Day 1- Wednesday, September 13th

11:00 AM - 11:40 AM Welcome Brunch & Registration

11:45 AM - 12:00 PM Sponsor Orientation

11:45 AM - 12:00 PM Delegate Orientation

12:00 PM - 12:20 PM Ice Breaker

12:20 PM - 12:30 PM Chairperson’s Opening Remarks

Opening Keynote

12:30 PM - 1:15 PM Operationalizing Healthcare for Holistic Improvements to Security

Due to the targeted 2016 attacks against healthcare, organizations are now much more aware of information security risks. Cyber security is now very much part of the business discussion, rather than strictly serving as a mandate of corporate IT. Executives are realizing that security is very different from compliance. It was how to survive an audit, now it is how to survive an attack. Security is moving beyond check listing to true security.

Security is being viewed outside of the traditional IT department beyond servers and computers and on to anything and everything that can be connected to the network. While patient data is still a concern because of HIPAA and other regulatory requirements, now there is concern over any networked device that can affect care delivery. This includes, vending machines, HVAC, building systems, pagers, and security cameras.

•Operationalizing security to make it efficient, effect and relevant
•Managing risk while integrating existing and new technologies
•Developing effective change management to the people, processes and technology
•Streamlining communications and involving all parties in security globe, adapting promotional, advertising, and selling strategies to local preferences

1:15 PM - 1:30 PM Networking Break

Plenary Session

1:30 PM - 2:00 PM Evolving Healthcare Security : Proactive Approach to Security and Compliance

Michael Sardaryzadeh, CISO, Prime Healthcare
Perfect security does not exist and some breaches cannot be avoided. But proper planning can reduce the likelihood of an attack and mitigate the potential impact. The Chief Information Officer serves as a “translator” between the business and technology divisions of the enterprise. The executive’s role is becoming more risk focused and is much more business-oriented than solely Information Technology. The CISO within healthcare has the added task of meeting regulatory compliance while achieving corporate security requirements. Discuss various ways to create a collaborative approach implementing, processes, accountabilities and controls.
In this session:
•Examine the current threat landscape and common vulnerabilities affecting healthcare
•Create, design and test privacy and security plans shaped to address specific organizational requirements
•Build internal and external partnerships to achieve compliance and security including legal, audit and other stakeholders
•Aligning physical security, cyber insurance, contracts, biomedical device security, compliance and privacy

Michael Sardaryzadeh

Prime Healthcare


2:00 PM - 2:30 PM Rise of Ransomware Attacks

The variety and volume of ransomware and malware attacks continues to increase. Ransomware, which is malicious software that encrypts the infected computer files and keeps the owner from accessing them until a fee is paid, is becoming more targeted and expensive to the enterprise. Beyond ransomware, what will be the next source of attacks and network infections?

In this session examine:
•Strains of ransomware and how they are infecting networks
•Effective mitigation strategies
•Incident response, what to do if infected

2:35 PM - 3:05 PM Business Meeting

2:35 PM - 3:05 PM Networking Break

3:05 PM - 3:35 PM Business Meeting

3:05 PM - 3:35 PM Networking Break

3:35 PM - 3:50 PM Business Meeting

3:35 PM - 3:50 PM Networking Break


4:10 PM - 4:55 PM Using Big Data and Predictive Analytics to Navigate Risk

Enterprise risk assessment and modelling using predictive analytics is a major tool. The availability of big data and the tools used to process data from multiple sources has led to a more comprehensive understanding of customers’ risk for actions ranging from defaulting on debt to suffering a major medical incident. Using these tools and techniques to their fullest capacity will save enterprises money and time in the long run by avoiding less-desirable outcomes.

In this session:
•Introducing the newest innovations for more precise assessment
•Utilizing broad-base risk modelling to identify and define a customer profile
•Exercising prudence in selecting data sets to avoid discriminatory analysis


2:10 PM - 2:55 PM Proactive Hunting with Next-Generation Endpoint Protection

The scale of breaches continues to grow including infiltrating privileged data, which include customer and corporate records. Some of the breaches could be preventive with the proactive deployment of next-generation endpoint technology along with an aggressive hunting. This combination combats advanced adversaries and reduces attack surfaces.

In this session:
•Implementing and fine-tuning proactive hunting to protect against breaches
•Pairing humans and machines to aggressively detect threat behaviors
•Navigating through vast information to achieve endpoint visibility

5:00 PM - 5:30 PM Business Meeting

5:30 PM - 6:00 PM Business Meeting

Roundtable 1

6:00 PM - 6:40 PM Empowering Employees to Combat Phishing, Ransomware and Other Social Attacks

Roundtable 2

6:00 PM - 6:40 PM Combatting the Growing Cyber Crime Marketplace- Healthcare-related Cyber Terrorism

Roundtable 3

6:00 PM - 6:40 PM How to Trust the Cloud? Adapting the Cloud to Healthcare Needs

6:40 PM - 6:40 PM Networking Cocktail Discussion