Boston, MA
Sheraton Boston Hotel
Sep. 11-13, 2017

Phil Alexander

Director of Information Security & ISO
UMC Health System

Phil Alexander is the Information Security Officer at University Medical Center, a 412-bed hospital in Lubbock, Texas, and the primary hospital in the UMC Health System. He holds a Bachelor’s degree from Troy University and several security certifications including Security+, Certified Ethical Hacker (CEH), HITRUST Practitioner, and Certified Chief Information Security Officer (C|CISO).

Prior to arriving in Lubbock, Phil spent 14 years in the federal cyber security arena, working at 1st AD/Europe, National Security Agency (NSA) and Regional Computer Emergency Response Team – South America (RCERT-S). He also served as a member of the Federal Critical Infrastructure Program (CIP) Working group. He is a current member of INFRAGARD and the president of the West Texas ISSA.

September 12, 2017
1:30pm - 2:00pm
Constitution A

Today’s security leaders and their staff are becoming healthcare’s new super heroes. They’re expected to know all and respond at the speed of light. And while this may seem impossible, rest assured, super hero-like abilities are accessible to regular people – people like you.

In this session, a seasoned security veteran will dive into three big struggles most security leaders grapple with today, and follow up with key takeaways for success.

Superman/Wonder Woman

  • How to transition from Clark Kent to Superman or Diana Prince to Wonder Woman - “How do I balance the business needs and security concerns?”

The Flash

  • The Flash possess "super speed" which includes the ability to run, move, and think extremely fast. - “How do I keep up with the fast pace changes in today’s ever-changing security landscape?”

Justice League

  • Greater than the sum of their awe-inspiring parts, the Justice League handles threats too massive for any single hero. “How do I build a solid governance structure including overall strategy and processes to include obtaining executive buy in?”

YOU (Key takeaways)

  • Understand and align with the business needs.
  • Wear the mask - share the mask.
  • Don’t try and be the hero alone.
  • Mask your data – Role-based access; use layered security methods.
  • Unleash your powers – The most successful security leaders are those who implement governance and security protocols in a non-aggressive manner, allowing the organization to retain the speed and agility needed to deliver meaningful business decisions.
September 12, 2017
2:05pm - 2:35pm
Grand Ballroom

When an organization detects a compromise, rapid incident response can mean the difference between quick containment or a damaging data breach. If you rely solely on manual processes, you’ll struggle with longer response times and face higher risk. But if you automate common investigation and response you augment your workforce, minimize response times and make your organization more secure.

Automation is on the rise, but not all security leaders have embraced the technology.

In this session, attendee will learn why organizations frequently delay embracing automation (loss of control, lack of trust, fear of change), as well as it’s promised benefits (increased efficiency, fewer errors, better decision making).

Is automation in your future? This session will help you decide.

Get Updates

Sign up to get the latest information on upcoming events.