, our panelists will be presented with difficult “Would You Rather” choices ranging from ransomware dilemmas and legacy IoT risks to budget constraints and insider threats. They won’t just pick a side; they have to defend it.
    Attendees will gain a unique window into the minds of security leaders, understanding how they weigh patient safety against data privacy, and operational uptime against regulatory compliance. Come ready to vote on who makes the best case for the worst situations.

    1:00 pm
    Speaking the Language of Risk: Bridging the CISO-CFO Divide
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    speaker photo
    Former CFO; Founder of kept.pro
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    For years, the relationship between security leadership and finance has been defined by a fundamental “language barrier.” While the CISO talks in vulnerabilities and threat vectors, the CFO thinks in terms of ROI, capital allocation, and fiscal resilience. This session moves beyond the myth that “security is too expensive” to address the real issue: a lack of shared vocabulary. Join a veteran vCISO and a seasoned CFO for a candid conversation on how to align technical requirements with business objectives. Attendees will learn how to transform security metrics into financial risk data that commands boardroom respect and secures long-term investment. The problem isn’t the budget; it’s the dictionary.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Your Weakest Link: Saying Goodbye to Vendor-Induced Chaos
    • session level icon
    Focus Areas: PHI; Third-Party Risk; Vendor Management; Data Breach
    speaker photo
    Associate, Baker & Hostetler LLP
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Healthcare continues to lead all sectors in third‑party data breaches, with large‑scale events like the Change Healthcare incident underscoring how deeply vendor failures can disrupt operations and expose PHI. In today’s increasingly interconnected world, third‑party incidents pose significant operational, security, and compliance risks.
    For InfoSec teams, this means incident readiness must extend beyond your own network. Proactive vendor‑risk management is critical: risk‑based vendor tiering, rigorous pre‑engagement security assessments, stronger BAA and contract terms, continuous monitoring of vendor controls, and routine reassessment of high‑risk partners. With regulators increasing scrutiny of vendor oversight and response timelines, organizations must also ensure alignment with evolving regulatory expectations.
    This session will give IT and security professionals a streamlined view of today’s third‑party threat landscape, practical guidance for managing and responding to vendor incidents, and actionable steps to build a more resilient vendor‑risk program before the next outage, breach, or supply‑chain event hits.
    2:00 pm
    Healthcare Cyber Debrief
    • session level icon
    Focus Areas: Healthcare Security, Geopolitics & Cyber Warfare, Critical Infrastructure, Nation-State Threats, Operational Resilience
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Healthcare is no longer on the sidelines of global conflict; it is a primary target. This session connects the dots between global geopolitical volatility and the immediate risks to hospital operations and patient safety. We will examine how conflicts involving major players like Russia, China, and the EU are reshaping the cyber threat landscape, specifically targeting medical research, critical infrastructure, and the healthcare supply chain.

    The discussion will pivot to the “internal” threat, analyzing the rapid evolution of AI in diagnostics and administration, and the resulting privacy minefield. From financially motivated ransomware gangs to state-aligned actors seeking to disrupt care, we will profile the adversaries threatening the sector. Join us for a 2026 outlook that moves beyond compliance, offering a battle-tested framework for maintaining resilience in the face of global instability.

    2:00 pm
    [Panel] Threat Landscape: Defeating BEC, Ransomware, and Supply Chain Chaos in Healthcare
    • session level icon
    speaker photo
    Deputy Chief Analyst, Google Threat Intelligence Group
    speaker photo
    Director, Cybersecurity Solution and Industry Marketing, Ping Identity
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    For today’s healthcare organizations, “security” is no longer about preventing a breach—it’s about ensuring clinical continuity. Business Email Compromise (BEC) and Ransomware have become industrialized, targeting the interconnected web of vendors and cloud services that hospitals rely on every day.

    This session provides a pragmatic blueprint for securing the modern healthcare ecosystem against its most frequent attackers. We will move past the hype of “black swan” events to look at high-probability solutions for hardening the human element against BEC, exposing the “East-West” lateral movement used by ransomware, and leveraging cloud-native infrastructure for rapid recovery. Attendees will learn how to build a defense-in-depth strategy that ensures when the network is under fire, patient care doesn’t stop.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Inside the Digital Mind: How Cyberpsychology Shapes Behavior, Risk, and the Cyber Landscape
    • session level icon
    Focus Areas: Social Engineering, Security Awareness & Culture, Human-Centric Security, Cyber Psychology, Risk Management
    speaker photo
    Associate CISO, St. Luke's University Health Network
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    This session explores how human behavior in digital environments directly shapes modern cyber risk. Drawing from the research of forensic cyberpsychologist and author Mary Aiken, this talk reveals why people think, react, trust, click, overshare, and make decisions differently online — and how attackers exploit those predictable patterns. Participants will learn how digital psychology influences threat exposure, identity compromise, misinformation, social engineering, and organizational security culture. Attendees will walk away with practical, human-centered strategies for building safer digital environments and strengthening security programs by aligning controls with real human behavior.

    3:00 pm
    Resilience Is Not a Backup Plan: Designing Secure Health Systems That Can Adapt Under Fire
    • session level icon
    Focus Areas: Cyber Governance, Healthcare IT, Risk Management, Digital Transformation, Safety Culture
    speaker photo
    CDO & CDTO | Board Member & Advisor | Podcaster
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Healthcare organizations don’t fail because of cyber incidents — they fail when systems are brittle, fragmented, and unable to adapt under stress. This talk explores resilience as a design principle across people, technology, and governance, connecting cybersecurity decisions directly to patient safety and care continuity. Drawing on real healthcare leadership experiences, we’ll examine why resilience cannot be delegated to IT — and what leaders must do differently to build systems that bend instead of break.

    3:00 pm
    Authenticity, Uniqueness, and Credibility: Securing Healthcare Identity in the Age of AI
    • session level icon
    speaker photo
    Engineering Manager, LinkedIn
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    As Generative AI accelerates synthetic data creation, the healthcare sector faces critical risks in telemedicine fraud and provider impersonation. In this session, I will introduce the AUC Framework—a practical model for designing trust signals in identity systems. Drawing from large-scale infrastructure experience at LinkedIn and Oracle Health Sciences, we will explore leveraging metadata, cryptographic provenance, and AI-based verification to distinguish legitimate providers from synthetic actors. Attendees will gain architectural strategies to preserve trust and compliance within an increasingly AI-mediated healthcare ecosystem.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    [Closing Keynote] Critical Condition: The Health-ISAC Global Threat Report
    • session level icon
    Focus Areas: Healthcare Security; Cyber Threat Intelligence; Supply Chain Security; Patient Safety; Operational Resilience
    speaker photo
    Strategic Threat Analyst, Health-ISAC
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Healthcare is no longer just a target for data theft; it is a battleground for patient safety and operational resilience. In this exclusive session, the Health-ISAC (Health Information Sharing and Analysis Center) unpacks their Annual Global Threat Report, revealing the most dangerous trends facing the sector today. From the evolution of extortion tactics and supply chain vulnerabilities to the weaponization of AI, we will dissect the adversaries’ new playbook. Join us to move beyond the headlines and get the vital intelligence needed to immunize your digital estate against the next generation of cyber threats.

Exhibitors
  • Google Cloud Security
    Booth: n/a

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Health-ISAC
    Booth: n/a

    Health-ISAC (Health Information Sharing and Analysis Center) plays an essential role providing situational awareness around cyber and physical security threats to the Health Sector so that companies can detect, mitigate, and respond to ensure operational resilience.

    The non-profit, private sector organization connects thousands of health security professionals globally to share peer insights, real-time alerts, and best practices in a trusted, collaborative environment.

    As the go-to source for timely, actionable, and relevant information, Health-ISAC is a force-multiplier that enables global health organizations of all sizes to enhance situation awareness, develop effective mitigation strategies, and proactively defend against threats every single day.

  • Ping Identity
    Booth: n/a

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Daniel Gremaud
    Cloud Security Architect, Google Cloud

    As a Google Cloud Security Architect, Daniel is a trusted advisor to HCLS customers and partners. Before Google, Daniel was a consultant at PricewaterhouseCoopers in their Cyber, Privacy and Forensics Practice. He is on the Board of Advisors to the University of Alabama Management Information Systems Department, serving the faculty and students brings him great joy. His goal is to not only secure his customer’s Google Cloud workloads, but also work to secure the entire sector.

  • speaker photo
    Aleksandra Savic
    Cloud AI Security Architect, Google Cloud

    Aleksandra blends security expertise, sales knowledge, and consultative skills to help companies establish and demonstrate cloud security. Aleksandra has a passion for learning new technologies and a commitment to customer service. She has contributed to the design and implementation of Bridgecrew's products, a leading security as code platform that was acquired by Palo Alto Networks. She has also supported and empowered customers and partners in various cloud computing environments, such as AWS, Azure, and GCP, with a focus on security, privacy, and regulatory compliance. Aleks is a public advocate of Google Cloud and cloud computing, and has participated in conferences, industry training, and related events.

  • speaker photo
    Richard Halm
    Cybersecurity and Privacy Attorney, Clark Hill PLC

    Rick Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. Rick's breadth of experience within the incident response landscape—from leading incident response at the cyber insurance level, to experience at one of the nation’s largest health insurers, to his time in private practice—all blend together to allow him to approach cybersecurity and privacy incidents from a unique vantage point. As a U.S. Army veteran, he blends this vantage point with an ability to bring order and calm to complex and high-stress incidents.

  • speaker photo
    Jared Lobato
    Network Intrusion Forensic Analyst, Denver Field Office, United States Secret Service

    With a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification.  Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Esmond Kane
    CISO, Advarra

    Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.

  • speaker photo
    Astrid Lambert
    CISO, Cambridge Health Alliance

    Astrid Lambert is a seasoned leader with expertise in information security, healthcare analytics, database administration, and website development. Known for her forward-thinking leadership and innovative approach, she currently serves as CISO/Senior Director in the IT department at Cambridge Health Alliance, where she oversees strategic initiatives critical to the organization's success.

    Astrid's expertise has enabled Cambridge Health Alliance to make data-driven decisions, driving efficiency and improvements across multiple domains. A strong advocate for information security, she implements robust measures to protect sensitive healthcare data and ensure compliance with regulatory standards. She holds degrees in Industrial-Organizational Psychology and Industrial Engineering and is a Certified Information Systems Security Professional (CISSP).

    Beyond her professional accomplishments, Astrid is committed to making a positive impact on the broader healthcare community. She volunteers her time and expertise with various organizations, sharing her knowledge and helping others develop creative solutions to complex challenges.

  • speaker photo
    Arpine Long
    Deputy CISO, Collective Health
  • speaker photo
    Richard Staynings
    Professor, University of Denver

    Richard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised numerous government and industry leaders on their healthcare security strategy and defensive posture and has served as a subject matter expert on government Committees of Inquiry into some of the highest profile healthcare breaches.

    Richard is currently Chief Security Strategist for Cylera, a pioneer in the space of medical device and HIoT security. He is also author of Cyber Thoughts, a leading healthcare cybersecurity blog, teaches postgraduate courses in cybersecurity, health informatics and healthcare management at the University of Denver University College, and is a retained advisor to a number of governments and private companies.

    A recovering CISO, with more than 25 years’ experience of both cybersecurity leadership and client consulting in healthcare, Richard has lived in over 30 countries and delivered innovative solutions to organizations in all of them. When he’s not on a plane or speaking at an event, he can usually be found in the Rocky Mountains of Colorado, USA

    Some of his more notable successes include work for: Amgen, Cisco, CSC (now DxC), PricewaterhouseCoopers, Intel, Microsoft, Zurich Financial, and a long list of hospital and health systems.

  • speaker photo
    Tom Bechtold, Moderator
    Digital Event Director, SecureWorld

    Tom has been part of the SecureWorld team for more than 14 years, having launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the "Remote Sessions" webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.

  • speaker photo
    Kip Boyle
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    James Wheeler
    Former CFO; Founder of kept.pro

    James Wheeler is a fractional CFO and the founder of kept.pro, which provides an outsourced accounting department model for growing companies with $2M–$50M in annual revenue. He brings 15+ years of executive finance leadership across services and technology businesses and was twice a finalist for the San Diego Business Journal’s CFO of the Year. James holds a BA in Economics and an MBA from UC San Diego, completed executive education at MIT Sloan, and has served on nonprofit and for-profit boards.

  • speaker photo
    Stefanie Ferrari
    Associate, Baker & Hostetler LLP

    A member of the Healthcare Privacy and Compliance team, Stefanie Ferrari is consistently called on as a key team member when complex HIPAA issues arise. Stefanie works closely with clients across the healthcare industry on responding to cybersecurity and data privacy incidents, regulatory defense and state and federal privacy compliance. Her hands-on approach recognizes the importance of prioritizing patient care and dealing with the unique challenges healthcare providers face. When a breach occurs, Stefanie guides clients through the initial response and investigation, while helping to ensure their regulatory obligations are met. Stefanie also has significant experience in dealing with vendor-related breaches and appreciates the nuances that arise on both the healthcare provider and vendor sides.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.

    Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.

  • speaker photo
    Luke McNamara
    Deputy Chief Analyst, Google Threat Intelligence Group

    Luke McNamara is the Deputy Chief Analyst with Mandiant Intelligence, with more than a decade of experience in cyber threat intelligence focusing on emerging threats and trends. His research has appeared in Bloomberg, CNBC, CNN, The Hill, The Nikkei, Lawfare, and other media outlets. Luke has presented at security conferences such as RSAC and Black Hat and hosts Mandiant’s Defenders Advantage podcast.

    In previous roles at FireEye, Luke led and produced research for FireEye's Strategic Analysis Team, delivering insights into macro cyber threat trends for executive clients. Before its acquisition by FireEye, Luke was an intelligence consultant and analyst at iSIGHT Partners. As a Cyber Espionage Analyst at iSIGHT Partners, his work involved tracking nation state threat activity targeting public and private sector enterprises from Russia, China, North Korea, and Iran. Prior to working in cybersecurity, he supported intelligence programs in the defense sector as a contractor, culminating in a tour on the counterinsurgency advisory group for the commander of the NATO/ISAF mission in Afghanistan.

    Luke McNamara holds a master’s degree from Columbia University's School of International and Public Affairs and an undergraduate degree from Patrick Henry College.

  • speaker photo
    Shasta Turney
    Director, Cybersecurity Solution and Industry Marketing, Ping Identity

    Decorated professional and engaged team player specializing in B2B product, solution, and industry marketing within the cybersecurity, identity and access management (IAM), and high tech software industry. Highly creative and enjoy solving problems and attaining goals. Strong presenter bringing subject matter to life with examples in every-day terminology. Professional writer. Cross-functional collaborator with internal l teams (Digital and Field Marketing, AR/PR, Corporate Marketing, Product Management, Partner and Channel Management, Solution Engineering, Sales) and external stakeholders (Partners, Customers, Analysts) to achieve goals and objectives.

  • speaker photo
    Krista Arndt
    Associate CISO, St. Luke's University Health Network

    Krista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.

    Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

    When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.

  • speaker photo
    Amy Yee
    CDO & CDTO | Board Member & Advisor | Podcaster

    Amy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.

  • speaker photo
    Shubham Anandani
    Engineering Manager, LinkedIn

    Shubham Anandani is an Engineering Manager at LinkedIn, where he leads teams focused on AI and professional identity platforms. Previously, at Oracle Health Sciences, he architected pioneering SaaS infrastructure for clinical trial randomization, serving Tier-1 pharmaceutical companies and ensuring FDA 21 CFR Part 11 compliance.

    He holds a Master’s in Software Engineering from Carnegie Mellon University and is a Senior Member of IEEE. Shubham combines deep expertise in distributed systems with a focus on responsible AI to solve complex security and identity challenges.

  • speaker photo
    Ethan Muntz
    Strategic Threat Analyst, Health-ISAC

    Ethan Muntz is a Strategic Threat Analyst at Health-ISAC, where he specializes in identifying emerging threats to the global health sector and developing proactive risk mitigation strategies. With a strong background in Open Source Intelligence (OSINT) and dark web investigations, Ethan previously served as a task force member for the Anti-Human Trafficking Intelligence Initiative and led cybercrime operations at the Center for International Cyber Intelligence.

    He holds a Master of Science in Cyber Security and Privacy from the University of Central Florida and a B.S. in Global Security and Intelligence Studies. His expertise spans machine learning, incident handling, and geopolitical analysis, supported by his specialization in Chinese and Asian studies.