Agenda |
2016 Spring Agenda*
Wednesday, May 11, 2016 | ||||
---|---|---|---|---|
8:00 – 4:00 pm | A-ISAC Analyst Workshop | |||
11:00 – 4:30 pm | A-ISAC Board of Directors Lunch & Meeting | |||
2:00 – 4:45 pm | NH-ISAC Member Meeting | |||
4:00 – 5:00 pm | A-ISAC Member Meet & Greet Reception, Sponsored by Shape Security | |||
5:00 – 7:00 pm | Welcome Reception | |||
7:00 – 9:00 pm | Sponsor Dine Around | |||
9:00 – 11:00 pm | After Hours Hospitality Suite | |||
Thursday, May 12, 2016 | ||||
7:00 – 7:45 am | Breakfast | |||
7:45 – 8:15 am | Opening Remarks: 2016 Summit Theme Jim Routh, Aetna |
|||
8:15 – 9:15 am | Keynote: Applying Security@Scale to Your Enterprise Alex Stamos, Facebook |
|||
9:15 – 9:45 am | The Quality of Your Security Program is No Secret Kelly White, RiskRecon |
|||
9:45 – 10:15 am | Networking/Refreshment Break | |||
Concurrent Sessions | Sponsor Track | Healthcare Track | Aviation Track | Medical Device Track |
10:15 – 11:15 am | Identity as a Threat Plane - Leveraging Behavior Analytics Tom Clare, Gurucul |
Shodan - A Deep Dive Into “The Computer Search Engine” Aaron Goldstein, Amgen Inc |
Risk Management Identification Factors and Master Plan Development Peter Andres, Deutsche Lufthansa AG; Monica Maher and W. Baird McNaught, DHS |
Cybersecurity & The Connected (Healthcare) World Colin Morgan, Johnson & Johnson |
11:15 – 11:30 am | Transition Break | |||
11:30 am – 12:30 pm | Managing Cybersecurity Through Heavy M&A Dave Mertz, Security Risk Advisors; Mike Towers, Allergan |
Starting an Intelligence Program From the Ground Up — Tales From the Trenches Mike Slavik and Katie Winslow, Kaiser Permanente |
Product and Supply Chain Cybersecurity: Increased Efficiency; Increased Vulnerability Moderator: Greg Seipelt, GE Aviation Panelists: Amanda Graham, Boeing; Don Kearney, Rockwell Collins; Pascal Andrei, Airbus Group |
Cybersecurity Analysis of Medical Devices and Cloud Solutions Tom Baltis, Blue Cross Blue Shield of Michigan; Pavel Slavin, Baxter Healthcare Corporation |
12:30 – 1:30 pm | Lunch | |||
1:30 – 2:30 pm | Incident Response — How to Give the Advantage to the Hackers! James Robinson and Larry Whiteside, Optiv |
A Real Life Data Breach Jigar Kadakia, Partners HealthCare |
Views from the Front Lines of Cybersecurity Defense Ben Vaughn, United Airlines; Shawn W. Lorimer, Boeing |
You’ve Got a Friend in Me: How Information Security Can Help Device Security and Vice Versa Bill Ender and Rob Suarez, Becton, Dickinson and Company |
2:30 – 3:00 pm | Networking/Refreshment Break | |||
3:00 – 4:00 pm | PHI Data Protection, Visibility, and Control: Security for EHR, Cloud and IoT Mike Bass, Ionic Security; Jim Routh and Tim Tompkins, Aetna |
Do’s and Don’ts for Your First Three Security Hires Justin Berman, Flatiron Health |
Taking Your Incident Management Response Program to the Next Level: A Best Practices Roundtable Conversation Moderator: Andrea Webster, United Airlines Panelists: Matt Biber, Qantas; Aaron P. Brown, Delta Airlines; Conner Hagan, Southwest; FrederickLaury, Air New Zealand; Joshua Ohmer, GE Aviation |
Open The Kimono: Product Security Risk Assessment Dr. Dale Nordenberg, MDISS; Rob Suarez, Becton, Dickinson and Company |
4:00 – 4:15 pm | Transition Break | |||
4:15 – 4:45 pm | Stop The Breach: Use of the Cloud as a Powerful Game Changer in the Fight George Kurtz, Crowdstrike |
|||
4:45 – 5:00 pm | Transition Break | |||
5:00 – 6:00 pm | Grand Round Feature Spotlights | |||
6:00 – 7:00 pm | Networking Reception | Cyberfit Launch Party | |||
7:00 – 9:00 pm | Sponsor Dine Around | |||
9:00 – 11:00 pm | After Hours Hospitality Suite | |||
Friday, May 13, 2016 | ||||
7:00 – 7:45 am | Breakfast | |||
7:45 – 8:15 am | Cybersecurity is About Risk (Not Just Technology) Brigadier General (retired) Gregory J. Touhill, Department of Homeland Security |
|||
8:15 – 8:45 am | Applied Security Analytics in Healthcare Sachin Nayyar, Securonix |
|||
8:45 – 9:15 am | A Bull Black Market Revisited – A Proactive Response to the Risk Illicit Market for Medical Records Joe Demarest, EY |
|||
9:15 – 9:45 am | Improve Situational Awareness to Counter the Risk Posed by Advanced and Evasive Threats Jon Ramsey, SecureWorks |
|||
9:45 – 10:15 am | Networking/Refreshment Break | |||
10:15 – 11:15 am | Postmarket Surveillance Vulnerability Reporting Guidelines Panel: Russell Jones, Deloitte & Touche LLP; Colin Morgan, Johnson & Johnson; Suzanne Schwartz, FDA; Pavel Slavin, Baxter Healthcare Corporation |
Lessons From the Boardroom Jim Goddard, Kaiser Permanente |
Public/Private Sector Collaboration: The Past, Present, and Future of a Critical Relationship Moderator: Philip Potts, Boeing; Panelists: Colonel (retired) Steve Hilsdon, U.S.A.F.; Peter Sindt, Transportation Security Administration; Brigadier General (retired) Gregory J. Touhill, Department of Homeland Security ; Stacy L. Stevens, FBI |
Medical Device Risk Assessment, Vulnerability Reporting, Surveillance and Threat Intelligence: Tools, Data and Methods for Decision Making Dr. Dale Nordenberg, MDISS |
11:15 – 11:30 am | Transition Break | |||
11:30 am – 12:30 pm | Dealing with IoC “Noise” Tom Blauvelt and Ken Durbin, Symantec |
Creating an Integrated Cyber Security Program — One Organization’s Journey to Reduce Risk and Improve Maturity Marene Allison, Johnson & Johnson |
The Connected Aircraft: Cyber Security Challenges from Nose to Tail . . . and Beyond Moderator: Craig Maccubbin, Southwest Airlines; Panelists: Matt Biber, Qantas; Daniel Diessner, Boeing; Don Kearney, Rockwell Collins |
Medical Device Security - Coordinated Vulnerability Disclosures Michael McNeil, Royal Philips Healthcare |
12:30 – 1:30 pm | Lunch | |||
1:30 – 2:30 pm | Are my Patients and Partners in Danger? Rob Bathhurst, Cylance |
Next Generation Authentication Capabilities for Healthcare Tim Tompkins, Aetna |
Moving Forward with Tabletop Exercises and Use Case Studies Tom McGoogan, Boeing; Terrence Kirk, Aviation ISAC |
Manufacturer Instituting a Build of Material Process to Address Open Source and Third Party Software Michael McNeil, Royal Philips Healthcare |
2:30 – 2:45 pm | Transition Break | |||
2:45 – 3:45 pm | — |
Phishing — Beyond Awareness Training to Combat the Threat Susan Koski, Aetna |
Cyber Security and Its Impact to Global Operations Steven Bates, Panasonic; Jens Hennig, GAMA; Chris Folk, MITRE |
Medical Device Cybersecurity and Emerging Threats to Patient Safety Kevin Hemsley, CISSP, Idaho National Laboratory |
3:50 – 4:30 pm | Closing Remarks & Conference Wrap Up | |||
5:00 – 10:00 pm | Disney Special Event |
*Agenda is subject to change.