Name
Practical Tips for Creating a Cybersecurity Framework that Meets Your Privacy Standards
Date & Time
Friday, October 20, 2017, 12:05 PM - 1:30 PM
Speakers
Lee Barrett , CEO, EHNAC
Johannes (John) Boehme , Chief Information Security Officer, Wake Forest Baptist Health
Chris Beal , Director of Security, Chief Security Architect, MCNC
Chuck Kesler, CISM, CISSP CISM, CISSP, Chief Information Security Officer, Duke Health
Carl Cammarata , Chief Information Security Officer, Northwestern University - Feinberg School of Medicine
Johannes (John) Boehme , Chief Information Security Officer, Wake Forest Baptist Health
Chris Beal , Director of Security, Chief Security Architect, MCNC
Chuck Kesler, CISM, CISSP CISM, CISSP, Chief Information Security Officer, Duke Health
Carl Cammarata , Chief Information Security Officer, Northwestern University - Feinberg School of Medicine





Description
There is no such thing as a one-size, fits all cyber framework for healthcare privacy and security shops. This session will focus on how providers can create a cyber framework that serves as a foundation of their cybersecurity strategy, improves their risk posture and allows for the development of a clinically-aware security and privacy program.
Topics include: Engaging your board, leadership and peers in creating a cybersecurity culture that is critical to the success of your governance structure and frameworks The use of frameworks to create a data-centric approach to security, enabling access to sensitive patient data anywhere, any-time, on any device How to organize and prioritize standardization efforts in order to build and maintain an information security program How they are using tools from multiple frameworks to move from a traditionally reactive approach to one that is far more proactive.
Panelists: