Boston, MA
Sheraton Boston Hotel
Sep. 11-13, 2017

Keith Fricke

Partner and Principal Consultant

Keith Fricke, MBA, CISSP, PMP has 30 years of IT experience, 16 years in healthcare information security. Prior to joining tw-Security as a Principal Consultant, Keith was Mercy Healths CISO for 5 1/2 years. He built an enterprise Information Security Department and program for its 24 hospitals, leading a staff of 14. He also had a 7 year tenure at The Cleveland Clinic, overseeing data security of nine community hospitals. He implemented an innovative hands-on Incident Response Testing program while at The Cleveland Clinic, running similar exercises at Mercy Health. Keith frequently speaks at national, state, and local conferences. He has given presentations at HIMSS, RSA, SANS _What Works” conferences, and the CISO Executive Network Annual Healthcare Summit. Keith has been a Board member of the Cleveland InfraGard chapter since 2008. He is an Adjunct Instructor, MIS Department & Department of Graduate Studies, Ursuline College, Cleveland, OH.

September 12, 2017
2:40pm - 3:10pm
Constitution A

So you want to become the CISO or the security leader at your organization or perhaps at some other organization. In this session, former hospital CISO and industry consultant Keith Fricke will share tips and words of wisdom to help you do just that, covering both key soft skills (i.e., building relationships, communicating, and other non-technical facets) as well as essential policies and procedures such as risk management and incident response.

Fricke’s primer won’t guarantee you a job, but it will increase you understanding of what the CISO role requires. And if you are already a CISO, you may pick up a few helpful tips

September 12, 2017
4:25pm - 5:00pm
Grand Ballroom

In this session, healthcare leaders discuss their organizations' journey to the cloud: What applications have they put in the cloud? What went well, what didn’t? Have the promised business and clinical benefits materialized? What cloud service providers do they use and why? What is their approach to securing data in the cloud and vetting vendors?

Speakers will discuss the good, the bad, and the ugly, and in the process give attendees deep insights into how best to develop their own cloud-computing strategy.

Get Updates

Sign up to get the latest information on upcoming events.