Day 3- Friday, September 15th

7:45 AM - 8:50 AM Networking Breakfast

8:50 AM - 9:00 AM Chairperson’s Opening Remarks

Fred Kwong, CISO, Delta Dental


Fred Kwong

Delta Dental


9:00 AM - 9:40 AM Defending and Protecting Healthcare Against Cyber Criminals

Darren Lacey, CISO, Johns Hopkins University
Undoubtedly, healthcare is a prime target for cyber criminals. Threats only seem to be increasing. In this session, we will discuss common threats and ways to plan around them. The advanced persistent threat landscape continues to evolve with sophistication of attacks continuing to grow. As it is often a matter of when an attack will occur, this session will focus on identifying risks, strategic protection of assets, threat detection, the response steps and the recovery and the documentation process. New technology can introduce new vulnerabilities and points of access into the network.

•Exploring potential privacy and cyber security concerns related to new technology

•Examining incident response in light of collaborative and connected nature of health care

•Evolving sophistication of criminal threats and necessary action steps

•Utilizing an integrated organizational approach to optimize threat intelligence indicators

Darren Lacey

Johns Hopkins University

9:40 AM - 10:10 AM An Enterprise Immune System: Using Machine Learning for Next Generation Healthcare Security

Austin Eppstein, Account Executive, Darktrace
The legacy approach to cyber defense is far outpaced by the advanced threats and attacks we are seeing today. While total prevention of compromise is untenable, security teams can be proactive in defending against novel attacks that bypass traditional security defense by utilizing automated self-learning technologies to detect and respond to emerging threats within a network. Instead of focusing on where the next attack will come from, we must rather focus on our own environment and what is normal for the bespoke network as a whole

In this session, learn real world examples of:

•How new machine learning and mathematics are automating advanced threat detection

•Why 100% network visibility allows you to preempt emerging threats in real time.

•How unsupervised machine learning and recursive mathematics allow the ability to achieve full visibility and prevent attacks at the earliest stages; before they become a serious threat


Austin Eppstein

Account Executive

10:15 AM - 10:45 AM Business Meeting

10:45 AM - 11:15 AM Business Meeting

11:15 AM - 12:00 PM Effective Business Communications Across the C-Suite to Better Secure the Enterprise

Tamika Bass, CISO, Georgia Department of Public Health
Cyber security is just one responsibility of the CISO, with high profile data breaches in the new regulatory era, communication with the board and the rest of the C-suite is paramount. CISOs must shape the message and methods to address unique organizational dynamics. Explore the soft-side of the CISO role, in this practical session on how to communicate risk to the business

Join this session to learn how to:

•Engage, manage and meet board and C-Suite expectations

•Security is not just a technology issue but involves enterprise information risk

•Top-down focus on risk management


Tamika Bass

Georgia Department of Public Health

12:00 PM - 12:00 PM Chairperson’s Closing Remarks