Additional Content Downloads

NEW!! Exclusive Interview with Herman Doering, SISO from St. Luke's Health System

NEW!! Exclusive Interview with Herman Doering, SISO from St. Luke's Health System

From medical devices to access controls, St. Luke's Health System System Information Security Officer Herman Doering discusses considerations to improve management of vendor and business partner risks.
NEW!! Security Experimentation: An Interview with UnitedHealth Group's Aaron Rinehart

NEW!! Security Experimentation: An Interview with UnitedHealth Group's Aaron Rinehart

Aaron Rinehart, Chief Enterprise Security Architect at UnitedHealth Group, discusses the shift from security testing to security experimentation, including security chaos experimentation, adversity testing and operational instrumentation.

NEW!! Women in IT: An Interview with NIH Clinical Center's CISO, Jothi Dugar

NEW!! Women in IT: An Interview with NIH Clinical Center's CISO, Jothi Dugar

Listen to Jothi Dugar, Chief Information Security Officer (CISO) for the National Institute of Health as she discusses the role of being a woman in the IT industry.

NEW!! Exclusive Interview with Tim Swope, CISO from Catholic Health Services of Long Island

NEW!! Exclusive Interview with Tim Swope, CISO from Catholic Health Services of Long Island

In this interview, Catholic Health Services of Long Island CISO Tim Swope provides an overview of HITRUST and how the risk management framework aligns to security controls.

NEW!! Exclusive Interview with Gift of Hope Organ & Tissue Donor Network's, Edward Marchewka

NEW!! Exclusive Interview with Gift of Hope Organ & Tissue Donor Network's, Edward Marchewka

Listen to Edward Marchewka, Director of Information and Technology Services for the Gift of Hope Organ & Tissue Donor Network as he discusses visual thinking in Cyber Security.

Vendor Risk Management Maturity Model: An Interview with Premise Health CISO Joey Johnson

Vendor Risk Management Maturity Model: An Interview with Premise Health CISO Joey Johnson

As Chief Information Security Officer for Premise Health, Joey Johnson knows a lot about vendor risk - both as a service provider and as a client. “Our clients, very large organizations for whom we keep a lot of sensitive data, constantly subject us to vendor risk assessment activities. On the flip side, we assess risk for the third parties we outsource that provide our firm niche healthcare services.”

Last year, Joey spoke about the incredible important task of mitigating vendor risk in his Day 3 session, Transitioning from Vendor Risk Management to Vendor Maturity Modeling. Watch Joey talk more about this topic here.

Interview with Thomas DeLaine, Director of Information Security

Interview with Thomas DeLaine, Director of Information Security

In this interview, Comprehensive Health Service Information Security  Director Thomas P. DeLaine, Jr. discusses cyber security incident management response planning.


NEW!! The Cost of Data Breaches

NEW!! The Cost of Data Breaches

Download this exclusive video that touches on data breaches and the costs associated with them. At the Cyber Security for Financial Services Exchange network with your peers and gain insightful knowledge on what your peers are doing to help alleviate the pitfalls associated with data breaches within their organizations.

The Exchange Difference

The Exchange Difference

Still not sure how the Exchange format is different from your average industry conference? Download this free PDF to explore the unique benefits including personalized agendas, capped attendance, and much more!

Preparing for An IQPC Exchange Event

Preparing for An IQPC Exchange Event

Get an exclusive view on what makes an IQPC Exchange unique and sets us apart from the competition. This video gives you a first hand look and testimonials about our events. So take a look and see why we constantly set the bar and have repeat attendees!