Day 2: Thursday, October 26th

Networking

8:15 AM - 9:00 AM Networking Breakfast

Opening Remarks

9:00 AM - 9:05 AM Chairperson’s Opening Remarks

Morning Keynote

9:05 AM - 9:40 AM The Digital CIO’s Guide to Building an Effective Cyber Strategy Roadmap

Joey Johnson, CISO, Premise Health
Most healthcare organizations have put strategic security leadership in place, but where that strategic outlook intersects with tactical delivery, it dwells heavily within the CIO’s domain. We’ll address the market longevity of products and their path to commoditization, the true level of effort in implementing them, and when is the appropriate timing for each. This talk will equip CIOs and IT leaders with the information necessary to ensure they can both challenge the demands of their security leaders, and effectively support their requirements upstream to executive and board leadership. During this keynote, we’ll discuss:


•How to effectively challenge your CISO and security leaders
•Recognizing key prerequisites that are critical to buying a technology
•How to navigate the cybersecurity investment noise



img

Joey Johnson

CISO
Premise Health

Panel Discussion

9:40 AM - 10:25 AM Security Alert: These Top Security Issues Can Make or Break Your Healthcare System

Joey Johnson, CISO, Premise Health Meredith R. Harper, Chief Security & Privacy Security Officer, Henry Ford Health System




img

Meredith R. Harper

Chief Security & Privacy Security Officer
Henry Ford Health System
img

Joey Johnson

CISO
Premise Health

Business Meetings

10:30 AM - 11:00 AM Business Meetings

Business Meetings

11:00 AM - 11:30 AM Business Meetings

Networking Break

11:30 AM - 11:45 AM Networking & Snack Break

Plenary Session

11:45 AM - 12:15 PM Quantifying “Good IT” in Healthcare

Lunch

12:15 PM - 1:15 PM Networking Lunch

Plenary Session

1:15 PM - 1:45 PM Identifying and building a 21st Century Cybersecurity Talent Pipeline: A Blockchain Imperative for Industry and Academia

Bill Dafnis, Associate Dean of Technology, School of Business and Technology, Capella University
Major industry trends fueled by the Internet coupled by healthcare and information technology innovation continues to grow exponentially. Such growth requires that a talent pipeline be differentiated on a myriad of factors. Today’s talent management systems do not afford an immutable means to discover Cybersecurity candidates and therefore new methods and processes such as Blockchain must be exploited to build and inform for a 21st workforce. This presentation affords CIOs and thought-leaders visibility into a conceptual model of the Blockchain promise for a distributed peer to peer ecosystem in an academic computing program with industry parallels. Takeaways:
· Track and build your talent requirements with deeper competencies.
· Understand how Blockchain may introduce a new workflow that further transparency across your ecosystem.
· Differentiate your talent search by seeking out other disciplines beyond the computing domains.
· Build talent management models that create and empower cross-functional teams of underserved populations.

img

Bill Dafnis

Associate Dean of Technology, School of Business and Technology
Capella University

Master Class B

1:50 PM - 2:35 PM How to Bolster the Benefits of Your EHR by Improving Communications in Your Hospital

Donna Robinson, Division Vice President, Spok
While EHRs are beneficial repositories of patient data and are able to transform that data into actionable information, that information still needs to be communicated to the right people quickly and effectively. EHRs become even more powerful when additional tools allow the sharing of pertinent information with the exact people who need it at the precise time it is needed. Join Donna Robinson, Division Vice President at Spok, to explore how your EHR can be paired with communication tools that foster clinical conversations and collaboration.

img

Donna Robinson

Division Vice President
Spok

Brain Weave B

1:50 PM - 2:35 PM Cybercrime is Targeting Hospitals: What Can We Do to Mitigate Our Risk?

Monica Seemiller, North America Director, Technology Alliance Partners, Sungard Susmit Pal, Healthcare Field Director , Dell EMC Global Alliances
Cybercrime is impacting all industries around the globe -- with hospitals a prime target. The impact of Ransomware is often devastating. Recently, WannaCry infected more than 200,000 computers across 150 countries with 16 major hospitals closing down across the UK, putting lives at risk.
Besides Ransomware, Insider Threats are equally damaging to healthcare organizations. More than 25% of breaches come from internal resources, which often go undetected for months, years even. Traditional security measures are often-times not intelligent enough to detect malware and prevent lateral spread. Malware can also infiltrate the backup, where it can sit formant for months -- making recovery more difficult. One way to mitigate risk is to isolate the backup environment by creating an airgap, and leveraging outside resources for recovery versus internal resources that might be part of the initial breach. During this Brain Weave session, we will discuss:
· Limitations of traditional security solutions when dealing with modern-day cyber threats.
· Implementing a multi-layered security strategy from edge to core to cloud
· Creating a robust response and recovery plan with isolated/airgap solution

img

Monica Seemiller

North America Director, Technology Alliance Partners
Sungard
img

Susmit Pal

Healthcare Field Director
Dell EMC Global Alliances

Business Meeting

2:40 PM - 3:10 PM Business Meeting

Business Meeting

3:10 PM - 3:40 PM Business Meeting

Business Meeting

3:40 PM - 3:55 PM Networking Snack Break

Plenary Session

3:55 PM - 4:25 PM Transforming Healthcare through Personalized, Consumer-Centric Healthcare

Meredith R. Harper, Chief Security & Privacy Security Officer, Henry Ford Health System
Most healthcare organizations have put strategic security leadership in place, but where that strategic outlook intersects with tactical delivery, it dwells heavily within the CIO’s domain. We’ll address the market longevity of products and their path to commoditization, the true level of effort in implementing them, and when is the appropriate timing for each. This talk will equip CIOs and IT leaders with the information necessary to ensure they can both challenge the demands of their security leaders, and effectively support their requirements upstream to executive and board leadership. During this keynote, we’ll discuss:
· How to effectively challenge your CISO and security leaders
· Recognizing key prerequisites that are critical to buying a technology
· How to navigate the cybersecurity investment noise

img

Meredith R. Harper

Chief Security & Privacy Security Officer
Henry Ford Health System

Business Meetings

4:30 PM - 5:00 PM Business Meetings

Business Meetings

5:00 PM - 5:30 PM Business Meetings



Plenary Session

5:00 PM - 5:45 PM The Health Informatics Skill Gap Conundrum

Most healthcare organizations have realized that a robust Health Informatics group is an essential part of the organization and has a strategic value in maximizing the use of healthcare information technology. Health Informatics is still an evolving field and among others characteristics includes the interdisciplinary study of the design, development, adoption, and application of IT-based innovations in the delivery, management, and planning of healthcare services. It is embraced today by aspiring and committed clinicians or IT professionals who are interested in becoming health informaticists or expanding their knowledge in the area of health informatics. And yet, how do we find those professionals familiar with current health information systems and technologies and who are prepared to analyze, design and manage evolving health information systems for a wide variety of clinical, administrative and research purposes. Despite the growth of academic programs and various certifications, the applied sciences aspects of this field are not yet standard, positions are not available for entry level professionals and or for that matter not enough experienced professionals are available in the industry. During this session, we’ll discuss:

· Understanding the current landscape of Informatics training
· Recognizing key prerequisites that are critical to hiring the right people
· How to train and build your own team