Boston, 2018 x2, MA
Oct. 15-16, 2018

Chad Wilson

Director, IT Security
Children's National Medical Center

Chad Wilson is a strategically oriented leader who excels in innovation, communication throughout the enterprise, team building, and excels in complex problem solving where business objectives drive technology solutions. Astutely recognizes critical technology trends and is first to align with business goals. A former Officer of Marines, his 20 years of proven leadership and vision have been instrumental to address the rapidly evolving intersection of consumer and business platforms. As a proven senior advisor to executives, Wilson is responsible for implementing an acceptable level of information technology risk in order to achieve business objectives. He has direct knowledge and experience leading programs responsible for all aspects of information systems program development and implementation, IT management best practices, risk management, information/cyber security and assurance, infrastructure protection, and auditing compliance (COBIT, ITIL, FISMA, HIPAA, SOX, ISO standards).

October 15, 2018
9:40am - 10:25am
America Ballroom

If you think of healthcare security as a three-act play, we are now well into the second act, and orgs that have not kept up (and there are many), face more danger than they likely imagine.

Key second act themes:

  • Healthcare orgs shift resources from prevention to incident response. It’s not if, but when you’ll be breached. To safeguard patient safety and business continuity, organizations must respond and recover quickly.
  • Information sharing has grown in importance.
  • Security leaders recognize the need to optimize existing technology rather than buy the next shiny object.
  • Automation and manage services help offset a shrinking talent pool.
  • Awareness training sits center stage.

The list goes on.

In this session, our expert speakers will discuss these and other key features of healthcare security’s second act. Importantly, they’ll provide guidance to help organizations stuck in the first act move to the second act and create a more resilient security posture.

As for the third act, they’ll have some thoughts on that, too.

October 15, 2018
2:20pm - 3:00pm
St. George A/B

If you are worried about insider threats, you should be.The Ponemon Institute reported this year that insider threats now account for 87% of all cyber incidents: 64% from privileged user negligence, 23% perpetrated by malicious insiders.

In other words, education at many organizations has failed – as have perimeter defenses, rendered ineffective against increasing sophisticated attacks.

In this session, a leading healthcare attorney draws on security research to show that to reduce insider threats, rather than rely on technology, healthcare organizations must change their mindset and focus more on people and process – and view employees as threat vectors and not innocent victims of cybercrime.

Attorney Barry Herrin discuss six “Big Decisions” organizations must make to mitigate this weakest link. These include:

  • Cutting the cord to social networking and personal email accounts.
  • Treating access as a privilege, not a right.
  • Deciding when to shift from education to punishment.

Barry will then moderate a group discussion with a healthcare risk-management leader and share best practices to help attendees shore up and button down their approach to mitigating insider threats.

Get Updates

Sign up to get the latest information on upcoming events.