We use cookies to personalize content and to analyze our traffic. Please decide if you are willing to accept cookies from our website.

The Second Annual Cyber Security in Healthcare Event 2022

The Kia Oval, London 20 October 2022, 9:00am - 4:00pm

Day 1
8:00am
Registration
9:00am
Chair’s Welcome Address
David Hodnett, Head of Operations, NHS App
9:10am
Keynote Address: Launching The Government’s Latest National Cyber Strategy To Ensure That The UK’s Interests Are Protected In Cyberspace
  • Providing funding to help healthcare organisations remain resilient to heightened cyber threats
  • Reinforcing the UK’s economic and strategic strengths in cyberspace
  • Expanding offensive and defensive cyber capabilities and prioritising cyber security in the workplace, boardrooms and digital supply chains
  • Improving diversity in the cyber workforce through a scheme to ensure that people from all backgrounds have access to high skill, high priority jobs
Lord Bethell, Former Parliamentary Under-Secretary (Department of Health and Social Care) and Parliamentary Under Secretary of State (Minister for Technology, Innovation and Life Sciences)
9:30am
Keynote Address: Working To A Clear Recovery Strategy In Response To A Complex And Sophisticated Cyber-Attack
  • Lessons learned from the WannaCry attack, reviewing the past 5 years
  • Horizon-scanning, what are the imminent threats to cybersecurity and data security in health, and how can we mitigate risk?
  • Minimising risk throughout complex supply-chains
  • Evaluating the NHS Incident Response Plan and NHS England Emergency Preparedness, Resilience and Response Framework
  • Challenges and opportunities in the shift towards Integrated Care Systems
Dr Saira Ghafur, Lead for Digital Health at the Institute of Global Health Innovation, Imperial College London
9:50am
Keynote Address: Defending The Expanding Attack Surface
  •  The hard lessons learned from the devastating 2021 ransomware attack on the Irish Health Service Executive
  •  Everything is connected: uncovering the threat posed by global supply chains
Simon Walsh, Cyber Security Architect, Trend Micro
10:10am
Panel Session: Driving A More Diverse And Inclusive Culture In Cyber Security In The NHS

This panel session will explore the challenges and opportunities in diversifying the Cyber Security workforce both within the NHS, and in the UK Healthcare sector more broadly.

David Hodnett, Head of Operations, NHS App, Dr Saira Ghafur, Lead for Digital Health at the Institute of Global Health Innovation, Imperial College London; Camilla Currin, Senior Partner Manager, Trend Micro
10:40am
Break And Networking
11:10am
Cyberattack Path Generation And Prioritisation For Securing Healthcare Ecosystems

AI for HealthSec - A Dynamic and Self-Organized Artificial Swarm Intelligence Solution for Security and Privacy Threats in Healthcare ICT Infrastructures

Dr Shareeful Islam, Course Leader & Senior Lecturer - Cyber Security, Anglia Ruskin University
11:30am
Accurate Asset Inventory - The Foundation To Effective CyberSecurity Program
Patrick Taylor, Technical Account Manager, Qualys
11:50am
Security & Compliance For Data Sharing Within Trusted Research Environments (TREs)

From the Goldacre Review to the NHS Innovation HUBS there is a balance of maintaining the utility of data whilst privacy is preserved. Trusted Research Environments (TREs) as a concept is not new but has gained a lot of attention recently. Whether it is the silver bullet encapsulating security, data protection compliance and with the ability to save lives is garnering excitement. This talk explores the TRE concept from a first person point of view from the first person to successfully add non-governmental Children's Social Care data to the Office for National Statistics arguably the first TRE in existence.

James Robson, Data Protection Officer, The Evidence Quarter
12:20pm
Seminar Session A: Have You Been Breached Yet? Are You Sure?

Preventing and Protecting Your Organisation against an Inevitable Cyber Security Breach

Fallen victim to a data breach yet? If not, your organisation is one of the lucky ones - for now. Cyber attackers are using ever more sophisticated attempts to execute cyber-attacks on a daily basis. Realistically, it's unlikely that an organisation can swerve an attack without robust cyber security measures already in-place to prevent, detect and mitigate cyber threats.

Hear from Akamai's EMEA Director of Security Technology and Strategy Richard Meeus and:

  • Understand the common attacks in the cyber threat landscape - from DDoS, to phishing, MFA and microsegmentation.
  • Discover cyber security models and strategies to protect your organisation should it fall victim to an attack.
  • Learn how you can provide your users with risk-free access to applications and services.


Richard Meeus, Director of Security Technology and Strategy, EMEA, Akamai
12:20pm
Seminar Session B: Cybersecurity Delivered - Getting More From The Tools You Already Have

It’s hard to know what’s more complex these days, the threats, or the plethora of tools we use to contain them. What if the solution doesn’t involve buying any more cybersecurity product, but instead making better use of what you have?

Kostandino Kustas, Cyber Security Consultant, Sophos
12:50pm
Lunch And Networking
1:50pm
Seminar Session A: The Privileged Access Management Maturity Model: How To Start And Implement A Successful PAM Project

Join Delinea as we go through the journey of a successful PAM implementation. As 80% of cyber-attacks come from breached privileged accounts, there is a growing importance to manage at risk credentials and take control over you’re your vulnerable infrastructure. During this session we’ll discuss the importance of PAM, where to start and how to effectively increase your security posture by maturing your privileged access management.

Why join?

  • Understand the importance of PAM and why you should care
  • Get insight into why and how PAM projects fail
  • Gain tips on where to start your PAM journey and what to consider
  • Learn how to get visibility and control over your IT estate
  • Hear real life Healthcare use cases
Chris Dearden, Senior Sales Engineer, Delinea
1:50pm
Seminar Session B: Visibility’s Role In Managing The Attack Surface, Automating Security And Maintaining Compliance
  • Achieve complete visibility across IT, OT, IoT and IoMT environments to truly understand risk and compliance posture
  • Apply Zero Trust principles to anything joining the network and dynamically segment, inspect and block unknown or risky assets
  • Govern with confidence all assets connected to your network, in real time, without deploying agents or running scans
  • Integrate with existing end point, vulnerability scanners and other 3rd party security tools to orchestrate network wide response to attacks
  • Adhere to key requirements in the Data Security Protection Toolkit with simple to administer policy automation
Andrew Noonan, Systems Engineering Director Europe, Forescout Technologies
2:30pm
Anatomy Of A Ransomware Attack

It’s hard to believe, but Ransomware is decades old. However, in the last 5+ years its notoriety has really grown, going through nearly as many evolutions both in capabilities & the degree of organizational structures behind it. The scale of businesses targeted grew from 55% to 75% in just the last 12 months alone. With so much evolution and change, are existing prevention, detection & response strategies and capabilities still fit for purpose?

Joshua Faulkner, Sales Engineer - Public Sector, Cybereason
2:50pm
Case Study: Pennine Care NHS Foundation Trust’s Journey To Cyber Resilience With Rubrik
  • Intro to Mike Culshaw the CTO of Pennine Care NHS Foundation Trust’s
  • Q&A around Pennine Care NHS Foundation Trust’s journey to Cyber Resilience.
  • Overview from Mike Culshaw on his view on the Cyber landscape in the NHS
  • Questions from the audience
Rob Egley, Healthcare lead, Rubrik; Mike Culshaw, Chief Technology Officer, Pennine Care NHS Foundation Trust.
3:10pm
Case Study: Achieving DSP Compliance Through PAM
Adrian Boylan, Moorfields NHS Trust; Andy Sheret, ITHealth; Graham Hawkey, Osirium
3:30pm
Chair’s Summary And Close

David Hodnett, Head of Operations, NHS App

*Programme subject to change

Unsupported Browser

The web browser you are using to access this website is unsupported, which means certain aspects of the site wont work properly.

To use the website we recommend upgrading to a modern web browser such as Edge, Safari, Chrome, or Firefox if possible.

Proceed anyway (not recommended)