The 2017 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the Cybe ...
Healthcare Must Be Protected: Find Solutions This Year
Today’s CISOs are working to streamline technology services to improve the quality of care, while still keeping personal and corporate information safe and Intellectual Property secure. Join us this year at the 2017 Cyber Security for Healthcare Exchange to meet with solution providers who can keep ...
Download the Cyber Security for Healthcare Exchange 2018 Sponsorship BrochureThe 2018 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the freque ...
Interviews with Industry Leaders
NEW! Modern Security Risk Prevention: An Interview with Karl West, CISO of Intermountain Healthcare
In this interview, Karl West, CISO of Intermountain Healthcare talks with IQPC Exchange’s Kristen Schipfer-Barrett about the first steps of implementing security architecture, the benefits and drawbacks of communication, the recent spike in news stories about medical device hacking his priorities for 2016-2017 and what he was most looking forward...
Vendor Risk Management Maturity Model: An Interview with Premise Health CISO Joey Johnson
As Chief Information Security Officer for Premise Health, Joey Johnson knows a lot about vendor risk - both as a service provider and as a client. “Our clients, very large organizations for whom we keep a lot of sensitive data, constantly subject us to vendor risk assessment activities. On the...
Video Infographic: Data Breach Costs
What is the economic impact of a data breach? This short infographic video provides the average cost of a data breach, average cost per record and average cost by sector.
Cyber Security in the Information Age: Why every industry needs cyber security to combat cyber villains.
In the age of all things digital, almost every single person has left a footprint on the World Wide Web. We post and share information at the touch of a button, without much thought about where that information may go. With so much data being transmitted on a daily basis,...
US Cyber Security Attacks
Is your area a target to cyber security attacks? Find out if you are at risk of a cyber attack on this map and learn more at the 2017 Cyber Security for Healthcare Exchange.
Case Study: An Event Above The Rest
In this case study, Skipstone gives qualitative details about their experience sponsoring with IQPC Exchange. Skipstone gives examples of how an Exchange, an exclusive in-person event with decision maker attendees, is different from other events and how the Exchange has helped further their business goals.
Where does the cloud belong?
As organizations leverage cloud or hybrid solutions across applications like email, identity, customer, and storage management, it’s time to re-evaluate how the cloud can be leveraged. Find out more in this infographic that will cover Cloud Security, one of the points of interest in the 2017 Cyber Security for Healthcare...