Day 1- Wednesday, September 13th


11:00 AM - 11:40 AM Welcome Brunch & Registration

11:45 AM - 12:00 PM Sponsor Orientation

11:45 AM - 12:00 PM Delegate Orientation

12:00 PM - 12:15 PM Ice Breaker

12:15 PM - 12:30 PM Chairperson’s Opening Remarks

Fred Kwong, CISO, Delta Dental

img

Fred Kwong

CISO
Delta Dental

Keynote

Opening Keynote

12:30 PM - 1:15 PM Evolving Healthcare Security : Proactive Approach to Security and Compliance

Sreekant Gottimukkala, CIO, Prime Healthcare Michael Sardaryzadeh, CISO, Prime Healthcare
Perfect security does not exist and some breaches cannot be avoided. But proper planning can reduce the likelihood of an attack and mitigate the potential impact. The Chief Information Officer serves as a “translator” between the business and technology divisions of the enterprise. The executive’s role is becoming more risk focused and is much more business-oriented than solely Information Technology. The CISO within healthcare has the added task of meeting regulatory compliance while achieving corporate security requirements. Discuss various ways to create a collaborative approach implementing, processes, accountabilities and controls.
In this session:

•Examine the current threat landscape and common vulnerabilities affecting healthcare
•Create, design and test privacy and security plans shaped to address specific organizational requirements
•Build internal and external partnerships to achieve compliance and security including legal, audit and other stakeholders
•Aligning physical security, cyber insurance, contracts, biomedical device security, compliance and privacy


img

Sreekant Gottimukkala

CIO
Prime Healthcare
img

Michael Sardaryzadeh

CISO
Prime Healthcare

1:15 PM - 1:30 PM Networking Break

Plenary Session

1:30 PM - 2:00 PM Healthcare and Public Health Sector Cyberdependencies

Given the high value of medical data on the black market, healthcare is a prime target of hackers and cyber criminals especially with the increased dependence on electronic health records and transmission of proprietary data digitally. Healthcare faces a number of cybersecurity challenges ranging from legacy systems to cyber workforce gaps. The consequences from a successful breach range from economic loss to death.


Session/Panel

2:00 PM - 2:30 PM Rise of Ransomware Attacks

The variety and volume of ransomware and malware attacks continues to increase. Ransomware, which is malicious software that encrypts the infected computer files and keeps the owner from accessing them until a fee is paid, is becoming more targeted and expensive to the enterprise. Beyond ransomware, what will be the next source of attacks and network infections?
In this session examine:

•Strains of ransomware and how they are infecting networks
•Effective mitigation strategies
•Incident response, what to do if infected

2:35 PM - 3:05 PM Business Meeting

2:35 PM - 3:05 PM Networking Break

3:05 PM - 3:35 PM Business Meeting

3:05 PM - 3:35 PM Networking Break

3:35 PM - 4:05 PM Business Meeting

3:35 PM - 4:05 PM Networking Break

Master Class

4:10 PM - 4:55 PM Best Practices and Future Direction of Security Awareness Training

Reported numbers may fluctuate from industry study to industry study, but they all agree on one thing: cybercriminals are successfully and consistently exploiting human nature to accomplish their goals. Employees are often the last line of defense between a sophisticated cyber-scam and your systems, data, and customers.

Healthcare information systems have proven to be an especially attractive target for cybercriminals. These systems are a virtual trove of identity-related data, payment information, and even intellectual property. It’s no surprise that criminals will seek the most effective methods, such as ransomware, to make a quick buck by holding systems hostage. While prudent security leaders know that security awareness and training is key to strengthening their ‘human firewall’ –they often don’t know where to start.

This session will provide practical advice to help healthcare organizations leverage effective security awareness and behavior management practices to strengthen their human firewall.

• Practical security awareness and behavior management tips
• Outlining how and where tools are helpful
• Emerging industry trends
• How to create a “human firewall”

Master Class

4:10 PM - 4:55 PM Leverage and Protect Your Investments in Cybersecurity to Expand Beyond Compliance into Endpoint Visibility and Control

Chris Covell, CIO, Absolute Software
This session, guided in part by attendee participation, will explore how to effectively utilize the cyber security solution stack required to move security past compliance and into protection of your assets and data. Participants will also discuss the challenges of implementing a complete security solution and ensuring investments are delivering as promised.
Participants will leave with the following take-aways from this session:

• Confidence in communication strategies with stakeholders ranging from executives to board members to explain the necessity of comprehensive cyber security solutions and the return on investment they can expect.

• Understanding of the importance of clear visibility into the complete environment, including potential dark endpoints that can be accessed to retrieve data, so as not to be lulled into a false sense of safety.

• Awareness of the need to leverage and protect investments in cyber security solution stacks.

img

Chris Covell

CIO
Absolute Software

5:00 PM - 5:30 PM Business Meeting

5:30 PM - 6:00 PM Business Meeting

Roundtable 1

6:00 PM - 6:45 PM Empowering Employees to Combat Phishing, Ransomware and Other Social Attacks

Walter Ray, CISO, Augusta University Medical Center

img

Walter Ray

CISO
Augusta University Medical Center

Roundtable 2

6:00 PM - 6:45 PM Improving Medical Device Security

Heath Renfrow, CISO, United States Army Medicine

img

Heath Renfrow

CISO
United States Army Medicine

Roundtable 3

6:00 PM - 6:45 PM How to Trust the Cloud? Adapting the Cloud to Healthcare Needs

Tamika Bass, CISO, Georgia Department of Public Health

img

Tamika Bass

CISO
Georgia Department of Public Health

6:45 PM - 6:45 PM Networking Cocktail Discussion