Build Relationships at An Exclusive Cybersecurity Forum

CISO Healthcare is a one-stop shop for senior-level information security executives from North America’s leading health systems. It’s an interactive meeting to share challenges, find business solutions and build lasting relationships.


Network with Senior-Level Executives Like You

We only invite the most senior-level executives. We connect you with other CISOs looking to improve strategy, benchmark with peers and gain insight to similar challenges.


Evaluate Cybersecurity and HIT Solutions

Hold 1-to-1 consultative meetings with only the most relevant and innovative solution providers. CISO Healthcare Connect matches you with services and solutions that make sense for your business, allowing you to evaluate new technologies up close.


Featured 2018 Speakers

Kurt Lieber

Kurt Lieber

Vice President & CISO

Tellis Williams

Tellis Williams


Kevin Hamel

Kevin Hamel

Baystate Health

Adam Landman

Adam Landman

CIO and Vice President Information Systems
Brigham & Women’s Hospital

Erich Krueger

Erich Krueger

Nebraska Methodist Health System

Become a CISO Healthcare Connect Sponsor

Sponsorship at CISO Healthcare Connect puts you face-to-face with exactly who you want to meet. All of our attendees are qualified for seniority before they’re granted an invitation

Every person you meet is genuinely interested in learning more about solutions like yours.

Find out more about how you can get involved.

What You'll Learn

At CISO Healthcare Connect, we’re passionate about helping you find actionable solutions to your top challenges. Some of the topics on this year’s program include:

These Are Our Demands: Lessons Learned From Ransomware Attacks

Malware has drastically advanced in past years, it’s no longer enough for hackers to steal information and cause chaos to your network- they want to be paid for their handiwork. Whether they have been attacked themselves, or by studying the widely publicized Petya and WannaCry attacks, our panel will discuss what necessary steps you need to take to avoid ransomware attacks, as well as best practices should an attack occur.

  • What tools do you need to put into place to avoid attacks?
  • How to respond if a breach does occur
  • The risk and implications of giving into ransom demands

You’ll hear more from:

  • Tellis Williams, CISO, AXA
  • Lisa Bazis, CISO, UNMC/Nebraska Medicine
  • Michael Archuleta, CIO, Mt. San Rafael Hospital and Director of IT Services, HIPAA & Information Security Officer, BridgeCare Health Network

Plenty Of Phish In The Sea: Effective Ways To Combat Phishing Emails

Phishing emails are nothing new; however they continue to become more sophisticated and potentially harmful to your network. While it may not be possible to completely prevent phishing attacks, there are several tactics and tools that you can introduce to protect your organization and its data as much as possible.

  • Introducing email authentication
  • Data loss prevention tools
  • Teaching your staff to recognize suspicious emails

You’ll hear more from:

  • Adam Landman, Chief Information Officer and Vice President, Information Systems, Brigham & Women’s Hospital

Taking Off The Training Wheels: Teaching Your Staff To Combat Risks

General healthcare employees are not aware when an attack occurs or how they may have inadvertently opened the whole network to risk. From BYOD to shared workstations, it’s even more necessary to ensure that your employees know how to avoid any suspicious emails and react properly when they suspect an attack. Discuss how to conduct training in a constructive way for the greater good of the company, without undermining or blaming your colleagues.

  • What incentives and penalties to offer your employees
  • Creative and successful training methods
  • Raising support by training at the board level

You’ll hear more from:

  • Thien La, CISO, Wellmark Blue Cross and Blue Shield
  • Patrick Jean-Baptiste, Vice President of Information Services & Chief Information Security Officer, Heartland
  • Steven Penn, Executive Director, Information Security Risk and Compliance, Adventist Health System

Automating Security Controls Using Models And Security Orchestration

Many organizations have adopted machine learning and data analytics to help them identify security anomalies. However, mere identification isn’t good enough in a world where Petya and other modern attacks can take down 15,000 servers in a single organization in under two minutes. To combat these new types of malware, organizations need to be looking at Model Driven Security Orchestration where the security responses to emerging threats and attacks are automated and driven at machine speed. In this presentation, Aetna will provide an overview of our security orchestration program, including what worked, what didn’t and lessons learned.

You’ll hear more from:

  • Kurt Lieber, Vice President & CISO, Aetna

Up, Up, And Away!: Staying Compliant While Moving To The Cloud

There are a plethora of reasons for those in healthcare to move towards storing data in the cloud, however many are still receiving internal pushback due to anticipated costs, risk and time. One of the biggest concerns cybersecurity professionals themselves have is if such a move is in compliance with HIPAA regulations. New solutions have emerged to elevate these anxieties and there is no longer an excuse not to take the leap to cloud.

  • How to adapt, update technology and remain compliant
  • Combating internal cloud resistance
  • Automating processes

Real Reviews From Real Attendees

See why the community rates WBR Connect events number one amongst senior level,
networking events of its kind.