|
Wednesday, July 9, 2025
1:00 pm - 2:00 pm ET
(Noon - 1:00 pm CT/11:00 am - Noon MT/10:00 am - 11:00 am PT)
Webinar: Report from the Cyber Front – The unfortunate state of cyber controls in healthcare
Speaker
John Norenberg, CISSP, CCA, CCP, VP, IT and Cyber Risk Management, Kodiak Solutions
John Norenberg leads Kodiak’s Cyber Security and IT Risk Management group. He is a 40-plus-year Information Technology veteran. Beginning as a product development engineer with IBM, he has held top level IT executive leadership positions in the manufacturing, finance and insurance industries, before before focusing solely on Health Care and Higher Ed in 2004. Since then, he has worked with several large Integrated Delivery Networks and University health systems as a C-Level IT executive: CIO, CTO, VP of Applications, etc. as both an full time employee and interim leader.
He is recognized for not only maintaining strong technical skills, but also being an in-demand IT strategist and developer of high performing teams. For much of his professional life he has been an in-demand speaker on topics from current and future technologies, IT leadership and governance, proper big-data and AI processing models for clinical excellence and advanced payment models in healthcare, and currently cyber security topics in heathcare and higher education.
His educational background includes a Bachelor of Mechanical Engineering degree from the University of Minnesota and a Master of Management from the JL Kellogg School at Northwestern University, as well as numerous technical, process, and business certifications.
Webinar Description:
In it’s annual report on the state of cyber defenses in all industries, IBM routinely reports on several disturbing trends it finds in the surveys it performs. Over the past 18 months, Kodiak has been doing deep scans of healthcare provider cyber networks and defenses. What we found not only corroborated IBMs survey findings with actual results, but are likely worse.
The good news is there is something you can do about it. And getting started isn’t relatively expensive.
In this presentation we will start by reviewing the primary points of the IBM survey and compare them with the Kodiak results. We will then move on to what you can do to understand if your organization is bearing these risks and what you can do to get started measuring them for remediation. Finally, because the regulatory environment is changing rapidly and will likely add urgency to this effort in the next 12 months, we will briefly discuss the regulatory changes so that you will have a sense of the whole picture.
Learning Objectives:
- Describe the average state of cyber defenses in healthcare
-
Explain how to measure the state of cyber defenses in your company against the average discussed
- List plans and methods to begin the measurement and mitigation of your environment
- Discuss the coming regulatory changes and why they are important for your organization
Cost:
Members - COMPLIMENTARY (You MUST be a current member to take advantage of this benefit.)
Program Level: All
Field of Study: Information Technology
Prerequisites: None
Delivery Method: Group Internet Based
CPE Credits: 1.0 CPE credit
Please Note: If you wish to receive continuing professional education credits for participating in the discussion, you are required to register and pay the registration fees (if applicable). You will also be required to answer 3 of the 4 questions asked online during the discussion to qualify for CPE credit.
|