September 13 - 15, 2017
The Highland, Dallas, TX

Media Center

Agenda

The 2017 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the Cyber Security for Healthcare Exchange will offer cyber security leaders the opportunity to hear and discuss successful strategies in a true peer-to-peer networking forum while highlighting the latest technologies, strategies and processes to ensure security. Download to see our complete speaking faculty and interactive sessions!

Interviews with Industry Leaders

NEW! Modern Security Risk Prevention: An Interview with Karl West, CISO of Intermountain Healthcare

In this interview, Karl West, CISO of Intermountain Healthcare talks with IQPC Exchange’s Kristen Schipfer-Barrett about the first steps of implementing security architecture, the benefits and drawbacks of communication, the recent spike in news stories about medical device hacking his priorities for 2016-2017 and what he was most looking forward to about speaking at and attending last years Cyber Security for Healthcare Exchange.

Sponsorship Information

Sponsorship Package

Download the Cyber Security for Healthcare Exchange 2017 Sponsorship Brochure

The 2017 Exchange will provide the Chief Information Security Officer and leading executives with a three-day event on the forefront of protecting the cyber security of the enterprise as the frequency and sophistication of cyber attacks continues to increase and evolve. Unlike other events, the Cyber Security for Financial Services Exchange will offer executives the opportunity to hear and discuss successful strategies in a true peer-to-peer networking forum while highlighting the latest technologies, strategies and processes to ensure security. 

Key Topics This Year Include:

 

Redefining Threat Intelligence to Empower Data Collections and Responses

 

Exploring Blockchain Technology to Redefine Banking and Securities Processing

 

Protecting Privileged Accounts from Exploitation to Ensure Business Continuity and Productivity

 

Gaining Greater Visibility in the Cloud to Mitigate Cyber Security Threats

 

Engaging Today’s Adversaries for Effective Incident Response.

PDF

NEW Cyber Security Exchange Post-Event Report

Just updated for 2017- Check out last years Cyber Security Exchange Post-Event Report that features interviews with speakers, attendee lists, event photos, videos and more!

List of 2016 Vendors

Check out the list of solution providers who attended last years Cyber Security for Healthcare Exchange.

List of 2016 Attendees

Check out the qualifying attendees who came to our 2016 Cyber Security for Healthcare Exchange.

Healthcare Must Be Protected: Find Solutions This Year

Today’s CISOs are working to streamline technology services to improve the quality of care, while still keeping personal and corporate information safe and Intellectual Property secure. Join us this year at the 2017 Cyber Security for Healthcare Exchange to meet with solution providers who can keep important data safe.

Video

Vendor Risk Management Maturity Model: An Interview with Premise Health CISO Joey Johnson

As Chief Information Security Officer for Premise Health, Joey Johnson knows a lot about vendor risk - both as a service provider and as a client. “Our clients, very large organizations for whom we keep a lot of sensitive data, constantly subject us to vendor risk assessment activities. On the flip side, we assess risk for the third parties we outsource that provide our firm niche healthcare services.”

Last year, Joey spoke about the incredible important task of mitigating vendor risk in his Day 3 session, Transitioning from Vendor Risk Management to Vendor Maturity Modeling. Watch Joey talk more about this topic here.

Video Infographic: Data Breach Costs

What is the economic impact of a data breach? This short infographic video provides the average cost of a data breach, average cost per record and average cost by sector.

Articles

Cyber Security in the Information Age: Why every industry needs cyber security to combat cyber villains.

In the age of all things digital, almost every single person has left a footprint on the World Wide Web. We post and share information at the touch of a button, without much thought about where that information may go. With so much data being transmitted on a daily basis, there are those who use the relative anonymity of the internet to maliciously steal valuable and private information. Because of these faceless criminals who lurk in the shadows of the cyber underworld, cyber security has never been more important than it is now.

Infographics

US Cyber Security Attacks

Is your area a target to cyber security attacks? Find out if you are at risk of a cyber attack on this map and learn more at the 2017 Cyber Security for Healthcare Exchange.

Case Study: An Event Above The Rest

In this case study, Skipstone gives qualitative details about their experience sponsoring with IQPC Exchange. Skipstone gives examples of how an Exchange, an exclusive in-person event with decision maker attendees, is different from other events and how the Exchange has helped further their business goals.

Where does the cloud belong?

As organizations leverage cloud or hybrid solutions across applications like email, identity, customer, and storage management, it’s time to re-evaluate how the cloud can be leveraged. Find out more in this infographic that will cover Cloud Security, one of the points of interest in the 2017 Cyber Security for Healthcare Exchange.

Cyber Security Priorities: What Will Matter To CISOs in 2017?

These are the results of a survey given to senior-level cyber security executives from some of the world’s largest organizations regarding what investments will matter to CISOs in 2017.