Event Agenda

May 21st – 22nd 2024 // Boston, USA

Register Now

View 2023 agenda below

Event Agenda

May 23rd – 24th 2023 //
Boston, USA

Register Now
Day 2 // May 24th 2023
08:50 – 04:50 (EST)
08:15Breakfast & Registration 
08:50Opening Address
09:00Panel Discussion: Securing Patient Data Against the Threat of Cyber Attacks

  • What are the biggest data security challenges you are facing as the use of electronic health records increases?
  • How are you establishing, operationalizing, and enforcing best practices to secure and manage your data?
  • What is your advice on devising a data protection program that balances safeguarding patient data with providing the highest quality of patient care?

Justin Vlahacos, Director of Cybersecurity, R1 RCM
Kathleen Mullin, CISO, Cancer Treatment Centers of America

10:10Presentation: How Healthcare Can Stay Ahead of Ransomware

Join this talk as we examine how healthcare organizations can adopt technologies to protect themselves from the onslaught of ransomware attacks. It requires organizations to adopt the principle of least privilege incorporated with identity controls and endpoint detection and response methods to work together and implement a strong defense-in-depth strategy.

10:10Presentation: Cybersecurity in Healthcare: The Value of Leveraging Identity Security to Manage EHR Access

  • Advice for integrating an organization’s identity security program with their core EHR, like Epic, Cerner, MEDITECH
  • Considerations for launching an identity security program

10:40Networking Break
11:20 Presentation: Cloud Migration: How to Manage It Successfully and Securely
Most healthcare organizations are moving to the cloud to store and manage petabytes of sensitive data. Join this session to learn:

  • Common mistakes when migrating to the cloud and how to avoid them
  • The concept of cloud security controls, and how to apply them
  • How to monitor data security in the cloud and how to identify and address compliance management challenges
  • Tools to identify security vulnerabilities in the cloud and take action to mitigate the impact of any attacks

11:50Presentation: A People-Centric Approach to Address the Healthcare Cybersecurity Challenge

  • Combat data loss and insider threats
  • Take a zero-trust approach to remote access for your workforce
  • Modernize compliance and archiving to reduce compliance risk

12:20 Case Study: Lessons Learned on Managing and Remediating Third-Party Vulnerabilities

  • The steps we took to identify such vulnerabilities and to prioritise them according to their risk level
  • Third-party assessments and what to consider when developing a relationship with a new third party
  • Running a third-party risk management program: what a manageable approach consists of

12:50 Spotlight: How to Protect Today’s IoMT Devices

  • Risk assessments that automatically feed into risk scoring and reduction of policy recommendations.
  • Risk and change tracking over time for regulatory U.S. Health Insurance Portability and Accountability Act (HIPAA) compliance
  • Creation of IoMT/IoT/IT inventory with device classification and context

01:00Lunch
02:00Presentation: Achieving Business Resilience through Converged IT-OT Cybersecurity Strategies

During this session, we explore security considerations for developing cyber resilience covering security fundamentals and readiness planning to protect your IT and OT environments.

02:30Case Study: Successfully Building a Medical Device Security Program

  • TExperience-based considerations on gaining executive buy-in, organizing a working team, and defining a process for reportability and accountability
  • How HTM, Security, and IT teams can work together to properly secure medical devices

Plenary Sessions
03:30Group Discussion: The Road to Achieving Cybersecurity Maturity

  • How do you prioritise getting the people, processes, and culture in place?
  • What are the barriers to the adoption of cyber security best practices?
  • Evolving cybercrime demands updated practices. What cyber strategies do you consider obsolete and what sustainable cyber strategies can you recommend to best address modern security challenges?

04:10End of Conference