Healthcare Summit
In-Person Summit July 18, 2023
ISMG Summits feature carefully curated agendas delivering a Keynote Address from an Industry Luminary, Case-Based Learning, Networking and more. The Summits are geo-targeted, industry-specific, and topic-driven events designed for security leaders.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.
David Pollino
Former CISO
PNC Bank
Grant Schneider
Senior Director for Cybersecurity Services (Former U.S. federal CISO)
Venable LLP
Lisa Sotto
Partner
Hunton Andrews Kurth LLP
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Jeremy Grant
Managing Director-Technology Business Strategy
Venable LLP
Keith O'Sullivan
SVP. IT Risk & Chief Information Security Officer
Standard Industries
O'Sullivan is currently the CISO and senior vice president of IT risk at Standard Industries, where he developed a sophisticated information security strategy for Standard and its operating companies. As CISO, his security leadership supports innovative DevSecOps models, threat-focused offensive...
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Bonnie Goins
Manager, Senior Specialist of Governance, Risk, and Compliance (GRC)
Illinois Institue of Technology
Goins is an adjunct industry professor of information technology management at the Illinois Institute of Technology. She has over 27 years of experience in building robust and compliant security programs with executive leadership, both as a professional consultant and as...
Jeff Williams
Supervisory Special Agent, New York Field Office Cyber Branch
Federal Bureau of Investigation
Jeffrey Williams has been a Special Agent with the Federal Bureau of Investigation (FBI) since March 2010; he is currently assigned to the FBI’s New York Field Office. In this capacity he investigates violations of the laws of the United...
Karen Habercross
Chief Privacy Officer
U. Chicago Medicine
Habercoss is the chief privacy officer for The University of Chicago Medicine and Clinical Biological Sciences Division. She is responsible for the enterprise multiyear strategy and day-to-day operations of the Health System Privacy Program, which has a workforce of more...
Vinod Brahmapuram
State CISO
State of Washington
Brahmapuram was appointed state CISO in October 2019. He oversees WaTech’s state Office of Cybersecurity and is responsible for establishing and leading the strategic direction of cybersecurity for state government, as well as advising the governor and legislators on key...
Adam Evans
VP, Cyber Operations & CISO
RBC
Adam Evans is VP, Cyber Operations and Chief Information Security Officer (CISO) for RBC. As CISO, Adam sets RBC’s cyber vision, strategy and program to reduce cyber risks and keep clients, employees, and systems safe. He is responsible for developing...
Anandh Palanisamy
Senior IT Security Solutions Consultant & Evangelist
ManageEngine
Palanisamy shares his vast knowledge about Active Directory and IT security and helps form a bridge between our prospects and clients and our solutions. In more than 13 years with ManageEngine as an AD and IT security solutions expert, Palanisamy...
Fred Kwong
VP, Chief Information Security Officer
DeVry University
Kwong is the vice president and chief information security officer at DeVry University. He has been in the information security and technology field for the past 20 years, working in the education, financial, telecommunication, healthcare and insurance sectors. Kwong is...
David Levine
Vice President Corporate & Information Security & CSO
Ricoh, USA
David Levine is Vice President of Information Security and CISO for Ricoh USA, Inc. In this role, he has responsibility for operational security, security policy, access management, eDiscovery and litigation support and HIPAA compliance. Levine chairs Ricoh’s Security Advisory Councils,...
View Agenda
Threat Intelligence and the Dark Web

In the age of the ubiquitous data breach, it is important for enterprises to know what information is circulating about them - and their customers - within cybercriminal circles. That comes down to knowing what is on the dark web - but how can you do that?

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is - and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.
  • 09:00 AM
  • 09:29 AM
AI and Zero Trust, The New Enrichments of SIEM and IAM

Internal threats in today's era are complex and crucial in the cybersecurity domain. Understanding dynamic and multivariate user behavior is challenging too. Traditional sequential and timeline-based methods cannot easily address the complexity of temporal and relational features of user behaviors. Hence, we need an AI-based report that enables analysts to understand user behavior patterns that result in identification of anomalies. We can strengthen our security further by including access management as the core of zero trust architecture to create a zero trust extended ecosystem.

  • 09:30 AM
  • 09:59 AM
Zero Trust Town Hall

It's been 12 years since ex-Forrester analyst created the concept and term ""zero trust,"" and it's now been one year since President Biden issued a cybersecurity Executive Order with zero trust as its foundation. How has the framework matured - and why do so many people still continue to misunderstand and misapply it?

Join this exclusive town hall meeting for your chance to talk about:

•    What zero trust is - and is not

•    How to develop your own roadmap

•    Impact of the executive order beyond federal government

  • 10:00 AM
  • 10:59 AM
Networking and Exhibition Break
  • 11:00 AM
  • 11:29 AM
Solutions Showcase

Solutions Showcase: Gain insight into leading security trends and technology from cutting-edge solution providers. Walk away with practical solutions to apply in your place of work

  • 11:30 AM
  • 12:29 PM
Lunch and Exhibition Break
  • 12:30 PM
  • 01:29 PM
Absolute Musts When Building a Comprehensive Data Governance and Valuation Program

The growth in information production appears unstoppable: Businesses recognize data as a guide to strategic decision-making and a way to garner better business results. This also means that the demand for robust regulatory data governance has never been so great. 

How confident are you in determining the right roles, processes, policies, standards, and metrics to guarantee the efficient and effective use of information for your organization to reach its goals?

Join this panel to learn how to build a comprehensive data governance valuation program - regardless of whether your organization has a data governance officer or not.

Join this session to discuss:

  • Misconceptions about data governance;
  • Best practices to build a data governance valuation program;
  • Why communication is key to ensure efficient and effective use of information.
  • 01:30 PM
  • 01:59 PM
CISO 1-on-1

As the Washington state chief information security officer within the Office of Cybersecurity, Vinod Brahmapuram is at the heart of the state government's digital transformation and efforts to modernize SecOps. In this exclusive conversation, he discusses:

  • Improving digital services without compromising security;
  • Adopting the zero trust framework in alignment with the federal government;
  • Addressing the growing talent shortage.
  • 02:00 PM
  • 02:59 PM
Networking and Exhibition Break
  • 03:00 PM
  • 03:29 PM
Why Strong Partnerships with Executive Leadership Are Essential for Good Data Governance

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 03:30 PM
  • 03:44 PM
RBC CISO on Securing the Future
David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA

Hybrid work models, cloud migration and new digital channels are highlights of the past two years of aggressive digital transformation. But what does the future bring in terms of how we work, conduct commerce and secure our digital assets from ever-evolving, ever-automating cyber adversaries?

Join RBC CISOs for a thoughtful discussion on securing the future, with focus on:

  • How we will work;
  • Turning cybersecurity investments into business value;
  • The role of cybersecurity in customer relationships.
David Levine
  • 03:45 PM
  • 03:59 PM
Closing Comments
  • 04:00 PM
  • 04:09 PM

ISMG Summits feature carefully curated agendas delivering a Keynote Address from an Industry Luminary, Case-Based Learning, Networking and more. The Summits are geo-targeted, industry-specific, and topic-driven events designed for security leaders.
ISMG's agendas provide actionable education and exclusive networking opportunities with your peers and our subject matter expert speakers.

David Pollino
Former CISO
PNC Bank
Grant Schneider
Senior Director for Cybersecurity Services (Former U.S. federal CISO)
Venable LLP
Lisa Sotto
Partner
Hunton Andrews Kurth LLP
Ari Redbord
Head of Legal and Government Affairs
TRM Labs
Jeremy Grant
Managing Director-Technology Business Strategy
Venable LLP

Keith O'Sullivan
SVP. IT Risk & Chief Information Security Officer
Standard Industries
O'Sullivan is currently the CISO and senior vice president of IT risk at Standard Industries, where he developed a sophisticated information security strategy for Standard and its operating companies. As CISO, his security leadership supports innovative DevSecOps models, threat-focused offensive...
John Kindervag
Creator of Zero Trust, Senior Vice President, Cybersecurity Strategy, ON2IT Group Fellow
ON2IT Cybersecurity
John Kindervag is the "Father of Zero Trust," who as an analyst at Forrester invented the term and defined the reference architecture for a network whose five basic principles defined the notion of Zero Trust. He is also the co-founder...
Bonnie Goins
Manager, Senior Specialist of Governance, Risk, and Compliance (GRC)
Illinois Institue of Technology
Goins is an adjunct industry professor of information technology management at the Illinois Institute of Technology. She has over 27 years of experience in building robust and compliant security programs with executive leadership, both as a professional consultant and as...
Jeff Williams
Supervisory Special Agent, New York Field Office Cyber Branch
Federal Bureau of Investigation
Jeffrey Williams has been a Special Agent with the Federal Bureau of Investigation (FBI) since March 2010; he is currently assigned to the FBI’s New York Field Office. In this capacity he investigates violations of the laws of the United...
Karen Habercross
Chief Privacy Officer
U. Chicago Medicine
Habercoss is the chief privacy officer for The University of Chicago Medicine and Clinical Biological Sciences Division. She is responsible for the enterprise multiyear strategy and day-to-day operations of the Health System Privacy Program, which has a workforce of more...
Vinod Brahmapuram
State CISO
State of Washington
Brahmapuram was appointed state CISO in October 2019. He oversees WaTech’s state Office of Cybersecurity and is responsible for establishing and leading the strategic direction of cybersecurity for state government, as well as advising the governor and legislators on key...
Adam Evans
VP, Cyber Operations & CISO
RBC
Adam Evans is VP, Cyber Operations and Chief Information Security Officer (CISO) for RBC. As CISO, Adam sets RBC’s cyber vision, strategy and program to reduce cyber risks and keep clients, employees, and systems safe. He is responsible for developing...
Anandh Palanisamy
Senior IT Security Solutions Consultant & Evangelist
ManageEngine
Palanisamy shares his vast knowledge about Active Directory and IT security and helps form a bridge between our prospects and clients and our solutions. In more than 13 years with ManageEngine as an AD and IT security solutions expert, Palanisamy...
Fred Kwong
VP, Chief Information Security Officer
DeVry University
Kwong is the vice president and chief information security officer at DeVry University. He has been in the information security and technology field for the past 20 years, working in the education, financial, telecommunication, healthcare and insurance sectors. Kwong is...
David Levine
Vice President Corporate & Information Security & CSO
Ricoh, USA
David Levine is Vice President of Information Security and CISO for Ricoh USA, Inc. In this role, he has responsibility for operational security, security policy, access management, eDiscovery and litigation support and HIPAA compliance. Levine chairs Ricoh’s Security Advisory Councils,...

View Agenda
Threat Intelligence and the Dark Web

In the age of the ubiquitous data breach, it is important for enterprises to know what information is circulating about them - and their customers - within cybercriminal circles. That comes down to knowing what is on the dark web - but how can you do that?

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is - and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.
  • 09:00 AM
  • 09:29 AM
AI and Zero Trust, The New Enrichments of SIEM and IAM

Internal threats in today's era are complex and crucial in the cybersecurity domain. Understanding dynamic and multivariate user behavior is challenging too. Traditional sequential and timeline-based methods cannot easily address the complexity of temporal and relational features of user behaviors. Hence, we need an AI-based report that enables analysts to understand user behavior patterns that result in identification of anomalies. We can strengthen our security further by including access management as the core of zero trust architecture to create a zero trust extended ecosystem.

  • 09:30 AM
  • 09:59 AM
Zero Trust Town Hall

It's been 12 years since ex-Forrester analyst created the concept and term ""zero trust,"" and it's now been one year since President Biden issued a cybersecurity Executive Order with zero trust as its foundation. How has the framework matured - and why do so many people still continue to misunderstand and misapply it?

Join this exclusive town hall meeting for your chance to talk about:

•    What zero trust is - and is not

•    How to develop your own roadmap

•    Impact of the executive order beyond federal government

  • 10:00 AM
  • 10:59 AM
Networking and Exhibition Break
  • 11:00 AM
  • 11:29 AM
Solutions Showcase

Solutions Showcase: Gain insight into leading security trends and technology from cutting-edge solution providers. Walk away with practical solutions to apply in your place of work

  • 11:30 AM
  • 12:29 PM
Lunch and Exhibition Break
  • 12:30 PM
  • 01:29 PM
Absolute Musts When Building a Comprehensive Data Governance and Valuation Program

The growth in information production appears unstoppable: Businesses recognize data as a guide to strategic decision-making and a way to garner better business results. This also means that the demand for robust regulatory data governance has never been so great. 

How confident are you in determining the right roles, processes, policies, standards, and metrics to guarantee the efficient and effective use of information for your organization to reach its goals?

Join this panel to learn how to build a comprehensive data governance valuation program - regardless of whether your organization has a data governance officer or not.

Join this session to discuss:

  • Misconceptions about data governance;
  • Best practices to build a data governance valuation program;
  • Why communication is key to ensure efficient and effective use of information.
  • 01:30 PM
  • 01:59 PM
CISO 1-on-1

As the Washington state chief information security officer within the Office of Cybersecurity, Vinod Brahmapuram is at the heart of the state government's digital transformation and efforts to modernize SecOps. In this exclusive conversation, he discusses:

  • Improving digital services without compromising security;
  • Adopting the zero trust framework in alignment with the federal government;
  • Addressing the growing talent shortage.
  • 02:00 PM
  • 02:59 PM
Networking and Exhibition Break
  • 03:00 PM
  • 03:29 PM
Why Strong Partnerships with Executive Leadership Are Essential for Good Data Governance

A recent nationwide survey 23% of CISOs report to the CEO, while nearly 45% reported into a CIO. With Data Governance ultimately being about people, processes, and technology--the foundation for data governance—are “musts.” In this session, you will hear from practitioners who have actuated strong partnerships with executives. They will share:  

  • Tried and true approaches for getting buy-in and clear ownership 
  • Strategies for breaking down data silos
  • Approaches to find the right balance between flexibility and data governance standards
  • 03:30 PM
  • 03:44 PM
RBC CISO on Securing the Future
David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA

Hybrid work models, cloud migration and new digital channels are highlights of the past two years of aggressive digital transformation. But what does the future bring in terms of how we work, conduct commerce and secure our digital assets from ever-evolving, ever-automating cyber adversaries?

Join RBC CISOs for a thoughtful discussion on securing the future, with focus on:

  • How we will work;
  • Turning cybersecurity investments into business value;
  • The role of cybersecurity in customer relationships.
David Levine
  • 03:45 PM
  • 03:59 PM
Closing Comments
  • 04:00 PM
  • 04:09 PM

Speaker Interviews

July 18, 2023

Healthcare Summit