Spring19 Summit Agenda (subject to Change)

 

*Click on any presentation title to see the session details or click on the file icon to view the presentation document.
Time 13 Mon, May 2019
12:00 pm - 5:30 pm Registration Open  
1:00 pm - 2:00 pm IT M&A Working Group (Closed Meeting)  
2:00 pm - 3:00 pm Software Security (Members Only)
Players A
Working Group Meeting (Members Only)
Education and Awareness Committee (Members Only)
Champions F
IT M&A Working Group (Closed Meeting)
Players D
3:05 pm - 4:05 pm Cloud Security Working Group Meeting (Members Only)
Players A
Working Group Meeting (Members Only)
MDSISC Working Group Meeting (Members Only)
Champions F
IT M&A Working Group (Closed Meeting)
Players D
4:10 pm - 5:10 pm Cybersecurity Analytics Development (CAD) Working Group Meeting (Members Only)
Players A
Incident Response Working Group Meeting (Members Only)
Patrons
MDSISC Working Group Meeting (Members Only)
Champions F
IT M&A Working Group (Closed Meeting)
Players D
6:15 pm - 7:15 pm New Member/First Time Member Attendee Summit Reception (Invitation Only) Sponsored by Censinet  
7:30 pm - 9:00 pm Dine Arounds sponsored by Armis and SpyCloud  
Time 14 Tue, May 2019
7:00 am - 5:30 pm Registration Open (closed from 12-2pm)  
7:30 am - 11:00 am Golf Event (9 holes) (Members Only) -- Sponsored by Polarity  
8:00 am - 10:00 am Working Group
TPRG (Members Only 8- 9am) / H-ISAC Prevalent Users (9-10 am)
Players B
IS Risk Management (Members Only 9:30 - 11:00)
Patrons
IT M&A Working Group (Closed Meeting)
Players D
10:00 am - 11:00 am TIC (Closed Meeting)
Players A
P&S Committee (Closed Meeting)
Players B
H-ISAC Radio Show
Players C
IT M&A Working Group (Closed Meeting)
Players D
11:00 am - 12:00 pm Member Services: Products and Services Lifecycle (Members Only)
Players A
Member Services: Cyber Threat Intelligence (Members Only)
Players B
Member Services: Automated Feeds and Tools-technical walk through (Members Only)
Players C
Member Services Review (Members Only)
Players D
12:00 pm - 2:00 pm Member Meeting/Lunch (Members Only) - Sponsored by Synopsys  
12:00 pm - 4:00 pm Exhibit Hall set up  
2:15 pm - 3:15 pm Grand Rounds - Avoid the Bogies: Strategies to Prevent Phishing Attacks (Valimail)
Players A
Grand Rounds - The 1/10/60 Minute Challenge: Defenders Win, Adversaries Lose Responding to Incidents within the “Breakout Time” Window (Crowdstrike)
Players B
Grand Rounds - A Zero-Trust Treatment Plan for Healthcare (Cisco)
Players C
Grand Rounds - Security Ignorance is Not Bliss (Panaseer)
Players D
3:30 pm - 5:15 pm CISO Member Round Tables (TLP Amber - Members Only)
Players A
The Final Frontier? Software Assurance and the Software Development Life Cycle Member Round Tables (TLP Amber - Members Only)
Players B
DLP as an Effective Technical Control Member Round Tables (TLP Amber - Members Only)
Players C
Approaches to Safe Guarding Your Most Sensitive Data Member Round Tables (TLP Amber - Members Only)
Players D
3:30 pm - 5:15 pm Best practices for Building Qualified and Diverse Teams Member Round Tables (TLP Amber - Members Only)
Champions AB
Identity Management Member Round Tables (TLP Amber - Members Only)
Champions C
Top 5 Recommendations for Incident Response Member Round Tables (TLP Amber - Members Only)
Champions F
Security Researcher Messages & Bug Bounty Program Member Round Tables (TLP Amber - Members Only)
Champions GH
3:30 pm - 5:15 pm Automation/Orchestration - It's More Than Just the Security Operations Center Member Round Tables (TLP Amber - Members Only)
Masters A
Medical Device Member Round Tables (TLP Amber - Members Only)
Masters B
Workforce Security Awareness Member Round Tables (TLP Amber - Members Only)
Masters C

5:30 pm - 7:00 pm Welcome Reception (Exhibit Hall) Sponsored by Microsoft  
7:00 pm - 9:00 pm Attendee Dine Arounds (Sponsors: Agari, Endgame, Proofpoint, Securonix and Valimail)  
9:00 pm - 11:00 pm Hospitality Suite--Sponsored by CYR3CON  
Time 15 Wed, May 2019
7:00 am - 5:30 pm Registration  
7:30 am - 8:30 am Breakfast  
8:30 am - 8:45 am Opening Remarks & Keynote Introduction  
8:45 am - 9:45 am Keynote: Keren Elazari -- The Future of Cyber Security - From a Friendly Hacker's Prospective  
9:00 am - 5:15 pm Exhibit Hall Open  
9:50 am - 10:20 am Threat Intelligence (R)Evolution: Transforming TI from Data to Proactive, Continuous Threat Actor Assurance - Verodin  
10:25 am - 11:00 am Networking Break - Sponsored by DigiCert  
11:00 am - 11:30 am Reducing Privileged Escalation with a Layered Defense - Eli Lilly and Company
Champions AB
Case Study: Using Automation to Accelerate the SOC and Reduce Risk at Premise Health -- Syncurity Corporation
Champions C
The Elusive IAM Professional - if you can't find 'em, create 'em!! -- Mayo Clinic
Champions F
The Medical Device Security Questionnaire Process – A Comprehensive Approach -- SIEMENS HEALTHINEERS
Champions GH
11:30 am - 11:45 am Transition Break  
11:45 am - 12:45 pm Grand Rounds - The Enemy Within: How to Prevail against Email Account Takeovers (Agari)
Players A
Grand Rounds - What's Your ATT&CK Model to Stop Modern Cyber Attacks (Endgame)
Players B
Grand Rounds - Solving Access Complexity with Identity Intelligence (Saviynt)
Players C
Grand Rounds - Imitation Attacks - What attackers really do with compromised accounts (Shape Security)
Players D
12:45 pm - 1:30 pm Lunch Sponsored by Symantec  
1:30 pm - 2:00 pm A Pattern-Based Approach to Privileged Access Management -- Pfizer
Champions AB
H-ISAC Third Party Shared Services, oh how we have grown! -- Prevalent
Champions C
Automating Security with DevSecOps -- Aetna/CVSHealth
Champions F
Grassroots Collaboration: An Open-Source Approach to Simplify Medical Device Procurement -- Cleveland Clinic
Champions GH
2:00 pm - 2:15 pm Transition Break  
2:15 pm - 3:15 pm Empathy as a Service to Create a Culture of Security -- GSK
Champions AB
Welcome to the Future: Neural Nets Fighting Neural Nets -- Blue Hexagon
Champions C
Monitoring & Incident Response in the Cloud -- Booz Allen Hamilton
Champions F
The Trials of Building a Product Security Program -- ThermoFisher Scientific
Champions GH
3:15 pm - 3:30 pm Transition Break  
3:30 pm - 4:00 pm Securing your Software Supply Chain -- BCBSA
Champions AB
CISO Healthcare Panel: Behavior Based Security Analytics Best Practices -- Gurucul
Champions C
Threat Intelligence for Actionable Insights: Data-Driven Metrics for Peer Comparisons -- Perch Security
Champions F
Medical Device Vulnerability Management - an HDO Perspective -- Intermountain Healthcare
Champions GH
4:00 pm - 4:30 pm Networking Break - Sponsored by Pindrop  
4:30 pm - 5:00 pm Easing SOC Fatigue with Notebook Automation -- Eli Lilly and Company
Champions AB
Gaining an Operational Advantage with Full Fabric Deception Technology -- Attivo Networks
Champions C
Evicting the Password from the Digital Estate -- Eli Lilly and Company
Champions F
FDA Town Hall - Dr. Suzanne Schwartz, FDA (4:30pm to 5:45pm)
Champions GH
5:00 pm - 5:15 pm Transition Break  
5:15 pm - 5:45 pm Demystifying DMARC: Email authentication for everyone -- Cardinal Health
Champions AB
Learning from Real-World Carnage: Deconstructing Attacks on Critical Health Care Assets -- ExtraHop Networks Inc.
Champions C
China's Thousand Talents Plan -- Pfizer
Champions F
FDA Town Hall - Dr. Suzanne Schwartz, FDA
Champions GH
6:30 pm - 9:00 pm Special Event - Motosport and aXe Games--Sponsored by TrueFort and Verve Industrial  
9:00 pm - 11:00 pm Hospitality Suite - Sponsored by Okta  
Time 16 Thu, May 2019
7:00 am - 3:00 pm Registration Open  
7:30 am - 8:30 am Breakfast  
8:00 am - 3:30 pm Exhibit Hall Open  
8:30 am - 8:40 am Opening Remarks  
8:40 am - 9:10 am Digital Disruption: The Internet of Medical Things - IBM  
9:15 am - 9:45 am Finding Infrastructure Shadow IT in the Cloud - Expanse  
9:50 am - 10:20 am Networking Break - Sponsored by Clearwater Compliance  
10:20 am - 11:20 am HHS Cybersecurity Roundtable
Champions AB
Hacking Human Nature -- Proofpoint
Champions C
Protecting the Backbone of the Organization -- Deloitte & Touche LLP
Champions F
Your FDA Cybersecurity Regulatory Process and How It Impacts the Healthcare Delivery Lifecycle: Risk management, software transparency, and vulnerability disclosure. -- Venable, LLP
Champions GH
11:20 am - 11:30 am Transition Break  
11:30 am - 12:00 pm How we built Cyber Intelligence -- Amgen
Champions AB
Your credentials have already been breached, even those which have not yet been created -- Acceptto
Champions C
Genetic Malware Analysis: Replicating the Biological Immune System Concepts to Cybersecurity -- Intezer
Champions F
Monitoring Device Behavior -- MedCrypt
Champions GH
12:00 pm - 12:05 pm Transition Break  
12:05 pm - 12:35 pm How To Build An Application Security Program -- Kenna Security
Champions AB
Understanding Geo-Political Threats to Your Business and Protecting Intellectual Property from Nation States - Ernst & Young
Champions C
Maximize Your Security Tools Investment -- HealthNow New York Inc.
Champions F
“The Secure Mobile Messaging Problem: Moderated Audience Discussion”
Champions GH
12:35 pm - 1:15 pm Lunch  
1:15 pm - 1:45 pm Do you know your organization's Top 10 Security Risks? -- Aetna
Champions AB
Collective Cyber Defense: Towards An Organizational Maturity Model -- IronNet Cybersecurity Inc.
Champions C
Application VRM – Lessons from Implementing a Dynamic Application Security Testing Service -- Eli Lilly and Company
Champions F
CBOM Practitioner Panel: From Idea to Practice --PwC 1:15 - 2:15
Champions GH
1:45 pm - 1:50 pm Transition Break  
1:50 pm - 2:50 pm SOAR – Practical Implementation Advice -- Icon
Champions AB
The state of third-party risk in healthcare - where we've been, where we are, and where we are going. -- RiskRecon
Champions C
Quantitative and Probabilistic Cyber Risk Analysis -- University of Vermont Health Network
Champions F
Medical Device System Threat Modeling - Don't Get Lost in the STRIDE -- Medtronic
Champions GH
2:50 pm - 3:20 pm Networking Break - Sponsored by Security Scorecard  
3:20 pm - 3:50 pm Jump-Starting VM: Building a Culture of Caring Through Automation -- BCBSA
Champions AB
Intelligence Fusion: A New Era of Cybersecurity -- TruSTAR
Champions C
Cloud is a destination, not the journey – transforming security to enable the enterprise -- Eli Lilly and Company
Champions F
Medical Device Whitepaper: Addressing The Needs of Multiple Stakeholders -- Medtronic
Champions GH
3:50 pm - 3:55 pm Transition Break  
3:55 pm - 4:25 pm O365 – Microsoft provides a secure solution, right? -- AbbVie
Champions AB
Release the Hounds! Implementing High Fidelity Detection Rules for EMR Indicators of Compromise -- Security Risk Advisors
Champions C
Security Awareness Training.....reimagined -- Eli Lilly and Company
Champions F
Authentication Strategies for Medical Devices -- Johns Hopkins University Applied Physics Laboratory
Champions GH
4:25 pm - 4:30 pm Transition Break  
4:30 pm - 5:30 pm CISO Panel  
5:30 pm - 6:00 pm Awards and Closing Remarks  
6:30 pm - 9:00 pm Special Event - Food Truck Open - Sponsored by Armis  
9:00 pm - 11:00 pm Hospitality Suite (Potential)