We invite you to attend our free Healthcare Incident Response Workshop on Wednesday, March 14th in Pasadena. During this three-hour educational workshop, security experts David Finn and John Nye will provide an update of the current threat landscape that could easily cause a security or breach event. Using case study examples, they will demonstrate how responding to an event doesn’t fall solely in security’s wheelhouse, but requires a collaboration between IT, security, compliance and privacy.
After the event, attendees will be more prepared for responding to an event, as well as actionable best practices for preparing a proactive incident response plan.
Topics covered include:
The current threat landscape and latest trends in healthcare
Real-world examples and case study
Best practices for creating an incident response playbook
Interactive roundtable response exercise
Register For This Event
Why You Should Attend
- Ponemon Institute’s research found that the average cost of an incident is $3.62 million.
- Healthcare is being targeted by malware and ransomware, and understanding the threat is the first step to be able to respond to an incident.
- Understanding the impact of an incident on the entire organization is critical to assuring the appropriate response plan is in place.
- Security measures have to be proactive rather than reactive.
- 78% of providers experienced a healthcare ransomware or malware attack in 2017.
- Cyber incident response cannot be adequately addressed by IT alone in today’s regulatory environment.
- The largest healthcare data breaches from 2017 that were reported to OCR were mainly caused by hacking or IT incidents, including ransomware attacks.
- 98% of healthcare providers have not implemented the email authentication standard that reduces phishing emails.
- What Could Go Wrong?
- War Stories
- Why Have an Incident Response Plan?
- Purpose of an Incident Response Plan
- Who Needs to be Involved?
- Lunch (provided)
- Planning & Creating an Incident Response Playbook
- Documentation & Breach Assessment
- Making the Business Case for the Incident Response Plan
Who Should Attend
- Privacy Officers & Analysts
- Security Officers & Analysts
- Chief Compliance Officers & Analysts
- CIOs, CISOs, ISOs
- IT Directors
- HIM Directors
- Legal Professionals
- C-Suite Stakeholders
Nye’s specialties include Wireless, web, and system penetration testing, user education and public speaking, information assurance, security auditing, policy compliance and writing, and security research and analysis. Some of his industry certifications include CISSP, Licensed Penetration Tester (LPT) and Certified Ethical Hacker (CEH).
What Past Attendees are Saying
I appreciate an organization that is willing to share information for free. Those that have little to give keep what little they have close. However when you are willing to share for free, there is more to be had and they are truly at the top of their field.
“Thank you so much for the chance to attend this event. It was a great program, well presented and the appropriate length of time. I look forward to participating again in the future.”