The fall brochure is now available. View the brochure here.
6:30 PM – 9:00 PM | Board Dinner | |||
Time | Monday, 14 November | |||
8:00 AM – 9:00 AM | Board Breakfast | |||
9:00 AM – 12:00 PM | Board Meeting | |||
12:00 PM – 2:00 PM | Committee Meetings | |||
12:00 PM – 6:00 PM | Registration | |||
2:00 PM – 3:45 PM | Member Meeting | |||
4:00 PM – 5:00 PM Grand Rounds |
Deception Technology – Cymmetria | Deception Technology – Illusive Networks | UBA/Identity & Access Intelligence – Veriphyr | Cybersecurity Breach Prevention – Palo Alto Networks |
5:15 PM – 6:15 PM | Welcome Reception | |||
6:30 PM – 9:00 PM | Sponsor Dine Arounds | |||
9:00 PM – 11:00 PM | Hospitality Suite – Sponsored by Securonix | |||
Time | Tuesday, 15 November | |||
7:00 AM – 8:00 AM | Breakfast | |||
8:00 AM – 8:30 AM | Opening Remarks: Learn. Plan. Train. Share. Win. Jim Routh, Aetna |
|||
8:30 AM – 9:15 AM | Keynote: Blunting/Disrupting Adversary Actions Through Sharing General Keith Alexander, USA (Retired) |
|||
9:15 AM – 9:45 AM | Effective Security Planning for Regulatory Compliance Shawn Henry, Crowdstrike |
|||
9:45 AM – 10:15 AM | Networking Break – Sponsored by Pindrop | |||
10:15 AM – 11:15 AM Grand Rounds |
Advanced Cyber Intelligence – Booz Allen Hamilton | Intelligent Data Protection – Thin Air | Continuous Third Party Risk Monitoring – Security Scorecard | Mobile Threat Defense – Skycure |
11:15 AM – 11:30 AM | Transition Break | |||
11:30 AM – 12:00 PM | Learning from Traditionalists – Industrial OT & the Internet of Things Doug Clifton, EY |
Bullet Proof Multi-Factor Authentication (MFA) Damon Becknel, Horizon BCBSNJ |
Lessons Learned From a Real Work Implementation of User Behavioral Analytics (UBA) Kurt Lieber, Aetna |
Recommendations for Improving the Cybersecurity Relationship Between Medical Device Manufacturers and Health Care Authorities Bill Hagestad, Smiths-Medical |
12:00 PM – 1:00 PM | Lunch – Sponsored by Agari | |||
1:00 PM – 2:00 PM | Sustainable Security Operations – Leveraging Managed Services Carlos Amaya, Deloitte; Deepak Lakhiani, Hoag Hospital Memorial Presbyterian |
The ‘Crawl’ in Crawl Walk Run is Overrated…Lessons in SDLC Childhood Development Alan Leung, BCBSNJ |
Application Security – Full Static Analysis on 2 Hours a Month Robert Sullivan, Surescripts |
Medical Device Vulnerability Sharing: Post Market Regulatory Perspectives of an ISAO Denise Anderson, H-ISAC; Dr. Dale Nordenberg, MDISS; Dr. Suzanne Schwartz, FDA |
2:00 PM – 2:15 PM | Transition Break | |||
2:15 PM – 3:15 PM | The Art of Deception for Advanced Threat Detection in Healthcare Organizations Tushar Kothari, Attivo Networks |
Insider Threats: Combating Risk With Formal Insider Threat Programs Brenda Ferraro, Aetna; Kostas Georgakopoulos, Procter & Gamble; Rocco Grillo, Stroz Friedberg, LLC |
Not all Sinkholes are Bad – Leveraging Response Policy Zones for Intelligence and Blocking David Crawford, Aetna; Sean Kallaugher, Aetna |
Overview of AAMI TIR 57: Principles for Medical Device Information Security Risk Management Michelle Jump, Stryker; Michael Seeberger, Boston Scientific; Nick Sikorski, Deloitte |
3:15 PM – 3:45 PM | Networking Break | |||
3:45 PM – 4:15 PM | Heart Attacks vs. Headaches: Balancing Security and Healthcare Norm Laudermilch, Invincea |
Using the Intelligence Cycle to Build Your Threat Intelligence Program Matt Ambrose, Philips; Cam Macomber, Philips |
Catch and Release: Organizational Health through Phishing Exercises Michael Schymanski, HM Health Solutions; Mark Vescovi, HM Health Solutions |
Medical Device Security: The Transition from Patient Privacy to Patient Safety Adam Brand, Protiviti |
4:15 PM – 4:30 PM | Transition Break | |||
4:30 PM – 5:00 PM | O365 Strategies, Considerations and Concerns for Healthcare/CEs Michael Ebert, KPMG; Kerri Murphy, KPMG |
|||
6:00 PM – 9:00 PM | Beach Event | |||
9:30 PM – 11:00 PM | Hospitality Suite – Sponsored by Perch Security | |||
7:00 AM – 8:00 AM | Breakfast | |||
8:00 AM – 8:15 AM | Opening Remarks | |||
8:15 AM – 8:45 AM | Open Source Security With Cisco Joel Esler, Cisco |
|||
8:45 AM – 9:15 AM | UEBA Closed Loop Deployments and Identity Analytics for IAM Nathan Harris, Aetna; Kurt Lieber, Aetna |
|||
9:15 AM – 9:45 AM | Networking Break | |||
9:45 AM – 10:45 AM | A Smarter Approach to Third-Party Risk Management & Threat Monitoring Norman Menz, Prevalent |
Feeding the Pandas Tarik Rahmanovic, Blue Cross Blue Shield Association |
Healthcare Aggregators: A Call to Action Brian Heemsoth, Aetna |
Threat Analysis and Vulnerability Assessment Mehmet Turner, Medtronic Applications and Practices for Medical Equipment Security |
10:45 AM – 11:00 AM | Transition Break | |||
11:00 AM – 12:00 PM | Solving Healthcare’s Security and Compliance Crisis with Big Data Security Analytics Mike Lipinski, Securonix |
One if By Land, Two if By Sea Vitali Kremez, Flashpoint; Jim Routh, Aetna; Joe Stewart, SecureWorks |
Homeland Security Fusion Center’s Role in Public Health Daniel Mahoney, NCRIC; Craig Rosenberg, NCRIC |
Smart PKI for Connected Medical Device Security Roberta Hansen, Abbott Laboratories; Mike Nelson, DigiCert |
12:00 PM – 1:00 PM | Lunch – Sponsored by Digital Shadows | |||
1:00 PM – 2:00 PM | What We Can Learn From How SJM Approaches Threat Intelligence Russ Staiger, St. Jude Medical |
Four CISO Tribes and Where to Find Them Greg Barnes, BCBSNJ; Steve Katz, Retired; Spencer Mott, Amgen; Jim Routh, Aetna; Moderator: Gary McGraw, Cigital |
Into the (Security) Breach! Brad Sanford, Emory University and Emory Healthcare |
Securing B2B Data Transmissions – Addressing Key Control Gaps Paul Jones, HM Health Solutions |
2:00 PM – 2:15 PM | Transition Break | |||
2:15 PM – 2:45 PM | Navigating the New Normal of Third Party Risk Management Brenda Ferraro, Aetna; Brian Depersiis, EY; Moderator: Nana Ahwoi Larsen, EY |
Application Security Zero to Hero Jeremy Anderson, Cambia Health Solutions |
Workstation Defend Thyself – A Discussion of Wins and Challenges in Deploying Windows Advanced Firewall Branden Carter, Blue Cross of Idaho Health Services, Inc. |
Security Control Considerations for Mobile Medical Applications on iOS Chris Reed, Eli Lilly and Company |
2:45 PM – 3:00 PM | Transition Break | |||
3:00 PM – 4:00 PM | Hacking Healthcare: Ransomware Becomes a New Norm Vitali Kremez, Flashpoint |
Gaining Visibility and Control Within Your Security Program Jigar Kadakia, Partners Healthcare |
Changing Risky Behavior Karolyn Maloney, Aetna |
Medical Device Security Throughout the Product Lifecycle Rob Bathurst, Cylance Introduction to UL’s Cybersecurity Assurance Program (UL CAP) |
4:00 PM – 4:15 PM | Transition Break | |||
4:15 PM – 4:45 PM | Closing Remarks & Wrap Up | |||
5:30 PM – 10:00 PM | Closing Event: MCAS Miramar |
*Subject to Change