Spring19 Summit Agenda (subject to Change)

 

*Click on any presentation title to see the session details or click on the file icon to view the presentation document.
Time 13 Mon, May 2019
12:00 pm - 5:30 pm Registration Open  
1:00 pm - 2:00 pm IT M&A Working Group (Closed Meeting)  
2:00 pm - 3:00 pm Education and Awareness Committee (Members Only)
Working Group Meeting (Members Only)
Working Group Meeting (Members Only)
IT M&A Working Group (Closed Meeting)
3:05 pm - 4:05 pm Cloud Security Working Group Meeting (Members Only)
TPRG Working Group Meeting (Members Only)
MDSISC Working Group Meeting (Members Only)
IT M&A Working Group (Closed Meeting)
4:10 pm - 5:10 pm Cybersecurity Analytics Development (CAD) Working Group Meeting (Members Only)
Incident Response Working Group Meeting (Members Only)
MDSISC Working Group Meeting (Members Only)
IT M&A Working Group (Closed Meeting)
6:15 pm - 7:15 pm New Member/First Time Member Attendee Summit Reception (Invitation Only)  
7:30 pm - 9:00 pm Dine Arounds  
9:00 pm - 11:00 pm Hospitality Suite (Potential)  
Time 14 Tue, May 2019
7:00 am - 5:30 pm Registration Open (closed from 12-2pm)  
7:30 am - 11:00 am Golf Event (9 holes) (Members Only)  
8:00 am - 10:00 am IT M&A Working Group (Closed Meeting)  
10:00 am - 11:00 am TIC (Closed Meeting)
Players A
P&S Committee (Closed Meeting)
Players B
H-ISAC Radio Show
Players C
IT M&A Working Group (Closed Meeting)
Players D
11:00 am - 12:00 pm Member Services and Strategy Overview (Members Only)
Players A
Member Services and Strategy Overview (Members Only)
Players B
Member Services and Strategy Overview (Members Only)
Players C
Member Services and Strategy Overview (Members Only)
Players D
12:00 pm - 2:00 pm Member Meeting/Lunch - Members Only  
12:00 pm - 4:00 pm Exhibit Hall set up  
2:15 pm - 3:15 pm Grand Rounds - Valimail
Players A
Grand Rounds - Crowdstrike
Players B
Grand Rounds - Cisco
Players C
Grand Rounds - Panaseer
Players D
3:30 pm - 5:15 pm Member Round Tables (TLP Amber - Members Only)
Champions AB
Member Round Tables (TLP Amber - Members Only)
Champions C
Member Round Tables (TLP Amber - Members Only)
Champions F
Member Round Tables (TLP Amber - Members Only)
Champions GH
3:30 pm - 5:15 pm Member Round Tables (TLP Amber - Members Only)
Players A
Member Round Tables (TLP Amber - Members Only)
Players B
Member Round Tables (TLP Amber - Members Only)
Players C
Member Round Tables (TLP Amber - Members Only)
Players D
3:30 pm - 5:15 pm Member Round Tables (TLP Amber - Members Only)
Champions Ballroom
Member Round Tables (TLP Amber - Members Only)
Champions Ballroom

5:30 pm - 7:00 pm Welcome Reception - in Exhibit Hall  
7:00 pm - 9:00 pm Attendee Dine Arounds  
9:00 pm - 11:00 pm Hospitality Suite  
Time 15 Wed, May 2019
7:00 am - 5:30 am Registration  
7:30 am - 8:30 am Breakfast  
8:30 am - 8:45 am Opening Remarks & Keynote Introduction  
8:45 am - 9:45 am Keynote: Keren Elazari  
9:00 am - 5:15 pm Exhibits  
9:45 am - 9:50 am Thank Keynote and Introduce Platinum  
9:50 am - 10:20 am AN EVIDENCE-BASED APPROACH TO RATIONALIZING CYBERSECURITY SPENDING & REDUCING BUSINESS RISK - Verodin  
10:20 am - 10:25 am Thank Platinum  
10:25 am - 11:00 am Networking Break  
11:00 am - 11:30 am Reducing Privileged Escalation with a Layered Defense - Eli Lilly and Company
Champions AB
Case Study: Using Automation to Accelerate the SOC and Reduce Risk at Premise Health -- Syncurity Corporation
Champions C
The Elusive IAM Professional - if you can't find 'em, create 'em!! -- Mayo Clinic
Champions F
The Medical Device Security Questionnaire Process – A Comprehensive Approach -- SIEMENS HEALTHINEERS
Champions GH
11:30 am - 11:45 am Transition Break  
11:45 am - 12:45 pm Grand Rounds - Agari
Players A
Grand Rounds - Endgame
Players B
Grand Rounds - Saviynt
Players C
Grand Rounds - Shape Security
Players D
12:45 pm - 1:30 pm Lunch  
1:30 pm - 2:00 pm A Pattern-Based Approach to Privileged Access Management -- Pfizer
Champions AB
H-ISAC Third Party Shared Services, oh how we have grown! -- Prevalent
Champions C
Do you know your organization's Top 10 Security Risks? -- Aetna
Champions F
Grassroots Collaboration: An Open-Source Approach to Simplify Medical Device Procurement -- Cleveland Clinic
Champions GH
2:00 pm - 2:15 pm Transition Break  
2:15 pm - 3:15 pm Monitoring & Incident Response in the Cloud -- Booz Allen Hamilton
Champions AB
Welcome to the Future: Neural Nets Fighting Neural Nets -- Blue Hexagon
Champions C
Empathy as a Service to Create a Culture of Security -- GSK
Champions F
The Trials Of Building A Product Security Program - Thermo Fisher Scientific
Champions GH
3:15 pm - 3:30 pm Transition Break  
3:30 pm - 4:00 pm Securing your Software Supply Chain -- BCBSA
Champions AB
CISO Healthcare Panel: Behavior Based Security Analytics Best Practices -- Gurucul
Champions C
Threat Intelligence for Actionable Insights: Data-Driven Metrics for Peer Comparisons -- Perch Security
Champions F
Medical Device Vulnerability Management - an HDO Perspective -- Intermountain Healthcare
Champions GH
4:00 pm - 4:30 pm Networking Break  
4:30 pm - 5:00 pm Easing SOC Fatigue with Notebook Automation -- Eli Lilly and Company
Champions AB
Gaining an Operational Advantage with Full Fabric Deception Technology -- Attivo Networks
Champions C
Evicting the Password from the Digital Estate -- Eli Lilly and Company
Champions F
FDA Town Hall - Dr. Suzanne Schwartz, FDA
Champions GH
5:00 pm - 5:15 pm Transition Break  
5:15 pm - 5:45 pm Demystifying DMARC: Email authentication for everyone -- Cardinal Health
Champions AB
Learning from Real-World Carnage: Deconstructing Attacks on Critical Health Care Assets -- ExtraHop Networks Inc.
Champions C
China's Thousand Talents Plan -- Pfizer
Champions F
FDA Town Hall - Dr. Suzanne Schwartz, FDA
Champions GH
6:30 pm - 9:00 pm Special Event - Motosport and aXe Games  
9:00 pm - 11:00 pm Hospitality Suite  
Time 16 Thu, May 2019
7:00 am - 3:00 pm Registration Open  
7:30 am - 8:30 am Breakfast  
8:00 am - 3:10 pm Exhibits Open  
8:30 am - 8:40 am House Keeping/ Introduction of Platinum  
8:40 am - 9:10 am Securing the Internet of Medical Things - IBM  
9:10 am - 9:15 am Thank Platinum/Intro Next Platinum  
9:15 am - 9:45 am Finding Infrastructure Shadow IT in the Cloud - Expanse  
9:45 am - 9:50 am Thank Platinum/Housekeeping  
9:50 am - 10:20 am Networking Break  
10:20 am - 11:20 am Protecting the Backbone of the Organization -- Deloitte & Touche LLP
Champions AB
Hacking Human Nature -- Proofpoint
Champions C
HHS Town Hall
Champions F
Your FDA Cybersecurity Regulatory Process and How It Impacts the Healthcare Delivery Lifecycle: Risk management, software transparency, and vulnerability disclosure -- Venable LLP
Champions GH
11:20 am - 11:25 am Transition Break  
11:30 am - 12:00 pm How to build a Cyber Intelligence program when you’re in a global enterprise -- Amgen
Champions AB
Your credentials have already been breached, even those which have not yet been created -- Acceptto
Champions C
Genetic Malware Analysis: Replicating the Biological Immune System Concepts to Cybersecurity -- Intezer
Champions F
Monitoring Device Behavior -- MedCrypt
Champions GH
12:00 pm - 12:05 pm Transition Break  
12:05 pm - 12:35 pm How To Build An Application Security Program -- Kenna Security
Champions AB
Do We Run or Walk to the Cloud -- DELTA DENTAL NJ and CT
Champions C
Maximize Your Security Tools Investment -- HealthNow New York Inc.
Champions F
Mobile Healthcare Communication Conundrum Case Study -- Rush University Medical Center
Champions GH
12:35 pm - 1:15 pm Lunch  
1:15 pm - 1:45 pm DevSecOps, DevOps, and the Three Ways -- Aetna/CVSHealth
Champions AB
Collective Cyber Defense: Towards An Organizational Maturity Model -- IronNet Cybersecurity Inc.
Champions C
Application VRM – Lessons from Implementing a Dynamic Application Security Testing Service -- Eli Lilly and Company
Champions F
CBOM Practitioner Panel: From Idea to Practice --PwC 1:15 - 2:15
Champions GH
1:45 pm - 1:50 pm Transition Break  
1:50 pm - 2:50 pm CBOM Practitioner Panel: From Idea to Practice -- PwC
Champions AB
The state of third-party risk in healthcare - where we've been, where we are, and where we are going. -- RiskRecon
Champions C
Security Awareness Training.....reimagined -- Eli Lilly and Company
Champions F
Medical Device System Threat Modeling - Don't Get Lost in the STRIDE -- Medtronic 2:20 - 2:50
Champions GH
2:50 pm - 3:20 pm Networking Break  
3:20 pm - 3:50 pm Jump-Starting VM: Building a Culture of Caring Through Automation -- BCBSA
Champions AB
Intelligence Fusion: A New Era of Cybersecurity -- TruSTAR
Champions C
Cloud is a destination, not the journey – transforming security to enable the enterprise -- Eli Lilly and Company
Champions F
Medical Device Whitepaper: Addressing The Needs of Multiple Stakeholders -- Medtronic
Champions GH
3:50 pm - 3:55 pm Transition Break  
3:55 pm - 4:25 pm O365 – Microsoft provides a secure solution, right? -- AbbVie
Champions AB
Release the Hounds! Implementing High Fidelity Detection Rules for EMR Indicators of Compromise -- Security Risk Advisors
Champions C
Quantitative and Probabilistic Cyber Risk Analysis -- University of Vermont Health Network
Champions F
Authentication Strategies for Medical Devices -- Johns Hopkins University Applied Physics Laboratory
Champions GH
4:25 pm - 4:30 pm Transition Break  
4:30 pm - 5:30 pm CISO Panel  
5:30 pm - 6:00 pm Thank CISO Panel Awards and Closing Remarks/Awards  
6:30 pm - 9:00 pm Special Event - Food Truck Open  
9:00 pm - 11:00 pm Potential Hospitality Suite