← BACK
Health Stealth Radio
Cybersecurity and Privacy have become increasingly complicated, not only from a technology perspective, but also regarding the purely human responses needed to data breaches. Most healthcare systems don’t care to share insights on how their cybersecurity systems were cracked, and even fewer wish to share how they got their data back, whether through sleuth technology or by direct financial negotiations using cryptocurrencies.
Frank Cutitta, VP of CHIME Digital Health Insights, has over 40 years of experience in the media, information technology, and healthcare industries. He is responsible for all editorial and custom content , as well as virtual events produced by the DHI group. Most recently launched the CompassionIT and Hospital at Home Technology Summits as well as co-producing the State of Cybersecurity in Healthcare summit.
Over the years he launched some of the most iconic IT media brands in 90 countries including Computerworld, PC World, Network World, and CIO. He was the lead on the first Soviet American media joint venture in history with the launch of MIR PK (PC World USSR). His international career then led him to work in the intelligence sector during his time in the former USSR and Cuba.
Subsequently he served as the CEO of the International Advertising Association.
In addition to being a graduate professor of healthcare informatics and communications, he serves on the board of JBJS, the world’s leading orthopedic journal, The Journal of Patient Experience, and as Co-Chair of the Spaulding Rehabilitation Network’s Patient Family Advisory Council. He previously served on the Global Board for HIMSS for 6 years.
He has written hundreds of articles focusing on healthcare, global branding, cross cultural communications, patient experience, hospital at home, and artificial intelligence. He was recognized by FOLIO as one of the Top 40 Influencers and Innovators in the Media/Publishing industry. He currently resides with his wife on a lake in Wayland, Massachusetts where he spends his free time as an obsessive cook.
Lisa Gallagher, CHIME's National Cybersecurity Advisor, has over 35 years of experience in cybersecurity and technology. Her expertise spans areas such as mergers and acquisitions, enterprise risk governance, and CISO coaching. Previously, she held leadership roles at PwC and HIMSS, and served as co-Chair of the ONC HITSC.
Lisa often
Health Stealth Radio Sponsorship Opportunities
Health Stealth Radio Podcast
$1,500 for 1 episode
$4,250 for 3 episodes
$8,500 for 6 episodes
The program is designed to rise above the noise of the repetitive topics in the dozens of cybersecurity podcasts and digital media. The fact that the content will thrive on the combination of provocation, mystique, and wonder, will draw a more diverse and engaged audience than those on the air and in print.
The programming will take an NPR approach whereby the topics will be covered independent of commercialism, but worthy of sponsorship given their connection with thought leadership in a stealthy package. Finally, every broadcast presents the opportunity for content asset extensions that broaden or deepen the topics of the radio programming. A bonus is that this programming will serve as excellent sales enablement training modules for vendor marketing and go-to-market teams.
Sample topics include:
- The emergence of the healthcare data hostage negotiator
- Breaches and responses to remote monitoring devices.
- “Fireside Spats” on controversial platforms and strategies
- Developments in crypto transaction intelligence
- How insurers are building new risk prevention and response teams for cyber
- How generative and open AI create opportunities for a new form of subversive attacks
- Building the global cybersecurity brand called YOU!
- How (un)recognizable will the composition of the cybersecurity workforce of 2025 be?
- The global complexities of cyber breach and response
- The CFO’s (and Board’s) Guide to budgeting for cybersecurity breaches and ransom.
- Do ex-military and intelligence make the best CISOs?
- Spy versus Spy; Lessons learned from former hackers who came in from the cold
- The truth about foreign data gathering on popular social media platforms
- The evolution of cybersecurity as care delivery becomes increasingly remote and distributed ·
- Health-related wearable and implanted device hacks
- What bothers CISOs the most about their vendors?
