Day 3- Friday, September 15th

8:00 AM - 8:50 AM Networking Breakfast

8:50 AM - 9:00 AM Chairperson’s Opening Remarks

Fred Kwong, CISO, Delta Dental


Fred Kwong

Delta Dental


9:00 AM - 9:40 AM Rise of Ransomware Attacks and Cyber Threats in Healthcare

The variety and volume of ransomware and malware attacks continues to increase. Ransomware, which is malicious software that encrypts the infected computer files and keeps the owner from accessing them until a fee is paid, is becoming more targeted and expensive to the enterprise. Beyond ransomware, what will be the next source of attacks and network infections?
In this session examine:
•Strains of ransomware and how they are infecting networks
•Effective mitigation strategies
•Incident response, what to do if infected
•threat intelligence indicators.
Moderator: Patrick Angel, Interim CISO, Cleveland Clinic Foundation
Speaker: David Horton, CTO, University of Oklahoma Health Sciences Center
Speaker: Steve Rausch, VP Technology, Methodist Retirement Communities
Speaker: Ben Schwering, VP Information Security, Premier Inc.

9:40 AM - 10:10 AM An Enterprise Immune System: Using Machine Learning for Next Generation Healthcare Security

The legacy approach to cyber defense is far outpaced by the advanced threats and attacks we are seeing today. While total prevention of compromise is untenable, security teams can be proactive in defending against novel attacks that bypass traditional security defense by utilizing automated self-learning technologies to detect and respond to emerging threats within a network. Instead of focusing on where the next attack will come from, we must rather focus on our own environment and what is normal for the bespoke network as a whole

In this session, learn real world examples of:

•How new machine learning and mathematics are automating advanced threat detection

•Why 100% network visibility allows you to preempt emerging threats in real time.

•How unsupervised machine learning and recursive mathematics allow the ability to achieve full visibility and prevent attacks at the earliest stages; before they become a serious threat

10:15 AM - 10:45 AM Business Meeting

10:45 AM - 11:15 AM Business Meeting


11:15 AM - 12:00 PM Quantifying Cyber Risk Valuation to Communicate and Mitigate Exposure to the Enterprise

John Sapp, CISO, Orthofix, Inc.
Translating technical data and metrics into a business risk context, which is understood by the C-Suite and Board of Directors is an important task of the Chief Information Security Officer. In this session, explore how cyber risk valuation provides a snapshot in time of your potential risk, which fuels proactive efforts to minimize and reduce exposure based on the risk appetite of the organization.

•Making informed and risk-based decisions through IT risk analytics

•Estimating the true cost of a potential cyber breach

•Examining how cyber risk forecasts fall short

•Quantifying the value of cybersecurity investments to produce an easily articulated analytical perspective

John Sapp

Orthofix, Inc.

12:00 PM - 12:00 PM Chairperson’s Closing Remarks