← BACK
Health Stealth Radio
Cybersecurity and Privacy have become increasingly complicated, not only from a technology perspective, but also regarding the purely human responses needed to data breaches. Most healthcare systems don’t care to share insights on how their cybersecurity systems were cracked, and even fewer wish to share how they got their data back, whether through sleuth technology or by direct financial negotiations using cryptocurrencies.
Frank Cutitta has over 40 years of experience in the media, information technology, and healthcare industries. Over the years he launched some of the most iconic IT media brands in 90 countries including Computerworld, PC World, Network World, and CIO. His international career then led him to work in the intelligence sector during his time in the former USSR and Cuba.In addition to being a graduate professor of healthcare informatics and communications, he serves on the board of JBJS, the world’s leading orthopedic journal, and as Co-Chair of the Spaulding Rehabilitation Network’s Patient Family Advisory Council. He previously served on the Global Board for HIMSS for 6 years.He was recognized by FOLIO as one of the Top 40 Influencers and Innovators in the Media/Publishing industry. In addition to writing hundreds of articles on global communications, IT, and healthcare, his book on the Digital Transformation of Healthcare will be released in 2024.
Health Stealth Radio Sponsorship Opportunities
Health Stealth Radio Podcast
$1,500 for 1 episode
$4,250 for 3 episodes
$8,500 for 6 episodes
The program is designed to rise above the noise of the repetitive topics in the dozens of cybersecurity podcasts and digital media. The fact that the content will thrive on the combination of provocation, mystique, and wonder, will draw a more diverse and engaged audience than those on the air and in print.
The programming will take an NPR approach whereby the topics will be covered independent of commercialism, but worthy of sponsorship given their connection with thought leadership in a stealthy package. Finally, every broadcast presents the opportunity for content asset extensions that broaden or deepen the topics of the radio programming. A bonus is that this programming will serve as excellent sales enablement training modules for vendor marketing and go-to-market teams.
Sample topics include:
- The emergence of the healthcare data hostage negotiator
- Breaches and responses to remote monitoring devices.
- “Fireside Spats” on controversial platforms and strategies
- Developments in crypto transaction intelligence
- How insurers are building new risk prevention and response teams for cyber
- How generative and OpenAI create opportunities for a new form of subversive attacks
- Building the global cybersecurity brand called YOU!
- How (un)recognizable will the composition of the cybersecurity workforce of 2025 be?
- The global complexities of cyber breach and response
- The CFO’s (and Board’s) Guide to budgeting for cybersecurity breaches and ransom.
- Do ex-military and intelligence make the best CISOs?
- Spy versus Spy; Lessons learned from former hackers who came in from the cold
- The truth about foreign data gathering on popular social media platforms
- The evolution of cybersecurity as care delivery becomes increasingly remote and distributed ·
- Health-related wearable and implanted device hacks
- What bothers CISOs the most about their vendors