EXECUTIVE COLLABORATION FOR SENIOR IT SECURITY EXECUTIVES

The HTRAC’s SecureHEALTH Summit has been designed to unite c-level executives in an exclusive setting to address key health IT security and privacy issues. Through a unique blend of executive roundtables, keynote panel discussions, and insightful case-study based presentations, CIOs/CISOs/IT Directors will walk away with the strategic insights and tactical methods needed to prepare their organizations for effectively handling even the worst security incidents. The focus of discussions will include:

 

DATA BREACHES

  • Effective Methods for Pre and Post Breach Planning
  • Ensuring Secure Information Sharing through Establishing Industry-Wide Standards
  • Mitigating the Effects of a Breach: Risk Assessment, Access Management, Monitoring, Policies, and More
  • Response Strategies: Communications, Analysis, Investigations & Litigation

 

RISK ASSESSMENT & MANAGEMENT

  • Testing, Testing, Testing: Continuously Assessing Risk Levels to Stay Ahead of Potential Incidents
  • Creating an Offensive Risk Management Strategy that Moves you Past the Reactionary Mode
  • The Balancing Act: Risk vs Opportunity
  • Applying Federal Standards such as NIST 800-53 to the Healthcare Environment

 

DATA & PATIENT PRIVACY

  • Conducting Assessments to Determine Threat & Vulnerability Levels
  • Ensuring Secure Information Sharing through Establishing Industry-Wide Standards
  • Key Resources Needed to Successfully Protect the Migration & Storage of Data
  • A Balancing Act: Leveraging Data Intelligence while Protecting Privacy (PHI & PII)

 

MOBILE SECURITY

  • Categorizing Risk: Understanding the Security Risks at All Levels
  • Adopting BYOD: Security Strategies, Policies & Procedures
  • Critical Elements of Effective Mobile Device Management
  • Understanding the Cultural Adaptations Needed for an Optimal Mobile Workforce

 

CYBER SECURITY

  • Measuring Cyber Security: Metrics, Reporting, and Utilization
  • Identity and Access Management: How to Best Manage Internal/External Users and Trust Relationships
  • Continuous Monitoring: Putting the Right Safeguards in Place to Effectively Thwart Attacks

 

 

CLOUD SECURITY

  • Key Security Considerations for Data Migration and Disaster Recovery
    • Addressing the Critical Security Element of Cloud Computing: Access Management
    • Strategies for Selecting & Building Clearly-Defined and Trusted Relationships with Your Provider

 

COMPLIANCE

  • HIPAA, HITECH, Meaningful Use, OCR Audits: Updates & Critical Considerations
  • Establishing a Risk-Based Approach to Compliance
  • Auditing Red Flags: Updates on Requirements & Insights for Avoiding Failure

 

 

MEDICAL DEVICE SECURITY

  • The State of Medical Device Security: Understand the Key Security Issues & Implementing Best Practices to Address Them
  • Understanding Stakeholder Responsibilities: User, Provider, Manufacturer
    • Addressing Key Regulatory Framework

 

LEADERSHIP

  • The Balancing Act: Developing an Equitable Management Approach to Meeting  Both IT Security Mandates and Critical Business Priorities
  • Strategies for Winning Top IT Talent Despite Resource/Compensation Limitations
  • Methods for Creating a Security-Savvy Corporate Culture from the Top-Down
  • Demonstrating Results: Establishing Key Metrics to Communicate Benefits of IT Security Investments