Paper Details

ID Username Iam a Company Session Title File ACTION Lock Edit
127 laurab Sponsor Out of Control: The Hidden Danger in Your Test & Development Environments
126 Sponsor Using Automation to Accelerate the SOC and Reduce Business Risk
125 jessica.haskin Sponsor Next-Generation Analytics and Behavior Model-Driven Security
124 Sponsor Protecting our Patient Data in the Era of Cloud and Mobile
123 Member Stryker Cyber Security Communications Plan
121 Member Guerilla Threat Intelligence: Practical Threat Intel for the SMB Health Care Providers
120 Member Intermountain Healthcare Managing Remote Access to Medical Devices
119 Member Intermountain Healthcare Medical Device Disposition Best Practices
118 michael.seeberger Member Boston Scientific Security Education for Medical Device Design Engineers
117 jking777 Member Eli Lilly and Company Cyber Incident Response - What every Organization MUST do to prepare
116 sortizzo Member Merck Cyber Resiliency - The Evolution of Merck's Cyber Fusion Center
115 chrreed Member Eli Lilly and Company Leveraging DevSecOps to Escape the Hamster Wheel of Never-ending Security Fail
114 Sponsor Preventing Mass Credentials Breaches with Decentralized Authentication and the FIDO Standard
113 s.murphy8886 Member Premera Blue Cross A HITRUST CSF Journey – Why, and how, did we do this?
112 cstanton44 others Protenus How AI Automated and Augmented Privacy Monitoring Efforts at Johns Hopkins
111 Member Wellmark Blue Cross Blue Shield Secure Cloud - How to be Safe in the Cloud Revelotion
110 root9b others root9B, LLC Fail Safe Design and Development of Cyber-Physical Systems
109 djschleen Member Aetna Reducing Enterprise Risk with DevSecOps
108 sirtimothy Member Eli Lilly Principle-Driven Security Architecture
106 corey.maypray Member Eli Lilly and Company Foundations of Intelligence Analysis
105 Member Eli Lilly myAccess - an IAG Journey
104 bwalker@prevalent Sponsor Key Vendor Risk Areas That Leave You Vulnerable
103 Member Intermountain Healthcare Building Cybersecurity into Healthcare Research Projects
102 dbecknel Member Horizon BCBSNJ Governance, Risk, and Operational Analytics using Splunk
100 karen.correa1 Member Merck & Co. Measuring risk and impact for controls optimization
99 cfarriu Member Eli Lilly & Company One Phish, Two Phish, Three, Four: A Progressive Approach to Phishing Education
98 rydenkim Sponsor How Health Care Companies Can Shut Down the #1 Cyberattack Vector
97 Sponsor Protecting Patient Health Information From Targeted Attacks
96 jeffchandler Sponsor Code signing for secure connected devices in hospitals
95 allisonsafe others SAFE-BioPharma Association SAFE-BioPharma IAM Services Suite
94 netskope Sponsor Cloudy with a chance of Medical Records: How UPMC moved sensitive data to the cloud
93 stephen.mitchell Member HealthNow New York Inc. Be a hero with DMARC: Save your members, providers and partners from Internet Villains!
92 stephen.mitchell Member HealthNow New York Inc. Have Cloud Access Security Brokers Changed The Way We Handle Data?
91 jjones Member Change Healthcare Balancing Risk Management with Compliance
90 Sponsor Thinking Differently: Protecting Patients, Employees, and Business Associates
89 wmamilli Member Eli Lilly and Company Information Security Strategy and governance - learning from a new CISO journey
88 karen.correa1 Sponsor Moving faster than human: Security orchestration for threat detection and triage
87 Member Synack Using Hackers to Protect Patient Data
86 Member Intermountain Healthcare Best Practice for Incident Management
84 justinarmstrong Member MEDITECH From Incident Response to Incident Preparedness
83 Sponsor What Is Your Organization's Digital Footprint?
82 mjpn76 Member Aetna Automating Security Controls using Models and Security Orchestration
81 sameersule Member Fresenius Medical Care North America (FMCNA) Demonstrating the Value of an Information Security Program through Metrics - Doing what Matters!
79 mike.polise Member Allergan Email Defenses: The high risk service you can't disable
78 vermima1 Member Johns Hopkins University Applied Physics Laboratory Thinking of Automation? Start with Playbooks
77 kelmead Sponsor Inoculate your Healthcare Organization against Ransomware
76 bdmundt12 Member Aetna Threat and Vulnerability Assessment Program
75 jweinert others Humana Securing highly regulated Information in the Cloud
73 dwebster Sponsor Medical Device Cyber Program Maturity: From Foundations to Next Gen Controls
« Previous12

Copyright © 2018 NHISAC | All rights reserved | Web Design by antelope Antelope Web