Phone: 412-802-8000 | Fax: 412-802-8510|info@ncfta.net
Healthcare CyberGard 2019-10-15T11:26:17-04:00

2nd Annual Healthcare CyberGard Conference

November 14-15, 2019  |  Charlotte Marriott City Center, Charlotte, NC

Join Cyber Health Working Group (CHWG) members, non-members, and industry professionals from across the country to network and share tactical information about cyber threats, trends, and best practices for the health IT sector.

0
0
0
0
Days
0
0
Hrs
0
0
Min
0
0
Sec

WORKING AGENDA

Management Track

Getting Executive Buy In

Sam Khashman

Keynote speaker

Best Practices for Conducting an Enterprise Cyber Risk Analysis

Clearwater – George Jackson Jr.

Every healthcare provider has its own unique set of business objectives, compliance requirements, policies, procedures, and technology solutions. As a result, it also has its own unique set of threats, vulnerabilities, and risks.

Traditional approaches to Cyber Risk Management, including one-size-fits-all checklist assessments, spreadsheets, and paper-based systems, are proving insufficient in addressing the unique needs of organizations and often do not meet HIPAA compliance requirements. This presentation will discuss how, working in partnership with Clearwater, Vancouver Clinic has developed an efficient and effective program for analyzing cyber risk across its enterprise. Best practices, including methodologies and tools utilized, will be shared.

Cybersecurity Awareness

CNS Healthcare – Florin Petrutiu

Upgrade your human firewall! We all heard that phrase over and over, but how about concrete plan to implement a Cyber-Security Awareness program? Many vendors are trying to fill this void but the truth is that you cannot take a canned program and insert it to fill this space. The specifics of each organization are different, the needs will be different. It is not a one-size-fits-all endeavor. This presentation is geared towards implementation of a program for the busy healthcare professional and clinician in mind. How do we relay the importance of cybersecurity and better yet, how we gain their buy-in and implement the basic security principles into their daily lives; ultimately to the benefit of the organization.

Leadership Perspective on Cyber Awareness

North Wonders – Terry Ziemniak

This presentation will discuss a recent survey with dozens of organizational leaders regarding security awareness – covering a variety of topics including what works, what doesn’t, what is needed, what is the perceived risk, what is their exposure, what is the potential gains.

Interview questions were designed to capture details on both the awareness program itself as well as how it supported the larger security and technology functions.  Topics included culture, risk management, metrics, and tools.  Additionally, leaders were asked open ended questions regarding the value proposition of security awareness and what would an ideal program look like.

Using a combination of metrics and quotes, the presentation provides meaningful insight into organizational security awareness programs.

Insights gained from these perspectives will be used to discuss the design and execution of world class security awareness programs.

Business Email Compromise

HM Health Solutions – Clinton Walker

Billions have been lost over recent years as the cyber threat of a business email compromise continues to impact organizations across the globe. Although the objective is often the transferring of funds we need to consider that variations of this threat in the healthcare arena can also be driven with the intent to exfiltrate sensitive data such as patient information. The art of deception along with playing the ‘urgency’ card still causes this attack to be a huge success. Therefore, our employees need a cyber-conscious at all times. Of course our defenses need to be tightened and our response plan needs to be thorough. So what does that security awareness, those defenses, and that response plan look like? This presentation is going to carve out the answers to those questions.

  • We will look at the anatomy of a BEC.
  • You will learn about traits and techniques used, stagger at a few stats, and draw up defenses.
  • Lastly we will walk through the incident handling process of 2 scenarios.

Improving Risk Management Decisions with Cyber Risk Quantification

Health Guard – Apolonio “Apps” Garcia

In life and business, we often must make tough decisions under varying degrees of uncertainty. When the uncertainty involves the potential for loss or an unfavorable outcome, we call this risk. Healthcare leaders rely on their security teams to assess and communicate risk effectively in order to make risk-informed policy and resource allocation decisions. During this session, we will explore a few of the analysis and decision-making challenges that organizations face and demonstrate how risk quantification can be used to overcome them.

Technical Track

Building a medical device cybersecurity program

MedSec – Stephanie Domas

Every healthcare provider has its own unique set of business objectives, compliance requirements, policies, procedures, and technology solutions. As a result, it also has its own unique set of threats, vulnerabilities, and risks.

Traditional approaches to Cyber Risk Management, including one-size-fits-all checklist assessments, spreadsheets, and paper-based systems, are proving insufficient in addressing the unique needs of organizations and often do not meet HIPAA compliance requirements. This presentation will discuss how, working in partnership with Clearwater, Vancouver Clinic has developed an efficient and effective program for analyzing cyber risk across its enterprise. Best practices, including methodologies and tools utilized, will be shared.

Stopping Targeted Ransomware Attacks

CISCO – Chris Riley

Ransomware attacks have evolved from Mass Distributed threat like Locky and Gandcrab to a more targeted attack model. Groups such as, Ryuk, Megacortex, SAMSAM, and LockerGoga have inflicted serious damage on government and private organizations throughout 2019. The goal of this session is to provide analysis of targeted ransomware attacks which use compromised credentials or info stealer malware for initial intrusion and use pentest tools like CobaltStrike and Powershell Empire for exploitation, lateral movement and privilege escalation. The session will recommend mitigations for hardening Active Directory and PowerShell to stop these attacks. The presentation will also cover best detection methods creating audit policies to monitor for account enumeration, mimikatz activity, elevation of privileges, detect lateral movement and creation of dummy accounts. The session will also recommend updates to business continuity strategies such as backup/recovery strategy, cyber insurance and IR retainers.

Defining Today’s Hacker

CISCO – Chris Riley

The hackers of today work in an eco-system where all kinds of enterprise hacking tools, target lists, exploits, database dumps, FUD services, RaaS, MaaS, Cashout services, bullet proof hosters, botnets for hire, spam botnets, Pay-per-install services, etc. are available on dark marketplaces to empower and support ongoing modern day criminal activity. Hackers have a different set of skills now. They do it for the money, not for the fame. This presentation would describe the need for diversification of security defenses in light of the new risks and threats from today’s attacker.

HC3 Threat Briefing

HC3 – Troy Adams and Mark Billinger

More details to be provided.

Additional (Awaiting information)

Montez Fitzpatrick

IWorksTech – Caston Thomas

CISA – Rick Lichtenfels

KnowB4