All events are in Eastern Time (ET) unless otherwise noted in the event description.

  • Event Information


    Most healthcare organizations use an array of Identity and Access Management tools today. Yet, integrating those solutions into a wholistic digital identity framework to help manage the full lifecycles of all identities is not as common as one may think. It’s not that easy. There are different approaches, including the recently published H-ISAC Framework for CISOs to Manage Identities. In this focus group, we’d like to share ideas on Digital Identity Frameworks and collect your thoughts on identity-centric approaches to bolstering cybersecurity.
  • Event Information


    In response to the challenges that CISOs are facing in today’s complex security environment Intraprise Health sees the industry moving to greater and greater levels of automation to manage their security programs. In this session, Intraprise Health is looking for feedback regarding its new security risk management platform that they believe includes unique capabilities compared to other similar products in the marketplace.
  • Event Information


    From both a regulatory and a security perspective, it is not enough to have a completed risk analysis. To protect your organization from accelerating cyberattacks and ensure compliance with HIPAA requirements, you must take action to manage the risks identified in the appropriate manner. Unfortunately, whether it be due to lack of resources or tools or knowledge in some cases, too many organizations are not actively managing identified risks. This webinar is designed to help you understand risk response fundamentals so that your organization can establish a process and workflow to reduce vulnerabilities and achieve better outcomes in managing cyber and compliance risks. Learning Objectives:
    • The regulatory requirements and most effective standards for responding to risk
    • The four essential options for effective risk response
    • How to evaluate alternatives to reduce risk in terms of effectiveness and feasibility
    • How to make sure risk responses get implemented through tracking new or improved controls
  • Event Information


    Vulnerability management for connected and unmanaged devices (IoT and IoMT) is becoming a priority for organizations but we’re seeing challenges around identification, scanning, tracking assets and more. The CEO and VP or System Engineering at Medigate would like to discuss how you’re address vulnerability management today and what you would like a solution to help you achieve.