Paper Details


ID Username Iam a Company Session Title File ACTION Lock Edit
127 laurab Sponsor Out of Control: The Hidden Danger in Your Test & Development Environments
    
126 tyoung@syncurity.net Sponsor Using Automation to Accelerate the SOC and Reduce Business Risk
    
125 jessica.haskin Sponsor Next-Generation Analytics and Behavior Model-Driven Security
    
124 tam@skyhighnetworks.com Sponsor Protecting our Patient Data in the Era of Cloud and Mobile
    
123 vincent.nguyen@stryker.com Member Stryker Cyber Security Communications Plan
    
121 john.nelson@cpap.com Member cpap.com Guerilla Threat Intelligence: Practical Threat Intel for the SMB Health Care Providers
    
120 shawn.anderson@imail.org Member Intermountain Healthcare Managing Remote Access to Medical Devices
    
119 shawn.anderson@imail.org Member Intermountain Healthcare Medical Device Disposition Best Practices
    
118 michael.seeberger Member Boston Scientific Security Education for Medical Device Design Engineers
    
117 jking777 Member Eli Lilly and Company Cyber Incident Response - What every Organization MUST do to prepare
    
116 sortizzo Member Merck Cyber Resiliency - The Evolution of Merck's Cyber Fusion Center
    
115 chrreed Member Eli Lilly and Company Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
    
114 james@hypr.com Sponsor Preventing Mass Credentials Breaches with Decentralized Authentication and the FIDO Standard
    
113 s.murphy8886 Member Premera Blue Cross A HITRUST CSF Journey – Why, and how, did we do this?
    
112 cstanton44 others Protenus How AI Automated and Augmented Privacy Monitoring Efforts at Johns Hopkins
    
111 dannendd@wellmark.com Member Wellmark Blue Cross Blue Shield Secure Cloud - How to be Safe in the Cloud Revelotion
    
110 root9b others root9B, LLC Fail Safe Design and Development of Cyber-Physical Systems
    
109 djschleen Member Aetna Reducing Enterprise Risk with DevSecOps
    
108 sirtimothy Member Eli Lilly Principle-Driven Security Architecture
    
106 corey.maypray Member Eli Lilly and Company Foundations of Intelligence Analysis
    
105 larry.mccubbin@lilly.com Member Eli Lilly myAccess - an IAG Journey
    
104 bwalker@prevalent Sponsor Key Vendor Risk Areas That Leave You Vulnerable
    
103 shawn.anderson@imail.org Member Intermountain Healthcare Building Cybersecurity into Healthcare Research Projects
    
102 dbecknel Member Horizon BCBSNJ Governance, Risk, and Operational Analytics using Splunk
    
100 karen.correa1 Member Merck & Co. Measuring risk and impact for controls optimization
    
99 cfarriu Member Eli Lilly & Company One Phish, Two Phish, Three, Four: A Progressive Approach to Phishing Education
    
98 rydenkim Sponsor How Health Care Companies Can Shut Down the #1 Cyberattack Vector
    
97 Sponsor Protecting Patient Health Information From Targeted Attacks
    
96 jeffchandler Sponsor Code signing for secure connected devices in hospitals
    
95 allisonsafe others SAFE-BioPharma Association SAFE-BioPharma IAM Services Suite
    
94 netskope Sponsor Cloudy with a chance of Medical Records: How UPMC moved sensitive data to the cloud
    
93 stephen.mitchell Member HealthNow New York Inc. Be a hero with DMARC: Save your members, providers and partners from Internet Villains!
    
92 stephen.mitchell Member HealthNow New York Inc. Have Cloud Access Security Brokers Changed The Way We Handle Data?
    
91 jjones Member Change Healthcare Balancing Risk Management with Compliance
    
90 rterry@proofpoint.com Sponsor Thinking Differently: Protecting Patients, Employees, and Business Associates
    
89 wmamilli Member Eli Lilly and Company Information Security Strategy and governance - learning from a new CISO journey
    
88 karen.correa1 Sponsor Moving faster than human: Security orchestration for threat detection and triage
    
87 emccardwell@synack.com Member Synack Using Hackers to Protect Patient Data
  
86 nathan.moon@imail.org Member Intermountain Healthcare Best Practice for Incident Management
    
85 amitchhikara Sponsor THE USER BEHIND THE IDENTITY - THE STORY OF A SUCCESSFUL IDENTITY MANAGEMENT PROGRAM
    
84 justinarmstrong Member MEDITECH From Incident Response to Incident Preparedness
    
83 jroush@digitalstakeout.com Sponsor What Is Your Organization's Digital Footprint?
    
82 mjpn76 Member Aetna Automating Security Controls using Models and Security Orchestration
    
81 sameersule Member Fresenius Medical Care North America (FMCNA) Demonstrating the Value of an Information Security Program through Metrics - Doing what Matters!
    
79 mike.polise Member Allergan Email Defenses: The high risk service you can't disable
    
78 vermima1 Member Johns Hopkins University Applied Physics Laboratory Thinking of Automation? Start with Playbooks
    
77 kelmead Sponsor Inoculate your Healthcare Organization against Ransomware
    
76 bdmundt12 Member Aetna Threat and Vulnerability Assessment Program
    
75 jweinert others Humana Securing highly regulated Information in the Cloud
    
73 dwebster Sponsor Medical Device Cyber Program Maturity: From Foundations to Next Gen Controls
    
« Previous12


join
Copyright © 2018 NHISAC | All rights reserved | Web Design by antelope Antelope Web