Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, April 12, 2023
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 4:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Opening Keynote] Healthcare Cybersecurity Snapshot
    • session level icon
    speaker photo
    Sr. Principal, Cybersecurity & Privacy, Healthcare Information and Management Systems Society, Inc. (HIMSS)
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Healthcare organizations of all kinds are undergoing significant transformation. However, with less revenue and resources, some healthcare organizations can only do so much. Yet, all organizations must vigilantly safeguard patient information. We will explore the current state of the industry and resources that are available to help organizations that are in need. We will also take a look at the future—where we are headed and the obstacles that lie ahead.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    12:00 pm
    Creating and Maturing Your Medical Device Security Program
    • session level icon
    speaker photo
    Director of Cybersecurity, Children's Mercy Kansas City Hospital
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm

    Session description to come.

    12:00 pm
    BEC Attacks: The Stealthiest and Most Lucrative Threat
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:00 pm
    Did You Get Our Message? How to Maintain Email Availability
    • session level icon
    speaker photo
    Sr. Security Engineer, Cape Code Healthcare
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Organizations implement settings to ensure an email message is not spoofed; and nowhere is effective email communication more important than in healthcare where patients receive vital information, such as test results and other health-related updates. However, some organizations are not utilizing all settings available to them to ensure patients are indeed receiving email communications. This presentation investigates:

    • How to avoid having emails to patients blocked by ISPs
    • What to do when a service provider does block emails
    • The importance of making sure an organization is notified in a timely manner when messages are flagged as spam (feedback loops)
    1:00 pm
    Why Should You Care About HIPAA?
    • session level icon
    How to Build and Scale Secure and Compliant SaaS Business in Healthcare
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Key Takeaway: How to adopt HIPAA in a small to mid-level organization.

    Security and compliance in the healthcare world are very important. HIPAA is a cornerstone of the security frameworks that brings a special mindset to cyber defense. We will dive into the aspects of HIPAA that are relevant to CISOs in all stages of the startup.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:00 pm
    CISO Panel: A Healthcare State of the Union
    • session level icon
    speaker photo
    CISO & CPO, Cooper University Health Care
    speaker photo
    CISO, Steward Health Care
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Join our group of security leaders as we dig into current topics surrounding healthcare and cyber. We’ll touch base on recession and budget planning, cyber insurance challenges, and Artificial Intelligence, and we’ll discuss some of the 2023 predictions and see if they are likely to come to fruition.

    2:00 pm
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    3:00 pm
    Build Better Controls Around Third-Party Risk
    • session level icon
    speaker photo
    CISO, Tufts Medicine
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session description coming soon.

    3:00 pm
    Securing Your Sensitive Assets in a Cloud-First World
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Key take-away: 
    How to rethink database security controls in a cloud-first world.

    For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:

    • Amount of data created, collected, and stored
    • Number of repositories storing sensitive data across clouds
    • Number of users and applications that need access to data
    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    4:00 pm
    Developing a Crisis Management Playbook
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    When a data breach or other cyber incident happens, having a plan in place can mean the difference between a quick recovery and unwanted headlines and irreparable harm to stakeholder trust.

    4:00 pm
    Demystifying Zero Trust and Its Role in Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm
Exhibitors
  • Okta
    Booth: TBD

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Lee Kim JD CISSP CIPP/US
    Sr. Principal, Cybersecurity & Privacy, Healthcare Information and Management Systems Society, Inc. (HIMSS)

    Lee Kim is a top rated attorney, cybersecurity and data privacy subject matter expert, and creative professional (actress and voiceover artist).

    Lee has earned the highest distinction as an attorney with an AV Preeminent peer review rating. Lee is licensed in the District of Columbia, Commonwealth of Pennsylvania, and registered to practice before the US Patent and Trademark Office as a patent attorney. Her cybersecurity expertise has been featured on live and pre-recorded television programs with the Canadian Broadcasting Corporation (CBC) including The National & Here & Now, radio programs, and podcasts.

    Lee serves as a Director of InfraGard Northern Capital Region, Vice Chair of the Policy Committee of the American Bar Association Health Law Section, and National Visiting Committee member of the National Cybersecurity Training and Education Center (appointed by the National Science Foundation as the healthcare representative for NCyTE).

    Previously, Lee served with the US Department of Homeland Security Analytic Exchange Program as a team leader and champion, the (ISC)2 Government Advisory Council Executive Writers Bureau, National Cyber Incident Response Plan & NIST Cybersecurity Baldrige Excellence Builder working groups, and as a Vice Chair of the American Bar Association Health Law Section eHealth Privacy and Security Interest Group, eSource, and Emerging Issues in Healthcare Law. Lee also served on the SANS Securing the Human Healthcare advisory board.

    Lee has trained, educated, and otherwise worked with a wide variety of stakeholders in the private and public sector in the United States, Canada, Europe, and across the Asia-Pacific, including cybersecurity and privacy professionals, information technology staff, clinicians, attorneys, & others.

    Lee has 250+ speaking engagements, 75+ publications, and 250+ media mentions on cybersecurity, data privacy, intellectual property protection, and public policy matters (e.g., Associated Press, Huffington Post, Wired, Forbes, Axios, CBC, and Politico). In the public policy sphere, her expertise has been tapped by Congressional staffers on Capitol Hill.

    As an actress, Lee is represented by top-rated commercial, talent, and modeling agencies in NY/NJ and does freelance work (including voiceovers). She has trained with the best in the business.

  • speaker photo
    Ravi Monga
    Director of Cybersecurity, Children's Mercy Kansas City Hospital
  • speaker photo
    Stanley Hammond
    Sr. Security Engineer, Cape Code Healthcare

    Stanley Hammond has been in the IT field for the past 20 years and in the information security since 2006. He is currently a Senior Security Engineer in the healthcare field in Massachusetts. Throughout his career he has work for non-profits, non-government organizations, higher education, and both public and private sector organizations. He is currently working in multiple areas including security awareness, incident response and proactive maintenance. He holds several industry recognized certifications including CISSP, CISA, HCISPP and CDPSE.

  • speaker photo
    Panel Discussion
  • speaker photo
    Phil Curran
    CISO & CPO, Cooper University Health Care

    Phil Curran has more than 25 years of experience in information security and privacy in the military, government and private sectors. As the Chief Information Assurance Officer and Chief Privacy Officer at Cooper University Health Care in Camden NJ, he is responsible for managing governance and regulatory compliance, risk assessment and management, threat intelligence and vulnerability assessment, privacy and security investigations, business continuity, and awareness and training. He has served on the Health Information Trust Alliance (HITRUST) task force to integrate privacy controls in the Common Security Framework and the development of the ISC2 Health Care Information Security and Privacy Practitioner. Phil serves on the Executive Committee for Secure World – Philadelphia and the Philadelphia and New Jersey Chapters of the CISO Executive Network. He has spoken on Information Security and Privacy issues at Secure World and HIMSS Privacy and Security.

  • speaker photo
    Esmond Kane, Moderator
    CISO, Steward Health Care

    Esmond Kane currently serves as Chief Information Security Officer (CISO) at Steward Health Care, an international healthcare delivery organization serving millions of patients annually. In his role at Steward, Esmond helps clinicians and leaders deliver world class care aligned with industry frameworks, regulations and best practices.

    Esmond has over 25 years’ experience leading IT and Security programs in multiple industries. Before joining Steward, he served as Deputy CISO at Partners Healthcare/MassGeneralBrigham and in various roles in Harvard University. In his spare time, Esmond likes to fret about spare time and annoy people who read bios.

  • speaker photo
    Brian Cayer
    CISO, Tufts Medicine

    Brian Cayer joined Tufts Medicine as CISO in December 2019. During his tenure at Tufts Medicine, Brian assisted with their transformation to bring multiple hospitals and a home healthcare group into one organization. He also acted as the Interim Chief Technology Officer merging into one electronic medical record system (Epic), which included being the first healthcare system to host Epic in AWS. Prior to joining Tufts Medicine, Brian held vice president roles, in Security/IT, for over 25 years between Stroz Friedberg (an Aon Company) and State Street Bank.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Learn and connect virtually

Join your InfoSec peers for high-quality training and collaboration. Sign up today!