Print Page   |   Contact Us   |   Sign In   |   Register
ISSA Healthcare Half Day SIG Event in Denver, Colorado
Tell a Friend About This EventTell a Friend
ISSA Healthcare Half Day SIG Event in Denver, Colorado

When: June 22nd 2017
Noon to 5 PM Mountain Time
Where: 2000 S Colorado Blvd
Denver, Colorado  80222
United States
Contact: DJ McArthur

« Go to Upcoming Event List  

ISSA Denver Healthcare SIG Half Day Event on June 22nd

Register here:



12 - 1 PM:  Lunch and Arrival

1 - 4 PM:  Speaker and Panel Sessions

4 - 5 PM:   Happy Hour, Gaming Time, and Gift Drawing


Topic 1: Third Party Vendor Risk Management in Healthcare (1-hour)

Christina M. Whiting, Managing Director, Enterprise Risk and Governance | Tevora

Trends & Tools to Help Design an Effective Program

Abstract: In today’s healthcare landscape, we rely upon third parties and vendors significantly more than in the past. This coupled with IoT growth, cloud, and specialized services we see an increase in security risks. This session will discuss some of the key risk trends healthcare organizations are facing within the third party and vendor space, common controls missing at third party vendors, how to develop effective programs to decrease risk and what tools could be leveraged to offset internal resource constraints.


Topic 2: Healthcare 360 Panel (1-hour)

Abstract: This panel consists of security leaders in operational and compliance manager director roles in healthcare.

Panel Moderator: Drew Labbo, RMHG – Rocky Mountain HIPAA Guru


- Grant Sturgis, SCL Health Manager Information Security Operations

- Zsolt Molnar, Director InfoSec Children's Hospital Colorado

- Iain Lumsden, Information Security Manager Denver Health

- DJ McArthur, Centura Health Data Security Operations and Compliance Manager


Topic 3: Law Enforcement Cyber Security Update (1-hour)

Special Agent with the FBI


Cost: FREE for members. $75 for non-members. 

Community Search
Sign In
Sign In securely

5/2/2018 » 5/4/2018
ISSA Los Angeles Summit X

ISSA Thought Leadership Series: Why Automation is Essential to Vulnerability Management

ISSA Mid-Altantic Conference

Cornerstones of Trust

Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information