About
Join us for a unique conference for the health care industry!
You will hear from health care leaders about their experiences with cyber attacks.
Industry experts will share their insight into minimizing the risk of attacks and steps to take once an attack has occurred.
Who is this conference for?
Making the decision to prioritize and resource cybersecurity in health care will require organizational culture shifts and increased support and direction from leadership, as well as changes to the way providers perform their duties in clinical environments.
Health Care Industry Cybersecurity Task Force, Report on Improving Health Care Industry Cybersecurity.
Why should you attend?
1. GET INSIGHTS
into other organizations’ cyber attack stories and lessons learned.
2. SHARE
information about your cybersecurity resources, challenges, and ideas to strengthen the cyber resilience of the health care sector.
3. CONNECT
with experts in this field. Make new contacts and discover new opportunities.
2020 Agenda
2021 Agenda Coming Soon. Book Now!
Login
Opening Remarks
Attack Response Solutions: How to Prevent Attacks and Build an Effective Cyber Hygiene Culture
BridgeCare Health Network in Colorado receives thousands of attacks over the course of a week but have built robust solutions to prevent the attacks from penetrating their secure systems. With 91% of all ransomware attacks executed through phishing, having a culture that is alert to threats, is an essential component in your front line defence of cyber-attacks. In this session learn how to:
- Understand when an attack is taking place and act quickly to prevent a breach
- Learn how BridgeCare developed a strategy for prevent breaches
- Provide the leadership support – and training – necessary to create a cyber tuned culture
Michael Archuleta
Chief Information Officer
Information Security Officer
BridgeCare Health Network – Mt. San Rafael Hospital
Hacking Demonstration: Understand How an Attack Occurs and How it Moves Through Your Systems
Most healthcare professionals know about hacks, but very few have seen what one looks like in the moments it’s happening. This demonstration will take you through the various stages of an attack, from the initiation infection to the pathway it takes to shut down systems, machines, restarts, encryption and data collection. This valuable session will arm you with the knowledge you need to understand the way attacks occur, and how you can build your systems to mitigate their effectiveness and defend against them. Some of the examples we will explore include:
- The attack pathway
- Shutting down and taking over medical devices, such as MRIs
- Gaining access to patient records, encrypting them for ransom, or stealing them
- And many other examples!
Yousif Nakkash
Network Systems Support, Department of Computer Science
Ryerson University
Attack Simulation: How To Respond Hour by Hour
When attacks occur, you must react quickly to maximize your effectiveness. To understand what an effective response looks like, HIROC will show how you should respond in real-time, including:
- Which steps you should take, and in which order
- How to initiate the response, and how to mobilize your team
- How to seal off and protect sensitive data
- How to report the attack up the chain
Incident Response: Mandatory Reporting Obligations, Best Practices and Tribunal Processes of the Office of the Information and Privacy Commissioner of Ontario (IPC)
There remains much confusion over what organizations need to do once they experience an attack. In Ontario, health information custodians must report to the IPC where personal health information is subject to a ransomware or other malware attack. Custodians also have a duty to notify individuals whose privacy has been breached. Understand custodian’s obligations, as we go over:
- What must be reported, how and when?
- Guidance on responding to a ransomware attack.
- What are the IPC’s processes where an attack is reported.
Brendan Gray
Health Law Counsel
Office of the Information & Privacy Commissioner of Ontario
Cyber Attacks and Risk: Understand How To Protect Yourself From Attacks and Class Action
Recent events surrounding various healthcare organizations have highlighted the risks and vulnerabilities that go to the heart of healthcare providers. Health records are extremely valuable, and therefore a target for many hackers. From ransomware, to extortion, and selling information on the dark web, stealing patient records is becoming a big business. Hear stories from a legal team on the front lines and learn what you can do to protect yourself.
- What proactive steps can you take before and after a breach to try to dissuade legal action, or pre-empt a successful claim?
- How have the courts responded to proposed class actions against health care providers who have been subjected to data breaches?
- What kinds of remedies do class members seek, and what have they been successful in achieving?
Margaret Waddell
Founding Partner & COO
Waddell Phillips Barristers
Speakers
On-Going Call for Speakers
The proposals of interest will be focused on:
- Case studies: cyber attacks at different organizations
- Cyber security solutions
- Interal and external communications after a cyber breach
Please email us at info@sparkconferences.com to receive more information.
Presenters receive a free registration to the conference.
We look forward to receiving your submissions!
Prices
Event Ticket
- Access to all conference sessions
- Network with delegates and speakers (microphone and camera required)
- Access to speaker presentations
- Access to all sessions on-demand after the conference
Groups (per Organization)
- Group rates available for 3 or more delegates from the same organization
- Network with delegates and speakers (microphone and camera required)
- One-on-one or group chat
- Get access to all presentations in electronic format
Vendor Ticket
- Access to all conference sessions
- Network with delegates and speakers (microphone and camera required)
- One-on-one or group chat
- Access to speaker presentations
- Access to all sessions on-demand after the conference
Win A Free Ticket
Enter for a chance to win free entry to the conference. Winners will be drawn at random and notified via email up to November 10.
See our full terms and conditions for more details.
Location

UHN BMO Education & Conference Centre
60 Leonard Ave
Toronto, ON
M5T 2R1
Located inside Toronto Western Hospital
Hosting an event at the BMO Education & Conference Centre allows us to give back, as revenues that are generated by the BMO Education & Conference Centre are reinvested back into the hospital to support both Education and Clinical Care.
Accommodations
For a map of hotels in the area click here.