From data loss to care-delivery disruption
7th July 2026 • Online
Cyber attacks in healthcare are no longer just 'data breaches'. They cause shut-downs and patient harm. What needs to be done?
Keeping healthcare safe
The Conduent data breach, discovered on January 13, 2025, has escalated into one of the largest third-party data incidents In U.S. history, with 25 million affected Individuals. Attackers had unauthorized access to Conduent's systems from October 21, 2024, to January 13, 2025. The ransomware group SafePay (sometimes referred to as Safeway) claimed responsibility, alleging they exfiltrated 8.5 terabytes of data. The breach was traced back to compromised VPN credentials, which allowed hackers to encrypt internal systems.
Then there is Stryker, one of the world's largest medical technology companies with approximately 56,000 employees, $25.1 billion in revenue for 2025, and products that impact more than 150 mill ion patients annually. Attackers used Microsoft lntune and a compromised ad min account to remotely wipe 200,000 devices. The real-world impact was Immediate, Maryland's emergency medical services reported that Stryker's Ufenet ECG transmission system, which paramedics use to send cardiac data to hospitals ahead of patient arrival,, went offline.
These are just two of a series of really significant healthcare hacks that have occurred or been announced in just the first three months of 2026. Hackers are targeting primary care providers, third-party/ back-office suppliers (like Conduent), managed care providers/claims management companies like Sedgwick - essentially the entire healthcare supply chain. Careaoud, Waterloo Regional Health Centre lntracare, the list goes on.
So, what are the lessons from tt,e.se attacks and what should healthcare security leaders be focusing on right now? These are just some of the key takeaways:
- Stop living off the land: organisations need much better systems for detecting bad actors once they have gained access and more? sophisticated ways to find unusual activity. Also, detection is not enough: detection must trigger policy-mandated actions.
- Enforce phishing-resistant MFA: Many admin accounts still lack proper Multi-factor Authentication (MFA), providing an easy entry point.
- MOM/UEM platforms are hacker's biggest prize: unified Endpoint Management {UEM) platforms like lntune have near-total control over endpoints. If compromised, they can be used to wipe machines, distribute fake data, or push malicious configurations at scale.
- Bulk action controls: implement controls that prevent or flag bulk actions (like wiping 200,000 devices).
- Dual authorisation: require multi-admin approval for high-risk actions such as device wipes, retirements, or deletions.
- Third-party risk is just risk: your vendor risk is your risk. 98% of organizations globally have relationships with at least one breached third party. This breach confirms that attackers are actively targeting contractors to reach high-value targets. Organizations must view their security posture as inseparable from that of their vendors.
- Isolation Is not fool-proof: the incident showed that "isolated" network segments c.an still be compromised, meaning segmentation controls should be regularly tested and verified rather than assumed secure.
- Data retention policies need review: some breaches included data dating back to 2017-2019, emphasizing that holding outdated, sensitive data for too long increases risk.
- Contextualize "'low-risk"' findings: minor security findings can, when paired with factors like phishing or, as seen here, unauthorized access to a specific module, tum into critical breaches.
- Encryption at rest and in transit is Insufficient: attackers are targeting data while it is in a "clear" state-being actively processed meaning organizations must protect data during use.
- Implement Zero Trust: the incident reinforces the need for a "Zero Trust" approach, where no entity inside or outside the network is trusted and continuous verification is required.
- Prioritize resilience over trust: In a 2026 landscape where breaches are common, firms must shift from hoping for stability to designing for failure.
- Compliance Is not enough: the healthcare sector is a prime target for breaches because it handles high-value data. Organizations must move beyond mere compliance to proactive security strategies.
It's a long list, and it doesn't even Include IT/OT., At-enabled offence/defence,, or the need to reduce security complexity and the need to create real visibility across the whole security technology stack to be able to detect and stop modem attacks that use legitimate credentials and standard network tools.
That's why we a.re running the e-Crime & Cybersecurity Healthcare Summit, To give you a chance to hear your peers Jn the Industry talk about what they are doing now to improve their security posture, and what worries them most about the current threatscape.
Join us with your perspectives and help us make the healthcare sector a safer place for employees and patients.
The e-Crime & Cybersecurity Healthcare Summit will take place online and will look at how cybersecurity teams are tackling the latest challenges .
Join our real-life case studies and in-depth technical sessions and help make manufacturing secure.
The themes of this summit are:
Achieving visibility across ecosystems
From exposed initial access points such as warehouse management systems to complex machine control software, simply understanding your device and application landscape is a huge challenge. Can you help with asset tracking and endpoint visibility? And what about anomaly detection after that?
Data integrity a critical priority
In Al-powered retail, corrupted data equals corrupted decisions. Pricing engines, demand forecasts and recommendation systems are only as trustworthy as their inputs. CISOs must prioritise data lineage tracking, tamper detection, pipeline validation and cryptographic integrity controls across analytics and Al workflows.
Defending against the latest ransomware variants
Ransomware is effective precisely because it can exploit whatever weaknesses exist in your security architecture and processes. The threat and the actors are constantly evolving and that evolution is forcing the hands of government and causing havoc in the insurance market. What can CISOs do to better defend against ransomware?
Securing Agentic Al
Agentic systems don't just generate content - they act. CISOs must address model manipulation, prompt injection, data poisoning, tool-chain abuse and privilege escalation within Al agents executing transactions. Governance must extend beyond ML pipelines into runtime controls, behavioural monitoring and kill-switch design.
Why zero trust, isolation and segmentation are key
Retail ecosystems now include logistics APls, fintech integrations, marketplace sellers, social-commerce platforms and Saas pricing engines. Each connection expands attack surface. Continuous third-party risk scoring, API security testing, software bill of materials (SBOM) validation and zero-trust segmentation become foundational, not optional.
From Analysts to Al Supervisors
Retail security teams cannot scale headcount at the pace of digital transformation. The future SOC blends automation engineers, detection scientists and Al risk specialists. Peer collaboration, shared intelligence and trusted industry forums become force multipliers in defending fast-moving retail environments.
Making the best use of threat intelligence
In a preemptive security model, timing is everything - success depends on detecting and neutralizing threats before they become active incidents. To do this, security operations can't just rely on internal telemetry (e.g., endpoint or network logs). They need external, real-time context about emerging threats - where do they get it?
Security Posture Management
Traditional vulnerability scanners don't handle cloud native architectures well. Today's cloud environments spin up thousands
of ephemeral assets without a traditional OS, without an IP address for long. So how do you adapt to that dynamic, APl-driven reality? How can traditional tools connect the dots - not just generate tickets?
Improving continuous attack surface discovery
You need to know what attackers can see and what they can actually attack -and you need it on a continuous basis, not in some static inventory. Ideally you also need assets ranked by risk priority and put into the current threat and vulnerability context. Is this feasible and is it cost effective?
The power of automation
There's too much manual intervention in security. SOAR pulls data from SIEMs, EDRs, firewalls, cloud APls, ticketing systems threat intelligence feeds, and even email servers and coordinates actions across tools via APls and prebuilt integrations and intelligent playbooks. Well, that's the theory. How does it work in the real world?
Adversary simulation and behavioural analysis
Automated adversary simulation identifies telemetry blind spots. They provide prioritized remediation guidance and control effectiveness metrics. They track progress trends and validate security ROls as well as providing board and audit reporting.
How well do they work in practice?
Dealing with regulations
CISOs now must build a single coherent security program that simultaneously satisfies divergent regulatory demands; they must interpret vague legal standards into technical architectures, and they risk non-compliance if auditors, regulators, or courts interpret differently later; they face unrealistic expectations around incident reporting; and they face personal liability. Can RegTech help?