Healthcare Cybersecurity at mHealth Badge
 

 

 

The Tasks – the Threat – and the Solutions!

Big Challenges:

Whether you're a hospital, clinic or health plan, you are facing:

  • Allowing patients to track their health
  • Giving providers and health information exchanges access to patient data on any device
  • Keeping this data safe

How Do You Safeguard this Data?

Is it possible to safeguard this data while reducing costs?

Chief Security Officers from Kaiser, GE Healthcare, Philips Healthcare, NIST and others show you how to protect your organization, patients, providers and information exchanges from cyber threats. Register for Rock Stars of Healthcare Cybersecurity , a special event at mHealth 2015.

What You Need to Know

  • Cybersecurity vulnerabilities and intrusions pose risks for every hospital or healthcare organization - and its reputation
  • The average healthcare breach has reached $5.9 million
  • Networked technology and greater connectivity increase exposure
  • Security cannot be the roadblock that stops all progress
  • New technologies are most vulnerable - All security problems are front-loaded - 80% are discovered in the first 20% of a product's lifecycle
  • You can security-proof your healthcare technology

 

 

 

 

What You'll Learn

  • How to security-proof your healthcare platform
  • New best practices and standards to advance security performance
  • How building secure code for your medical device software creates public trust in healthcare devices
  • Five simple steps to develop a risk management solution and build trusted technology
  • A blueprint to reduce or eliminate vulnerabilities that adversaries can exploit to gain access to medical devices
  • How to engage your board and management’s support for cybersecurity initiatives before a cyber breach occurs

What You'll Experience

  • An opportunity to interact with the real experts on healthcare cybersecurity in one room
  • Hear the latest and best thinking on how to realistically and cost effectively protect your organization, patients, and practitioners
  • A highly interactive event, with Q&A, collaboration, and dive-deep presentations
  • Unmatched networking opportunities
  • The must attend healthcare cybersecurity event of the year

 

 

Nov. 9, 2015 - Washington, DC

 

Special $100 Discount Now Available (use code ROCKSTAR100)

Attendees earn:

  • 5 Professional Development Hour (PDH) credits and

  • 5 Hours CPE Credits (For ISC)2 Members, your CPEs will be submitted on your behalf to (ISC)2

 

Rock Stars
 

Hear What Our Audience is Saying About the Rock Star Events:

"This was a really valuable event. The speakers and venue were excellent!" - J. Burroughs

"Great way to network with other people in my field looking for answers." - B. Swift

 

 

 

 

Speakers


 
Bharadwaj
Bharadwaj

Sriram Bharadwaj

Director, Information Services
University of California, Irvine, (UCI) Healthcare

Sriram Bharadwaj (Sri) is Director, Information Services for University of California, Irvine, (UCI) Healthcare and has responsibility for managing EMR and all other ancillary applications used in the Healthcare enterprise. As part of his responsibilities, Sri also manages secure interoperability of applications through the development and deployment of HL7 and non-standard interfaces for use in both inpatient and ambulatory environments. UCI Health comprises of one of the prominent hospital and multi-discipline healthcare provider community in Orange County, California. Prior to his role at UCI, Sri was a consulting member of the ONC’s Keystone Beacon Program (https://www.healthit.gov/policy-researchers-implementers/keystone-beaconcommunity) and Keystone HIE defining APIs for data integration across EHRs. For the Beacon efforts, Sri was instrumental in bridging the care gap using disparate data elements addressing complicated issues such as consent policy, compliance to patient privacy both at the state and federal level. Sri also aggregated lab data using DIRECT protocol for secure data integration and designed APIs for converting MDS and OASIS documents into HIE language. As part of the patient and physician portal initiatives, Sri designed and identified key priorities to be mapped and integrated so that both patients/consumers and providers are confident that information is appropriately private and secure using a complex model of authentication and Role Based Access Control (RBAC) authorization components in access APIs. Apart from Sri’s professional experience in the industry, Sri is an SME on Privacy and Security and is currently the Chair, Privacy and Security Committee, National HIMSS and President, Southern California HIMSS Chapter. Sri has chaired the Southern California Annual Privacy and Security Forum for the past 5 years and has had authored many blogs, briefs and podcasts on Privacy and Security. Sri has a Masters from Manchester Metropolitan University, UK in Strategic Business Management, Chartered Global Management Accountant (FCGMA)(U.K), CPHIMS, CISSP, PMP, Professional, Academy of Healthcare Management (PAHM), and is a Six Sigma Black Belt (American Society of Quality).

 
McNeil
Murray

Michael McNeil

Global Product Security and Services Officer
Phillips Healthcare

Leader of the Global Product Security and Services program at Philips Healthcare, Michael McNeil oversees the company’s efforts to ensure the safety of its products for its customers. That’s a broad remit that includes everything from staying on top of emerging software bugs and anticipating how they might affect Philips products, to communicating with regulatory agencies and individual hospitals to close security loopholes. With patient safety a critical concern and the financial stakes of a breach ever rising, McNeil spoke with 24×7 to discuss how hospitals should approach internal and external threats, and how he’s stepping up the company’s cybersecurity efforts.

 
 
Barrera
Barrera

Connie Barrera

Chief Information Security Officer
Jackson Health System

Connie Barrera is the Chief Information Security Officer at Jackson Health System with over 24 years of experience in the IT industry. Connie has spent considerable time in almost every role within IT including endpoint support and architecture, systems engineering and architecture as well as her current role in security. Most recently, Connie was the recipient of the prestigious 2015 Citrix Technology Professionals (CTP) award, which recognizes the contributions of individuals who have invested a significant amount of time and resources to become experts in Citrix products and solutions. Connie holds the following certifications MCP, MCSE, CCNA, CCM, CCA, CRISC, CISA, CISSP, ISA, PCIP and CCP-M. As the CISO she is responsible developing policy and standards related to privacy, confidentiality, integrity, and availability of the IT services through the enterprise. To this end, Connie develops and maintains risk management, security awareness, and compliance programs to effectively deal with the implications of legislated requirements that impact security for the institution. This includes but is not limited to HIPAA, PCI, FDA Part 11 and the Red Flag Rules. In addition, she is recognized on the conference speaking circuit, active with speaking engagements, delivering technical sessions at industry leading conferences including InfoSec World, Citrix Synergy, Mobile Security, ITAC and Fraud and Forensics Conference. Connie is also very active in the community by mentoring young students through the IT Women organization, previously serving on industry chapter boards such as ISC2 and helping to organize industry events such as the 2014 Evanta CIO/CISO summit. During 2013, Connie was nominated for the ISE Southeast Executive Awards Q1 and was a finalist in the ISE North America Executive Awards Q4.

 
Stine
Stine

Kevin Stine

Security Outreach and Integration Group; Computer Security Division, Information Technology Laboratory
NIST

Kevin Stine works within the Security Outreach and Integration group in the National Institute of Standards and Technology’s (NIST) Computer Security Division. The Security Outreach and Integration group develops, integrates, and promotes the mission-specific application of information security standards, guidelines, best practices, and technologies.
 
Landwehr
Landwehr

Carl Landwehr

Lead Research Scientist
Cyber Security Policy and Research Institute, George Washington University

Carl Landwehr's focus is improving cybersecurity in future infrastructure. His research addresses security properties and software vulnerabilities as well as system evaluation and certification methods. Dr. Landwehr developed and led cybersecurity research programs for the NSF and IARPA. Current appointments include George Washington University and LeMoyne College as well as consulting with an NSF-sponsored multi-university grant on Trustworthy Health and Wellness (THaW).

 
Greenbaum
Greenbaum

Joshua Greenbaum

Principal
Enterprise Application Consulting

Joshua has over 30 years of experience in the industry as a computer programmer, systems analyst, author, consultant, and industry analyst. Josh regularly consults with leading public and private enterprise software, database, infrastructure, implementation, and hardware companies, and advises end users on technology infrastructure and applications selection, development, and implementation issues.
 
 
Kadakia
Kadakia

Jigar Kadakia

Chief Information Security Officer and Chief Privacy Officer
Partners Healthcare

Chief Information Security Officer and Chief Privacy Officer for Partners Healthcare with over 17 years of experience in performing numerous diverse information security strategy project, HIPAA/HITECH assesments, Meaningful Use assessment, ICD-10 releted implementations, privacy program assessments, privacy program implementations, IT internal audit, technology risk, vendor risk management, and controls consulting engagements.

 
Foley
Foley

Tom Foley

Global Health Solutions Strategy Manager
Lenovo Health

Tom has over 25 years of experience in information technology and is currently the Global Health Solutions Strategy Manager for Lenovo Health. He is focused on coupling technology with workflows and the different stakeholders across the continuum of care. Over last fifteen years, Tom has applied his expertise in Health IT while serving in several leadership roles with leading EHR vendors. Tom has been involved in strategic initiatives such as migrating EHR platforms from client server to cloud based models, roll-out of Health Information Exchange, Patient Portals/Patient Engagement, and roll-out of Direct Messaging to 43,000 subscribers. Tom is well-versed on Meaningful use and related regulatory matters. Tom began his career at UPS where he led system programming in the national automation of the UPS telephone center from paper to electronic format. He was also involved in several other innovative UPS initiatives such as the prototyping of the first Package Confirmation device. Tom also served as the Data Network Design Manager during the initial deployment of one of the first national wireless data networks - so he understands mobility from the outset embracing wireless data.
 
 

 

 

 

Agenda


 
Healthcare Cybersecurity Badge

Morning Session: 11:00 a.m. – 1:00 p.m.

Sriram Bharadwaj

Director, Information Services
University of California, Irvine, (UCI) Healthcare

Why  is building a foundation of trust with your patients and with those in your organization so critical to cybersecurity?

Health care leaders should begin to lay a foundation of trust with their users and fellow leaders. We need technology to make a difference in the market place. Focusing on trust is one way to build that foundation. In some ways, this is a new way to thi nk about addressing risk management, but it looks to have excellent results. Five simple steps to build trusted technology at your organization are: (1) Identify all the risks; (2) Categorize them; (3) Rank them; (4) Decide which ones to fix; and (5) Execute.
 

Michael McNeil

Global Product Security & Services Officer
Phillips Healthcare

Security-Proof Your Healthcare Platform by Knowing What Kind of Equipment and Technology is Most Vulnerable to Attack

A lot of what used to be closed-loop networks, because of the advent of the Internet and interconnectivity, has now opened up, which opens up risks and threat vectors. Implantable medical devices like defibrillators, pacemakers, and insulin pumps are also capable of transmitting vital information. Originally, those were not a major concern. Now, the risk gamut is pretty broad because of the types of technology and solutions we want to put in place.
 

Lunch: 1:00 p.m. -2:30 p.m.

Optional Roundtables

Afternoon Session: 2:30 p.m. – 6:00 p.m.

Josh Greenbaum


Moderator, Enterprise Consulting

How to Make Healthcare Information Open Enough to Optimize Care and Secure Enough to Ensure Patient Privacy & Safety (Panel)

Panelists: Jigar Kadakia, Partners Health Care; Tom Foley, Lenovo Health; Caleb Wharton, Booz Allen Hamilton

Connie Barrera

Chief Information Security Officer
Jackson Health System

Secure, Enable, Innovate!

Connie Barrera, the Chief Information Security Officer for Jackson Health System, will speak about security in medical technology.

Carl Landwehr

Lead Research Scientist
Cyber Security Policy and Research Institute, George Washington University

How a Building Code for Medical Device Software Security Can Help Build Public Trust in mHealth Devices

People won't use medical technology they don't trust. But how do we maintain public trust in mHealth devices when many have been shown to be vulnerable to hackers? The IEEE Computer Society's Cybersecurity Initiative is helping organize a building code for medical device software security that could provide an industry-wide basis for assuring the public that their devices are free of broad classes of security vulnerabilities. This talk will describe the motivation for this approach, initial results, and plans for further development.

Kevin Stine

Manager, Security Outreach and Integration Group; Computer Security Division, Information Technology Laboratory
U.S. Department of Commerce - National Institute of Standards and Technology

The new Standards, best practices, and technologies to advance security performance

The National Institute of Standards and Technology was founded in 1901 and now part of the U.S. Department of Commerce. Congress established the agency to remove a major handicap to U.S. industrial competitiveness. The Computer Security Division's (CSD) Computer Security Resource Center (CSRC) facilitates broad sharing of information security tools and practices, provides a resource for information security standards and guidelines, and identifies key security web resources to support users in industry, government, and academia. 
 

 

 

Sponsorships

 

 
 
Sponsor Details
 
Reach the Decision-makers in Healthcare Cybersecurity – Present and Future

Healthcare Cybersecurity is one of the Fastest-growing Markets in the World! Only IEEE Computer Society Attracts the C-Levels, the Top Techs, and the Hands-on Specifiers Who Are Driving This Rapidly Evolving Issue.

When you sponsor Rock Stars of Healthcare Cybersecurity, you reach a unique audience – a level of decision-makers who don’t attend other symposia.

With an agenda aimed at real-world, business-critical decisions, and a lineup of experts unequaled at other risk-based security events, Rock Stars of Healthcare Cybersecurity is an obvious investment for any organization interested in influencing the future of risk-based security technology.

  • Meet this influential group of users and potential users face-to-face
  • Enjoy the highly personal nature of the event to network and enhance your brand
  • Generate leads in a group where every attendee is a prospect
  • Share lunch and cocktails with people you want and need to know
  • Stimulate discussions resulting from the engaging, leading-edge presentations
  • Showcase your products and services in a dynamic, engaged environment


Why Sponsor? (Download the PDF)

Sponsors at Rock Stars of Healthcare Cybersecurity are integral parts of both the content and success of the event. Take advantage of these unique sponsorship opportunities –

Luncheon Sponsor

Lunch Roundtable Sponsor – Bring a current customer and share your company’s technology story with a captive audience during lunch.

Official Program Advertising

Panel Speaker Slot 

Conference Bag Insert

Sponsorship Contact

For more information and to secure your Cybersecurity Rock Stars sponsorship and/or exhibit space, please contact:
Helen Scott
helen.scott@computer.org
714-816-2175

 

Venue


 

Gaylord National Resort & Convention Center

 

Rock Stars of Healthcare Cybersecurity will be held at the Gaylord National Resort & Convention Center. This riverside convention and business resort, with a 19-story glass atrium, is 10 miles from the U.S. Capitol and 12.6 miles from the Lincoln Memorial.  

 

To register for the mHealth group rate, visit: http://www.mhealthsummit.org/book-hotel.

TEL + 1 301 965 4000
 

Attend the Rock Stars of Healthcare Cybersecurity

The Rock Stars of Healthcare Cybersecurity will be held on November 9, 2015 at the Gaylord National Resort & Convention Center.

Gaylord National Resort
 

Gaylord National Resort

201 Waterfront Street

National Harbor, MD 20745, USA

Phone: (301) 965-4000
 

Directions from Ronald Reagan Washington National Airport - DCA

 
Follow signs to George Washing Parkway South to Alexandra. Veer right at the sign to Slaters Lane, make a right at traffic light. Follow signs to US Route 1 and merge onto US-1. Follow signs to I-95 North (Maryland). Veer right at signs toward I-95. Veer left toward I-95 and merge onto I-95 North / I-495 East (Capital Beltway). Cross Woodrow Wilson Bridge toward Maryland. Take exit 2A toward National Harbor. Turn right on Waterfront Street. The resort is on the right.

Distance from hotel: 8 miles

 

 

Presentations


Presentations

Sriram Bharadwaj

Director, Information Services
University of California, Irvine, (UCI) Healthcare

Why is building a foundation of trust with your patients and with those in your organization so critical to cybersecurity?

 
 

Connie Barrera

Chief Information Security Officer
Jackson Health System

Secure, Enable, Innovate!

 
 

Michael McNeil

Global Product Security & Services Officer
Phillips Healthcare

Security-Proof Your Healthcare Platform by Knowing What Kind of Equipment and Technology is Most Vulnerable to Attack

 
 

Carl Landwehr

Lead Research Scientist
Cyber Security Policy and Research Institute, George Washington University

How a Building Code for Medical Device Software Security Can Help Build Public Trust in mHealth Devices

 
 
 

 

 

Computing Now