Rock Stars of Connected Health Cybersecurity

A stolen medical report is 10x more valuable than a stolen credit card. Today’s consumer is more concerned than ever that their mobile health devices will be hacked. 

Whether you’re a provider, payer, medical device or PhRMA organization, you need to hear CISOs and scientists from Johns Hopkins, Cedars Sinai, IBM Watson, Qualcomm Life, and others talk about how you can predict attacks rather than just defend against breaches. Join us at our Rock Stars of Connected Health Cybersecurity event.




Top Chief Information Security Officers and scientists will tell you their strategies and solutions for preventing vulnerabilities including:

  • Blockchain: Can it optimize and secure medical records, patient-generated data, mobile communications and population health management?
  • Connected IoT devices: How to predict and prevent cyber breaches throughout the lifecycle 
  • Big data, medical networks and the cloud: The best ways to establish security, scrutiny and authentication
  • Telemedicine: Safeguarding your telemedicine systems and increasing patient confidence
  • Intersection of connected health and cybersecurity: Hear the latest and best trends for safely sharing sensitive data
  • Next-Gen Healthcare: Establishing security, privacy and compliance with regulations 




  • A unique opportunity in an intimate setting to meet the leading healthcare CISOs and scientists; hear their successes and failures.
  • In addition to their presentations, you’ll have a chance to personally ask each of them your questions.
  • Since this must-attend event is the only cybersecurity event in the connected health industry, you’ll be the first to hear about and implement predictive rather than just defense tactics against cyber attacks.



Rock Star Audience

Hear What Our Audience is Saying About the Rock Star Events:

"This was a really valuable event. The speakers and venue were excellent!" - J. Burroughs

"Great way to network with other people in my field looking for answers." - B. Swift



Dr. Fausto Bernardini



Dr. Fausto Bernardini

Vice President and Distinguished Engineer
IBM Watson Health Cloud Development

Dr. Bernardini leads product engineering for the Watson Health Cloud, the IBM platform that enables the integration of data and cognitive insight to improve outcomes and reduce cost in healthcare, while enabling the highest standards of security and data privacy. Prior to his current role, Dr. Bernardini led offering management, product engineering and client transformation consulting for IBM Cloud - Managed Services, a portfolio of offerings designed to host and manage both born-in-the-enterprise applications as well as cloud-native environments with an innovative, highly automated approach to devops.


Dr. Spencer SooHoo



Dr. Spencer SooHoo

Director, Research Informatics and Scientific Computing
Cedars-Sinai Medical Center

Dr. SooHoo is the Director, Research Informatics and Scientific Computing at Cedars-Sinai and also served as the Chief Security Officer. Eight years ago, he established the Cedars-Sinai Information Security Program, which started with a narrow focus on HIPAA Compliance. Today, Information Security is viewed as a valuable partner by the clinical and operational teams and now has access to a wide range of tools and resources to deal with the constantly evolving threats as well as ever increasing healthcare regulatory requirements. In his current role, he leverages his information security background in the building and deployment of secure tools for research informatics and scientific computing. Dr. SooHoo holds a BS in Electrical Engineering (University of Rochester), a MS in Electrical Engineering (George Washington University), and MS and PhD degrees in Biomedical Engineering (University of Southern California).
Mitch Parker

Mitch Parker

Executive Director, Information Security and Compliance
Indiana University Health

Mitchell Parker, CISSP, is the Executive Director of Information Security and Compliance at Indiana University Health. Previous to this job, he was the CISO at Temple Health, an academic health system in Philadelphia, PA. Mitch has done a significant amount of work in researching the effects of cloud computing, network-based threats, compliance, and privacy and security requirements on connected health devices. While he was at Temple, Mitch worked collaboratively with a number of EMR and biomedical equipment vendors to improve their security postures and provide a better quality of service.
James R. Mault, M.D., F.A.C.S.

James R. Mault, M.D., F.A.C.S.

Vice President and Chief Medical Officer
Qualcomm Life

James R. Mault, M.D., F.A.C.S., is the Vice President and Chief Medical Officer of Qualcomm Life as a result of their April 2013 acquisition of HealthyCircles, a Care Coordination and Remote Patient Monitoring Software Platform Company founded and led by Dr. Mault since 2009. Prior to starting HealthyCircles, Dr. Mault was the Director of New Products and Business Development for the Health Solutions Group at Microsoft. Dr. Mault has more than 30 years of experience in senior executive positions in the Health IT and Medical Device industry as well as clinical medicine. Dr. Mault has founded five Health IT and medical device companies, leading these companies to develop novel devices and software technologies, FDA approvals, and strategic partnerships with numerous Fortune 500 companies. He is the named inventor of over 80 issued and pending US Patents for a variety of novel health information and medical device innovations. He has been board-certified in both General Surgery and Cardiothoracic Surgery, having specialized in heart and lung transplantation, thoracic oncology and critical care. He has conducted academic medical research under numerous grant awards from the National Institutes of Health, American Cancer Society, and others.
Joshua Greenbaum

Joshua Greenbaum

Enterprise Application Consulting

Joshua has over 30 years of experience in the industry as a computer programmer, systems analyst, author, consultant, and industry analyst. Josh regularly consults with leading public and private enterprise software, database, infrastructure, implementation, and hardware companies, and advises end users on technology infrastructure and applications selection, development, and implementation issues.
Darren Lacey

Darren Lacey

Chief Information Security Officer
Johns Hopkins University

Darren Lacey has been chief information security officer and director of IT compliance for Johns Hopkins University and Johns Hopkins Medicine for nearly 12 years. He has worked in the technology sector as a developer, attorney, consultant and executive for more than 20 years. He serves on several committees related to homeland security, privacy and cyber-security. He was the first executive director of the Johns Hopkins University Information Security Institute, a National Security Agency Center of Academic Excellence in Information Assurance.




Morning Session: 9:00 a.m. – 12:30 p.m.

Dr. Fausto Bernardini

Vice President and Distinguished Engineer
IBM Watson Health Cloud Development

Security, Privacy and Compliance for Next-Gen Healthcare

With the proliferation of cloud computing, smartphones, mobile applications, tele-medicine and Internet of Things (IoT) devices, the healthcare sector is seeing unprecedented change in how medical data can be used and shared, and how medical services are delivered. The evolution and acceptance of cloud based platforms have fueled the explosion of data and technology in the healthcare space. Riding the wave of cognitive technologies like IBM Watson, we are witnessing AI-powered personalized treatment plans as well as continuous monitoring and automated drug administration. These trends have raised the bar on security and compliance, while simultaneously increasing the demand for privacy-preserving sharing of healthcare data. In this talk, we will examine the landscape of regulatory compliance requirements that warrant a top-down implementation and security risks that necessitate bottom-up protection of healthcare data, devices and services. We will give a flavor of the security, compliance, and privacy practices that the delivery and management of next-gen healthcare services demand. We will explore how recent innovations (such as Blockchain) can enable new levels of audit-readiness of healthcare operations and data.

Dr. Spencer SooHoo

Director, Research Informatics and Scientific Computing
Cedars-Sinai Medical Center

The Intersection of Connected Health and Security

Pervasive Internet and Wi-Fi connectivity and mobile devices technology can improve the delivery of health care, but they also present unique challenges to those responsible for ensuring the security and privacy of healthcare information. Uses range from messaging and video telemedicine sessions to Wi-Fi-connected infusion pumps for medications to robotic-assisted surgery. At the same time, healthcare reform has driven the increased adoption of EHRs (Electronic Health Records), which allows independent health care organizations to exchange patient records electronically instead of depending on paper records. EHRs also allows patients to be more engaged in the management of their own health. From a research prospective, the convergence of EHRs with connected technology makes it feasible to conduct research studies with millions of patients based on data collected from the EHR, self-entered data, or a combination of both. Again this presents challenges from both a technology and regulatory viewpoint. How does one safely share sensitive data and ensure that it is used as intended? This presentation will provide a broad sampling of the benefits and risks associated with healthcare connected technology.

Darren Lacey

Chief Information Security Officer
Johns Hopkins University

It’s Not Just About Compliance With HIPAA Anymore

Understand why a compliance-driven model isn’t sufficient for cyber defense anymore.

James Mault, MD, FACS

Chief Medical Officer and VP
Qualcomm Life

Discover How IoT is Making a Splash in Medical Verticals

Ensuring you have the right connectivity infrastructure needed to enable data capture from a variety of devices and diagnostics and therapeutic instruments to allow that data to flow securely into the hands of clinicians of any type.

Lunch: 12:30 p.m. - 2:00 p.m.

Afternoon Session: 2:00 p.m. – 5:00 p.m.


Josh Greenbaum (Moderator)

Enterprise Applications Consulting


What is the Impact of Blockchain on Connected Health?


Mitch Parker

Executive Director, Information Security and Compliance
Indiana University Health

Improving Architectures and Setting Expectations with Vendors

One of the major challenges of implementing Electronic Medical Record (EMR) systems is the large amount of devices that will be interfacing with it. The goal of the the EMR is to collect all the possible data on a patient and make it instantly available for decision-making. One of the challenges, however, is that you need to have processes in place to ensure that you've adequately protected your network and the devices on it from potential harm. The goal of this presentation is to educate the management of health systems on techniques they can use to protect their networks from harm while providing the vision of the connected EMR.







Reach the Top Connected Health Decision Makers -- Present and Future

Only IEEE Computer Society Attracts the C-Levels, the Top Techs, and the Hands-on Specifiers Who Are Driving This Rapidly Evolving Technology

When you sponsor the Rock Stars of Connected Health Cybersecurity, you reach a unique audience – a level of decision-makers who don’t attend other symposia.

With an agenda aimed at real-world, business-critical decision makers, and a lineup of experts unequaled at other technology events, the Rock Stars of Connected Health Cybersecurity is an obvious investment for any organization interested in influencing the future of connected health technology.

  • Meet this influential group of users and potential users face-to-face
  • Enjoy the highly personal nature of the event to network and enhance your brand
  • Generate leads in a group where every attendee is a prospect
  • Share lunch and cocktails with people you want and need to know
  • Stimulate discussions resulting from the engaging, leading-edge presentations
  • Showcase your products and services in a dynamic, engaged environment


"We are very enthused about all the hot leads and intimate conversations we had with the attendees at the IEEE Rock Star conference. This event was a great opportunity for us because we met the right people  -- the tech decision makers. The quality of the event was excellent for both attendees and vendors. We look forward sponsoring more of IEEE Rock Star events." - Deron E. Tross, Enterprise Account Manager, BAE Systems Applied Intelligence.

"The Rock Star Event generated a lot of great business conversations and was extremely well run. I would recommend the event to anyone looking to attract high quality prospects." -Darin Pendergraft, VP of Marketing, SecureAuth


Take advantage of these unique sponsorship opportunities –

Panel Speaker Slot

Lunch Roundtable Sponsor – Bring a current customer and share your company’s health cybersecurity technology story with a captive audience during lunch.

Official Program Advertising

Conference Bag Insert

Sponsorship Contact

For more information and to secure your Connected Health sponsorship and/or exhibit space, please contact:

Sandy Brown
Helen Scott


Attendee Job Titles


Recommended Hotel Information

Gaylord National Resort & Convention Center


Rock Stars of Connected Health Cybersecurity will be held at the Gaylord National Resort & Convention Center. This riverside convention and business resort, with a 19-story glass atrium, is 10 miles from the U.S. Capitol and 12.6 miles from the Lincoln Memorial.  


TEL + 1 301 965 4000

Attend the Rock Stars of Connected Health Cybersecurity

The Rock Stars of Connected Health Cybersecurity will be held on December 11, 2016 at the Gaylord National Resort & Convention Center.

Gaylord National Resort

Gaylord National Resort

201 Waterfront Street

National Harbor, MD 20745, USA

Phone: (301) 965-4000

Directions from Ronald Reagan Washington National Airport - DCA

Follow signs to George Washing Parkway South to Alexandra. Veer right at the sign to Slaters Lane, make a right at traffic light. Follow signs to US Route 1 and merge onto US-1. Follow signs to I-95 North (Maryland). Veer right at signs toward I-95. Veer left toward I-95 and merge onto I-95 North / I-495 East (Capital Beltway). Cross Woodrow Wilson Bridge toward Maryland. Take exit 2A toward National Harbor. Turn right on Waterfront Street. The resort is on the right.

Distance from hotel: 8 miles




Connected Health Cybersecurity Badge

Register Now for Rock Stars of Connected Health Cybersecurity


11 December 2016, Washington, DC

General Attendee or Member: $149 | SPECIAL DISCOUNT: $79

Registration Instructions:

1. Go to Connected Health Conference registration page.
2. Select General Attendee.
3. Start an account or login as a returning attendee.
4. Registration options will appear – select Global Digital Health Forum & Optional Events Only.
5. Select Rock Stars of Connected Health Cybersecurity for $79.