Events

Webinar

Third-Party Selection and Management: What You Need to Know and Do Before and After You Sign

James DeLuccia, Product Security Chief, Honeywell , Kenneth Foster, VP of IT Governance, Risk and Compliance, Fleetcor , Kevin Gowen, CISO, Synovus Financial Corp. , David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA  •  September 29, 2022

Webinar

Why Strong Partnerships with Executive Leadership Are Essential for Good Data Governance

Kevin Gowen, CISO, Synovus Financial Corp. , David Levine, Vice President Corporate & Information Security & CSO, Ricoh, USA , David Nolan, Chief Information Security Officer, Aaron's , Michael Owens, BISO, Equifax  •  September 29, 2022

Webinar

U.S Secret Service on Business Email Compromise and Cyber-Enabled Fraud

Zachary Bulliner, Senior Special Agent, U.S. Secret Service , Robert Glore, Technical Staff Assistant, U.S. Secret Service , Barbara Kellenbenz, ATSAIC, U.S. Secret Service , Joshua Reed, Network Intrusion Forensic Analyst, U.S. Secret Service  •  September 29, 2022

Webinar

Building Digital Trust – A CISO Perspective

Kory Daniels, CISO, Trustwave , Stefanie Moran, Director Information Security, Keesler Federal Credit Union  •  September 29, 2022

Webinar

Incident Response: Are You Prepared for Your Organization's Worst Day?

Monique Hart, CISO, Piedmont Healthcare , Jimmy Lummis, Senior GRC Specialist, Children's Healthcare of Atlanta , Stoddard Manikin, CISO, Children's Healthcare of Atlanta , Bob Varnadoe , CISO, NCR Corporation  •  September 29, 2022

Webinar

Clouded Judgment: Why Security & Cloud Are Aligned

Kenneth Foster, VP of IT Governance, Risk and Compliance, Fleetcor , Stanton Gatewood, Cyber Security Coordinator/Advisor, US DHS/CISA , Phyllis Woodruff, VP, IT Risk & Compliance, Global Payments  •  September 29, 2022

Webinar

Track B: Your Ransomware Hostage Rescue Guide

Erich Kron  •  September 20, 2022

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.