Monday, May 8th to Wednesday, May 10th at Walt Disney World Swan & Dolphin Resort
Healthcare continues to be the target of malicious and clever social engineering attacks gained through the behavior of inattentive or non-compliant employees. 3rd party risk mitigation has become a significant issue as vendors become key players in the Healthcare Security supply chain. We need to address this additional risk as we grow the offering for our patients with the services we provide.
Every day thousands of Wi-Fi seeking smart phones and iPads enter our healthcare ecosphere…capable of being compromised in some form.
We Talk. We Share. We Network. Join us to network with the best practitioners, who are also your peers in Healthcare Security.
Can a security team gain traction while battling with other departments for IT budgets? If there is a breach who gets blamed? Is not having enough resources an acceptable alibi? A constant theme is juggling needs with budgets and corporate strategies. Beyond the obvious need to share and increase the resiliency of our sector, there is also the day to day business issues we need to deal with constantly.
Presenters will offer new ideas and strategies to potentially bolster resiliency of your organization’s cyberhood.
Wednesday, May 10th 1:15pm – 1:45pm
Prevalent: A Smarter Approach to Third-Party Vendor Risk for the Healthcare Industry
Governing and managing third-party vendor relationships continues to be more complex and significant given all the new regulations, technologies and standards. Healthcare organizations want to protect themselves and their customers from vendor threats, but are challenged with how to do it in a scalable and cost-effective way. In this session, attendees will learn: Industry Best Practices on developing a vendor risk program and how to leverage your peers and NH-ISAC to benchmark your program.
Additional topics will include:
- Application Security Lifecycle Challenges
- Medical Device Security Issues & Challenges
- Endpoint Resilience/Analytics/Innovations
- Cyber Intelligence Innovations (Teams, Techniques, Tools)
- Incident Response & Breach Lessons
- Cloud Security Challenges & Solutions
- Operationalizing Advanced Security Capabilities
- Deception Technologies
- Isolation Technologies
- Behavioral Analytics Lessons Learned
- Security Scaling Issues & Innovations
- Supply Chain Risk & Risk Management
- Compliance / Regulatory Landscape
- Convergence (of Physical/Cyber Security)
- Business Resilience
- Data Protection
- Awareness & Training
- Workforce Management
- Mobile & BYOD
Click here for the full agenda.