Day 3- Friday, September 15th

7:45 AM - 8:30 AM Networking Breakfast

8:30 AM - 8:40 AM Chairperson’s Opening Remarks

Session/Panel

9:10 AM - 9:55 AM Defending and Protecting Healthcare Against Cyber Criminals

Undoubtedly healthcare is a prime target for cyber criminals. Threats only seem to be increasing. In this session examine discuss common threats and ways to plan. The advanced persistent threat landscape continues to evolve with sophistication of attacks continuing to grow. As it is often a matter of when an attack will occur, this session will look at identifying risks, strategic protection of assets, threat detection, the response steps and the recovery and documentation process. New technology can introduce new vulnerabilities and points of access into the network.

•Explore potential privacy and cybersecurity concerns related to new technology
•Examine incident response in light of collaborative and connected nature of health care
•Evolving sophistication of criminal threats and necessary action steps
•Utilizing an integrated organizational approach to optimize threat intelligence indicators.

10:00 AM - 10:30 AM Business Meeting

10:30 AM - 11:00 AM Business Meeting

Case-Study

11:00 AM - 11:30 AM Analyzing the Threat Landscape to Drive Security

The Chief Information Security Officer mitigates risk and right-sizes the risk to fit the appetite of the organization. The executive navigates the conversation, understanding the technical mechanics and making sure the corporation is getting good return on investment. In this discussion, explore how to identify and assess risk making sure endpoints are adequately protected and emerging risks are addressed. Guide the conversation in adopting risk frameworks and ensuring teams have the needed resources and skillsets.

• Analyzing the management of data and deploying analytical tools
• Implementing emerging threat technology and risk assessments
• Creating a culture of risk awareness
• Aligning with governance frameworks to facilitate decision-making
• Implementing a business-enablement mindset

Closing Workshop

11:30 AM - 12:00 PM Talent Development- Best Practices for Hiring, Training and Retaining Top Talent

Finding top Cybersecurity talent remains challenging with executives often working with very thin resources. Talent development including training, hiring, retaining, lost productivity, awareness training, and training specific to function are all part of the organization’s security mission. The lack of skilled people to fill current openings is a well known fact.

This session will discuss developing cybersecurity executives throughout their careers:
•Helping equip the next generation to understand what cybersecurity professionals are and what they do including the right recruitment practices
•Equipping hiring managers to develop the right team for the enterprise
•Inspiring and motivating cyber security professionals
•Innovative ways to close the IT security skills gap


12:00 PM - 12:00 PM Chairperson’s Closing Remarks