HEALTHCARE SECURITY FORUM: A HIMSS EVENT

Boston, MA
Oct. 15-16, 2018

Kevin Littlefield

Principal, Cyber Security Research
Mitre

Kevin Littlefield brings over 20 years’ experience in information and cybersecurity to his work researching and developing solutions for federal healthcare sponsors. As a principal cybersecurity researcher in MITRE’s Security for Enterprise and Cloud Architectures department, he has worked with the Centers for Medicare & Medicaid Services, the Centers for Disease Control, and the National Cybersecurity Center of Excellence. Mr. Littlefield applies his insight and lessons learned from a wide range of projects related to security operations, cyber threat intelligence information sharing, microservice security, and medical device security to the needs of the healthcare industry. Prior to joining MITRE, Mr. Littlefield served as the Information Security Officer for the Brigham and Women’s Hospital and Brigham and Women’s Physician’s Organization, where he managed the information security program that spanned the BWH and Brigham and Women’s Faulkner Hospitals. This program provided cybersecurity guidance for patient care as well as medical research information systems. Mr. Littlefield served as the Global Information Security Officer at the Novartis Institutes for BioMedical Research, and held risk management and auditing and information security roles at Harvard University, John Hancock Financial Services, VIANT Corporation, and Cambridge Technology Partners. He is a Certified Information Systems Security Professional and holds a B.A. in Politics from Brandeis University.

October 15, 2018
4:45pm - 5:25pm
America Ballroom

Phishing poses a major threat to your organization, and this interactive session will test your knowledge and provide best practices for mitigating these increasingly sophisticated attacks.

Here’s how it works: Our moderator will ask multiple-choice questions based on recently released public-private research on phishing. Attendees will answer via our real-time polling app. Finally, our panel of experts will address the questions and discuss the correct answers more in-depth.

Some sample questions:

  • What’s the difference between spear-phishing and whaling?
  • Phishing is the most common entry point for a breach? Yes or no.
  • List three factors that make people more susceptible to phishing.
  • If you suspect a phishing attack, what’s the first thing you should do?

As this session will prove, learning can be fun, and the information shared will strengthen your organization’s phishing defense.

Get Updates

Sign up to get the latest information on upcoming events.

 

Subscribe