About Us

Events

#ChatDPD Twitter Chat: Summertime Travel
Virtual (Twitter Chat)
Jul 08, 2015

School is out, summer is in high gear, and many of us are preparing for well-deserved vacations. Join us for our next #ChatDPD to talk about things you should know about your online safety on the go. From free airport WiFi to paying for that extra suitcase, we will explore what you can do to avoid making yourself vulnerable to cybercriminals while you travel so you can focus on having a little R&R.

  • Time: 3 p.m. EDT/noon PDT 
  • Guests: Private WiFi (@privatewifi), Connect Safely (@ConnectSafely), Internet Keep Safe Coalition (@iKeepSafe),  Good Data (@GoodData), Larry Magid (@larrymagid), Visa Security (@VisaSecurity), ConnectSafely Policy (@csafelypolicyms), National Cyber Security Alliance (@StaySafeOnline)
  • Moderator: Data Privacy Day (@DataPrivacyDay)


Use #ChatDPD to join! 



Security Risk Assessment, What it is and How to Conduct One - Webinar by MentorHealth
Virtual (Webinar)
Jul 09, 2015
This session will demystify the reasons to and the process of conducting a security risk assessment (SRA) for healthcare organizations. Attendees will learn the when and why to conduct their SRAs, what you need to include in a risk assessment, how to conduct an assessment and what to do with the results in order to keep the trust of patients.

Time: 10-11:30 a.m. PDT

Additional information and registration here

STOP. THINK. CONNECT. Two Steps Ahead: Protect Your Digital Life Tour (Kalamazoo, MI)
Western Michigan University, Fetzer Center, 1903 W. Michigan Avenue, Kalamazoo, MI
Jul 13, 2015
STOP. THINK. CONNECT. and the National Cyber Security Alliance are hosting an event to educate consumers and businesses about adding layers of security to their everyday activities. The event will include remarks by U.S. Congressman Fred Upton (R-MI), an online safety presentation and a panel discussion. 

Time: 8:30-10:30 a.m.

Additional event information and registration here.

For more information on the Two Steps Ahead campaign, visit the Two Steps Ahead page.

Understanding the Three Letter Acronyms – Who is Who, and What Do They Do? The United States Secret Service in Focus
Multiple locations – San Diego, San Francisco, New York and Washington, DC
Jul 14, 2015
Three National Cyber Security Alliance (NCSA) partners – the National Cyber-Forensice & Training Alliance (NCFTA), the Lares Institute and Morrison & Foerster – are hosting a seminar to discuss the statutory authority of the U.S. Secret Service (USSS) and a roadmap for interacting with TLAs (Three Letter Acronyms).

When you first begin working in cybersecurity, you are assaulted by the sheer number of TLAs. Whether it’s the DoD, FBI, CIA, NSA, DIA, NPS, CAW, DHS, or other agencies your company may interact with – including the USSS, or even the FTC and OCR – none of them come with a FAQ to help you understand their role, or what they do when a data security incident occurs. This panel will examine the statutory authority of the USSS and provide some rules of the road to help you navigate the complex web of TLAs.

Time: 12-2 p.m. EDT/9-11 a.m. PDT

Speakers:
  • Andrew Serwin, Partner, Morrison & Foerster
  • Scott Swantner, Agent, San Francisco Division, U.S. Secret Service
  • Ken Jones, Executive Director, Head of Fraud Risk Management, UBS
This is a video-linked, in-person event – register to attend at one of the following locations:

San Diego 
12531 High Bluff Drive
Suite 100 
San Diego, CA 92130

San Francisco
425 Market Street
33rd Floor
San Francisco, CA 94105

Washington, D.C.
2000 Pennsylvania Ave., NW
Washington, D.C. 20006

New York 
250 West 55th St.
New York, NY 10019
 
Space is extremely limited. For more information or to RSVP, please contact Jason Rosenthal. You will be contacted to confirm attendance.


Highest Risk Factors with HIPAA – Webinar by MentorHealth
Virtual (Webinar)
Jul 15, 2015
This webinar will discuss the risks healthcare organizations face with the federal Health Insurance Portability and Accountability Act (HIPAA) and how to mitigate them. It will also address major changes under the Omnibus Rule and updates for 2015, fines, business associates and the increased burden, breach notification, paperwork that needs to be updated and risk factors.

Time: 10-11:30 a.m. PDT

Additional information and registration here

New HIPAA Compliance Audit Program – The New Audit Protocol and How it Affects You
Virtual (Webinar)
Jul 16, 2015
If you don't take the proper steps to ensure your patients' health information is being protected according to the Health Insurance Portability and Accountability Act  (HIPAA) security and privacy rules, you can be hit with significant fines and penalties. With the increased HIPAA fines beginning at $10,000 in cases of willful neglect, providing good information security and being in compliance are more important than ever. This session will discuss the HIPAA audit and enforcement processes and how they apply to covered entities and business associates, and the new random HIPAA compliance audit program in particular. It will review the new audit processes and discuss what will be asked in an audit and how. Protocols and the questions asked at recent audits will be explained. 

Time: 1-2 p.m. EDT/10-11:30 a.m. PDT

Additional information and registration here

#ChatSTC Twitter Chat: Let's Talk About Authentication
Virtual (Twitter Chat)
Jul 16, 2015

Join this #ChatSTC Twitter chat to hear from some of the leaders in online authentication. We'll discuss what two-factor authentication (otherwise known as two-step verification or multi-factor authentication) is, its benefits and how to enable it and the future of online authentication.

  • Time: 3 p.m. EDT/noon PDT
  • Guests: TeleSign (@telesign), National Program Office of the National Strategy for Trusted Identities in Cyberspace (@NSTICNPO), IDESG (@id_eco_system), National Cyber Security Alliance (@StaySafeOnline)
  • Moderator: STOP. THINK. CONNECT. (@STOPTHNKCONNECT)

Use #ChatSTC to join!

Cyber & Information Security For US Healthcare
Sheraton Lake Buena Vista Resort, 12205 S. Apopka Vineland Road, Orlando, FL
Jul 15 - 16, 2015
With healthcare systems growing into very complex structures comprizing dozens of stakeholders connected through complicated data grids, industry specific tried and tested best practices and approaches are needed. The Cyber & Information Security For US Healthcare initiative will present delegates with the real life best practices related to information & data securit introduction of biomed and mobile devices into healthcare networks, data sharing through healthcare information exchanges, cloud platform use for healthcare data storage, use of the risk assessment frameworks beyond HIPAA compliance, integration of PCI standards into healthcare networks and design of effective GRC programs.

Additional information and registration here.



#Hak4Kidz
Chicago, IL
Jul 18, 2015
ak4Kidz is an event by ethical hackers and information security professionals dedicated to bring the educational and communal benefits of hacking conferences to children and young adults. We plan to accomplish this mission by putting our collective expertise and passion on display for the attendees to interact with us at their will. A combination of youth base speaking tracks complementing an open area of stations will enable the attendees to expand and enlighten their technical interests. For innovation to perpetuate, it’s imperative that today’s young users are exposed to the bigger picture of how we got here and to help realize their potential.

Time: 8 a.m. - 5 p.m. CDT

Additional information is available on the event website

TakeDownCon
Westin Huntsville, 6800 Governors West Road NW, Huntsville, AL
Jul 20 - 21, 2015
TakeDownCon is a highly technical forum that focuses on the latest vulnerabilities, the most potent exploits, and the current security threats. The best and the brightest in the field come to share their knowledge, giving delegates the opportunity to learn about the industry’s most important issues. With two days and two dynamic tracks, delegates will spend Day 1 on the Attack, learning how even the most protected systems can be breached. Day 2 is dedicated to Defense, and delegates will learn if their defense mechanisms are on par to thwart nefarious and persistent attacks.

More information and registration here.

Obamacare Takes Aim at Healthcare Fraud and Abuse – Webinar by MentorHealth
Virtual (Webinar)
Jul 22, 2015
This webinar will discuss the various anti-fraud and abuse provisions of the Affordable Care Act and the actions of that should be taken to minimize enforcement activities. Obamacare includes sweeping provisions to combat healthcare fraud and abuse. Healthcare professionals who attend this webinar will learn about these provisions and how they can protect themselves and their organizations.

Time: 1-2 p.m. EDT/10-11 a.m. PDT

Additional information and registration here

Managerial Primer for Assuring Information Security
Vritual (Webinar)
Jul 24, 2015
To realize the information security strategy, information security solutions need to be identified, developed or acquired and implemented and integrated into business and IT processes seamlessly. During this session held by Compliance4All, attendees will learn about the forces impacting information security governance, the principles and practices for performing information security audits, sound strategic and tactical information risk considerations and three tiers of enterprise governance in terms of their content, meaning, implementation factors and responsibilities.

Time: 1-2 p.m. EDT

Additional information and registration here.  

Business Continuity Management: Architect and Implement Solution
Vritual (Webinar)
Aug 11, 2015
It is critical to assess the IT and information security risks and the effectiveness of the institution’s risk management processes as they relate to the security measures. This webinar will teach attendees how to properly prepare for an impact to the business for any organization. It will cover how to identify, analyze and document the events and environmental surroundings that can adversely affect the organization. You will learn how to both prepare and review the continuity planning program. Areas such as IT outsourcing and other risks will be covered. 

Time: 1-2 p.m. EDT/10-11 a.m. PDT

Additional information and registration here

Business Continuity Management: Architect and Implement Solution
Vritual (Webinar)
Aug 11, 2015
It is critical to assess the IT and information security risks and the effectiveness of the institution’s risk management processes as they relate to the security measures. This webinar will teach attendees how to properly prepare for an impact to the business for any organization. It will cover how to identify, analyze and document the events and environmental surroundings that can adversely affect the organization. You will learn how to both prepare and review the continuity planning program. Areas such as IT outsourcing and other risks will be covered. 

Time: 1-2 p.m. EDT/10-11 a.m. PDT

Additional information and registration here.

The Federal False Claims Act: Enforcement and the Obamacare Expansion – Webinar by MentorHealth
Vritual (Webinar)
Aug 19, 2015
The session will provide an overview of the Federal Civil False Claims Act (FCA) and how it works. It will also provide an assessment of enforcement activities, showing how participants may be at risk. In addition, the session will review recent cases and show how they potentially impact participants. The webinar will start with a review of the Federal False Claims Act and discuss how it works and how it is being used to fight health care fraud. It will discuss how the various health care fraud task forces use the Federal False Claims Act and its whistleblower provisions to identify and prosecute health care fraud. 

Time: 1-2 p.m. EDT/10-11 a.m. PDT

Additional information and registration here

YouTube-Video Best Practices and Compliance for Healthcare Organizations
Vritual (Webinar)
Aug 20, 2015
Video is more than YouTube and the healthcare organizations that have embraced video have demonstrated humor, creativity and strong branding. Many are focusing on a commitment to educational videos and developing their team's thought leadership. Video isn't just for the big hospital system. During the webinar we will explore best practices for video use from a one person practice to the largest hospital systems. As more healthcare systems decide to enter social media there are concerns that need to be addressed: privacy and HIPAA compliance, the proper way to include patients in video and essential question about different video channels, costs and content strategy. 

Time: 1-2 p.m. EDT/10-11 a.m. PDT

Additional information and registration here

SANS Security Awareness Summit 2015
Sheraton Philadelphia Downtown Hotel, 201 N. 17th Street, Philadelphia, PA
Aug 17 - 25, 2015
The SANS Security Awareness Summit is an opportunity to learn how to build next-generation security awareness programs. Security awareness officers  willshare inside knowledge on how they took their awareness programs to the next level and how they measured the impact. In addition, attendees will have the opportunity to share, network and learn from one another through a variety of activities.

Additional information and registration here

Managerial Primer for Assuring IT Legal Compliance
Vritual (Webinar)
Aug 27, 2015
Information and associated technologies continue to advance toward diverse distributed configuration environments for entering, processing, storing, and retrieving data. The magnitude of changes occurring can be clearly seen in the explosion of linked IT infrastructures connected to cloud computing service providers and mobile computing devices. Consequently, the impact of such decentralization has increased the need for effective safeguarding of information assets. This webinar will cover the forces impacting IT governance, the principles and practices for performing IT legal compliance audits, sound strategic and tactical information risk considerations and three tiers of enterprise governance examined in terms of their content, meaning, implementation factors and responsibilities.

Time: 1-2 p.m. EDT/10-11 a.m. PDT

Additional information and registration here

#ChatDPD Twitter Chat: Back-to-School Tips for Student Privacy
Virtual (Twitter Chat)
Sep 09, 2015
Time: 3 p.m. EDT/noon PDT

Start with Security - San Francisco
University of California Hastings College of the Law, Alumni Reception Center, 200 McAllister Street, San Francisco, CA
Sep 09, 2015

The Federal Trade Commission's first “Start With Security” conference, co-sponsored by the University of California Hastings College of the Law, is part of a business education initiative designed to provide companies with practical resources to help them implement effective data security strategies. The conference series is part of the agency’s longstanding efforts to provide businesses with guidance about how to put effective security in place.

Aimed at start-ups and developers, this event will bring together experts to provide information on security by design, common security vulnerabilities, strategies for secure development, and vulnerability response. The event is free and open to the public. No pre-registration is necessary.

Time: 10 a.m. – 4 p.m. PDT

Additional information here

 



Middle East Cyber Security Summit 2015
Golden Tulip Seeb Hotel Muscat, Oman
Sep 15 - 16, 2015
The Middle East Cyber Security Summit 2015” Muscat, Oman will discuss the need to have a strategic approach to national cybersecurity, focusing on implementation of “CCC” framework — comprehensive in nature, collaborative by intention, and capability-driven. This Summit will serve central and local Government, critical infrastructure, energy and utilities, telecommunications and network service sectors, oil and gas sectors, finance and banking institutions, e-commerce and business sectors, technology industries, research and development organizations, security and intelligence services, police services and crime prevention, transportation, ICT networks, individual consumers and many more in learning from recent cases and identifying the transformation necessary to get rid of such consistent global threats where any individual device could cause an infringement.

Additional information and registration here.

Hacker Halted
Renaissance Atlanta Waverly Hotel & Convention Center, Atlanta, GA
Sep 17 - 18, 2015
Hacker Halted is a global series of computer and information security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT security. This event includes more than 40 presentations from the industry's most accomplished professionals and thought leaders, two days of networking, panel discussions and breakout sessions on the most critical and latest threats in the security world. 

More information and registration here

Cyber Security for Critical Infrastructure
One King West, Toronto, ON
Sep 29 - 30, 2015

Global cyber-attacks on critical infrastructure continue to increase in frequency and severity and Canada is by no means exempt. The country's ten pillars of critical infrastructure have to protect themselves from hacktivism, state sponsored attacks, cyber terrorism, industrial espionage and other damaging emerging threats. Antiquated strategies, such as anti-viruses and firewalls are no longer a match for the hackers of today.

The Canadian Institute's Cyber Security for Critical Infrastructure conference, designed in tandem with a host of leading international experts, promises to deliver up-to-the-minute information and critical strategies your organization needs to make sound security planning decisions. Speakers include experts from North Atlantic Treaty Organization (NATO), Sunnybrook Health Sciences Centre, Toronto-Hydro Electric Systems Ltd. Government of Ontario, RCMP, City of Toronto, BMO Financial Group, Government of New Brunswick, Motorola Mobility, Royal Bank of Canada, Loblaw Companies Limited, Verizon Wireless and more.

Additional information and registration here



Johnson County Cyber Security Conference & Expo
Johnson County Administration Building, 111 S. Cherry, Suite 200, Olathe, KS
Oct 06, 2015
Time: 8:30 a.m. – 3:30 p.m.

Privacy & Security Forum Boston
Westin Boston Waterfront, Boston, MA
Oct 29 - 30, 2015

When it comes to insuring the privacy and security of your organization’s data, no one has all the answers, and going it alone, can be, and often is, a recipe for disaster. Fortunately, you don’t have to. The Privacy & Security Forums are two-day conferences, presented by Health Information and Management Systems Society (HIMSS) Media and Healthcare IT News, held around the nation, with a specific focus on current healthcare industry topics. These forums are designed to meet the needs of CIOs, CISOs and other senior healthcare IT leaders. The information is practical, solutions-based and actionable – designed to help with planning, coordination and oversight.  Each event offers the opportunity to learn of industry developments, network with peers and discuss key regional or topical issues.

HIMSS Media is offering NCSA partners $100 off your registration for this event by using the following code: PSFSD-AFF2. (NOTE: This discounted rate is only for new registrants.)

Additional information and registration here

Start with Security - Austin
315 Red River Street, Austin, TX
Nov 05, 2015
The Federal Trade Commission's second “Start With Security” event, co-sponsored by the University of Texas Robert S. Strauss Center for International Security and Law, will continue the FTC’s work to provide companies with practical tips and strategies for implementing effective data security.

Additional details here.