Cybersecurity Command Center

South Building | Hall A | Booths 4309 - 4334

Threats and adversaries are out there—when will they find your organization’s weakness and strike? Be proactive and fortify your battle armor to defend and protect the confidentiality, integrity and availability of your information.

Experience cutting-edge technologies and learn how to best prepare your organization for risk assessments, build bulletproof incident response plans and more. Participate in engaging, interactive, hands-on activities and attend education sessions to enhance your knowledge on today’s biggest cyber issues.

Reception:

Tuesday, April 18th | 5:00pm – 6:00pm

Related

The HIMSS Healthcare Cybersecurity Community is a year-round collaboration where members exchange ideas with peers and take proactive steps to improve their organization’s security posture.

Cybersecurity Command Center Theater A Sessions

Securing Medical Devices with Nozomi Networks: Improving Healthcare and Patient Safety
Tuesday, April 18 at 10:15 am - 10:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Everything You Wanted to Know About CrowdStrike, But Were Afraid to Ask
Tuesday, April 18 at 10:45 am - 11:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
The HHS Path to Secure OT: Best Practices for Operational Technology
Tuesday, April 18 at 11:15 am - 11:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Care Traffic Control Center with Northeast Georgia Health System
Tuesday, April 18 at 11:45 am - 12:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Get Secure, Stay Secure
Tuesday, April 18 at 12:15 pm - 12:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Taking the Illusion out of Security and Compliance
Tuesday, April 18 at 12:45 pm - 1:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Building a complete disaster recovery strategy with on-prem and cloud backup
Tuesday, April 18 at 1:15 pm - 1:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Zero Trust for Healthcare: Protect data while enabling operations and reducing frustration
Tuesday, April 18 at 1:45 pm - 2:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Ignorance Isn’t Bliss: Uncovering and Resolving Patient Privacy Issues
Tuesday, April 18 at 2:15 pm - 2:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Managing Cyber Differently: Addressing human capital, escalating threats and critical communications
Tuesday, April 18 at 2:45 pm - 3:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Starting is What Stops Most People – Critical OT Cybersecurity First Steps
Tuesday, April 18 at 3:15 pm - 3:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Visible Protection: How Visibility Improves Network Segmentation and Cybersecurity
Tuesday, April 18 at 3:45 pm - 4:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Confidence in the Healthcare Cloud Journey
Tuesday, April 18 at 4:15 pm - 4:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Reducing Medical Device Cyber Risk Starts with an SBOM
Wednesday, April 19 at 9:45 am - 10:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Embedding MITRE ATT&CK Framework to Solidify Vulnerability Management
Wednesday, April 19 at 10:15 am - 10:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Deconstructing Zero Trust in Healthcare and Why Zero Trust is a Lie
Wednesday, April 19 at 10:45 am - 11:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Visibility is Vital – A University Health System Case Study
Wednesday, April 19 at 11:15 am - 11:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Threat Hunting: Io(M)T, Ransomware, Backdoors, and Your Data
Wednesday, April 19 at 11:45 am - 12:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Actively Defend Medical Imagery From Cyber Threats With Cyberstorage
Wednesday, April 19 at 12:15 pm - 12:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
I Thought I Was Safe… A SysAdmin’s Survival Guide
Wednesday, April 19 at 12:45 pm - 1:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Emergency Preparedness: Preventing Incidents and Breaches in Healthcare IT
Wednesday, April 19 at 1:15 pm - 1:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Securing Your Bottom Line: The Impact of Cybersecurity on Fixed Cost Business
Wednesday, April 19 at 1:45 pm - 2:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Navigating the New Medical Device Security Law
Wednesday, April 19 at 2:15 pm - 2:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
FIDO authentication: Prioritizing the human layer to defeat modern cybersecurity threats
Wednesday, April 19 at 2:45 pm - 3:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Are You Ready? Preparing Your Organization for a Cyber Incident
Wednesday, April 19 at 3:15 pm - 3:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
TPRM is Broken
Wednesday, April 19 at 3:45 pm - 4:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Cybersecurity Trends in Healthcare
Thursday, April 20 at 9:45 am - 10:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Threat and Vulnerability Research by Forescout’s Vedere Labs
Thursday, April 20 at 10:15 am - 10:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
5 Steps to Secure Healthcare Data using Microsoft 365 & Microsoft Teams
Thursday, April 20 at 10:45 am - 11:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details
Threats and Trends, Staying Secure in 2023 & Beyond with Arctic Wolf
Thursday, April 20 at 11:15 am - 11:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater A Details

Cybersecurity Command Center Theater B Sessions

Reinventing the Cybersecurity Supply Chain for Connected Medical Technologies
Tuesday, April 18 at 10:15 am - 10:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Discovering the Maturity Levels of Identity Security in Healthcare
Tuesday, April 18 at 10:45 am - 11:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Strengthening Defenses Against Cyber Attacks
Tuesday, April 18 at 11:15 am - 11:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Modern Resilience: Adopting Modern, Sustainable Techniques to Achieve Long-Lasting Cyber Resilience Programs
Tuesday, April 18 at 11:45 am - 12:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Identifying Your Greatest Security Risks: Insights from a Top Health System CISO
Tuesday, April 18 at 12:15 pm - 12:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Managing Security and Threat Landscape in Healthcare
Tuesday, April 18 at 12:45 pm - 1:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Practical Approach to Securing Every Connected Device in Healthcare
Tuesday, April 18 at 1:15 pm - 1:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Securing the Future: Decreasing the Attack Surface to Build Resiliency
Tuesday, April 18 at 1:45 pm - 2:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Is This Good? Contextualizing Cybersecurity Testing with Probabilistic Threat Models
Tuesday, April 18 at 2:15 pm - 2:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Backup is Not Equal to Cyber Recovery
Tuesday, April 18 at 2:45 pm - 3:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
How To Use Zero Trust To Improve Your Healthcare Organization’s Cybersecurity Posture
Tuesday, April 18 at 3:15 pm - 3:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
HHS 405(d) Program- Managing Cyber Threats and Protecting Patients
Tuesday, April 18 at 3:45 pm - 4:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Cyber Security Training and Awareness Program Design with the SANS Institute
Tuesday, April 18 at 4:15 pm - 4:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Overcoming IT Pain Points to Advance the Clinical Experience
Wednesday, April 19 at 9:45 am - 10:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Enabling Strategic Objectives Through Cybersecurity: A Healthcare System’s Transformation
Wednesday, April 19 at 10:15 am - 10:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Ransomware Detection and Response: Four Active Attacks Stopped in their Tracks
Wednesday, April 19 at 10:45 am - 11:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Zero Trust: Secure the Devices & Data that Drive Your Organization
Wednesday, April 19 at 11:15 am - 11:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Simplified, Secure Access to EHR/PII
Wednesday, April 19 at 11:45 am - 12:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Cameras, CACs and Clocks: A Story of Millions of Interrogated xIoT Devices
Wednesday, April 19 at 12:15 pm - 12:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Building a secure and cost-effective multi-cloud strategy
Wednesday, April 19 at 12:45 pm - 1:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Penetration Testing: The Forgotten HIPAA Requirement
Wednesday, April 19 at 1:15 pm - 1:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Automating HIPAA Compliance and Ransomware Recovery in AWS
Wednesday, April 19 at 1:45 pm - 2:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
How to Safely Scan Biomedical Devices for Asset Inventory
Wednesday, April 19 at 2:15 pm - 2:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Aligning Cyber Risks with Business Goals: A Quantitative Approach to Cybersecurity Success
Wednesday, April 19 at 2:45 pm - 3:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Actionable Steps to Overcome Compliance Hurdles
Wednesday, April 19 at 3:15 pm - 3:35 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Hackers Rush in Where Agents Fear to Tread
Wednesday, April 19 at 3:45 pm - 4:05 pm
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
How Many Layers of Security Are Enough to Stop a Cyber Attack?
Thursday, April 20 at 9:45 am - 10:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Covering Your aaS with Secure Service Edge
Thursday, April 20 at 10:15 am - 10:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Insights from the Healthcare Cybersecurity Benchmarking Study
Thursday, April 20 at 10:45 am - 11:05 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details
Utilizing a Layered Approach to Anti-Phishing Education and Cybersecurity in Healthcare
Thursday, April 20 at 11:15 am - 11:35 am
South Building, Level 2 | Hall A | Booth 4309-4333 | Cybersecurity Command Center - Theater B Details

Sponsored by