Sunday, September 23

11:00 AM - 11:45 AM Registration

11:45 AM - 1:15 PM Networking Lunch

1:15 PM - 1:25 PM Orientation

1:25 PM - 1:35 PM Chairperson’s Opening Remarks

Opening Keynote

1:35 PM - 2:05 PM Beyond Ransomware: Healthcare Networks Prepare for the Next Cyber Attack

Payers and healthcare networks must stay ahead of current trends in the cyber attacks. Hackers target healthcare primarily to take medical records or extort ransom payment. It is anticipated ransomware will still affect healthcare but cyber criminals will also target the vast number of IoT devices that are readily found in operating rooms, clinics, and diagnostic laboratories. The nation’s healthcare sector is 90 percent privately owned and operated with a complex network that protects sensitive data. Discuss impacts and lessons learned from recent attacks and vulnerabilities such as WannaCry and Meltdown and the latest security breaches. Explore proactive approaches to prepare for the next potential impact.
Join this session to learn how to:
•Innovative ways to communicate with the healthcare team to meet common goals
•Counter emerging attacks with new approaches to preventing and isolating attacks
•Implement systems for cyber threat information and incident sharing


2:05 PM - 2:35 PM Reclaiming Control and Reducing Risk at Your Endpoints

For machine learning to improve endpoint security; it must adapt to evolving threats as well as the specific enterprise dynamics. Understanding the layers needing protection within healthcare is key. What is normal behavior in one setting can be abnormal behavior in other circumstances.
Endpoint security must look at the full range of adversarial techniques to effectively stop targeted attacks. While proper visibility and controls are desired, what electronic health data is actually at the endpoints?
In this session examine:
· Providing endpoint data visibility historically and in real time
· Balancing reliance on security professionals and utilizing machines
Reducing and minimizing the effects of attacks

2:40 PM - 3:10 PM Business Meetings

3:40 PM - 4:10 PM Business Meetings

2:40 PM - 3:10 PM Business Meetings


4:15 PM - 5:00 PM Serving and Protecting While Improving Security Awareness

Evolving medical technologies improve lives as well as expand access to data and devices for hackers. Cyber criminals continue to successfully and consistently exploit human nature to accomplish their goals. Employees are often the last line of defense between a sophisticated phishing scheme and internal systems, data, and medical devices. This session will provide practical advice to help organizations leverage timely and consistent security awareness and behavior management practices to strengthen the human link.
In this session;
•Providing relatable and relevant case studies to engage employees
•Outlining how and where tools are helpful
•Motivating continuous, positive security actions
•Shifting to detection and response


4:15 PM - 5:00 PM Automating Risk Reduction with Big Data

Machine learning can be utilized to improve outcomes in protecting healthcare data. Data and analytics allow the quick identification of anomalies and potential advanced threat actors. The availability of big data and analytical tools has led to a broader understanding of customers’ risk for actions ranging from fraudulent medical claims from identity theft to shutting down a hospital system from a ransomware attack. Some of the biggest gaps in data analysis include identifying advanced malware, credential theft, and insider threats. Big data assists in the visualization of cyberattacks which allows classification and categorization of cyber threats in order to build baseline behaviors and prevent attacks, which is complex in the fluid medical community.
In this session:
•Utilizing broad-base risk modelling to identify and define a customer profile
•Classifying and categorizing data into clear potential attack patterns
•Deploying cloud intelligence and automation to detect and respond to suspicious activity

5:00 PM - 5:15 PM Networking Break

Ignite Session

5:15 PM - 5:50 PM Three Quick Fire Presentations in Thirty Minutes. Talk about getting to the crux of the matter, fast!

•Pre-Empting Attacks -- The Best Medicine for Ransomware
•Tackling Compliance- Collaborative Approaches in the Healthcare Community
•Closing the Healthcare Gap- Decommissioning Legacy Systems

Cyber Health CISO Roundtable Discussions

5:50 PM - 6:30 PM Engage in your choice of targeted discussions for open exchange among industry

A.Proactive Patching and Mitigation Against Spectre, Meltdown and Other Vulnerabilities
B.Artificial Intelligence and Security- Benefits and Risks
C.Surviving a Cyber Attack- Lessons Learned from a Breach

6:30 PM - 7:00 PM Networking Cocktail & Dinner