Cyber – An Enterprise Risk: Best Practices and Lessons Learned
September 29 @ 8:00 am - 9:00 am MDT$160
Due to COVID-19, the registration fee is per individual hospital (not system) for this webinar. A single registration provides multiple lines for employees at your hospital, including a link to view the recording for 60 days post-webinar. Please only select a qty. of “1” under Registration and indicate the number of connections requested for your hospital when completing the Attendee information. The person completing the registration will be responsible for sharing the access information with others from your hospital who wish to participate.
Drawing from over 18 years of experience with cyber criminal and cyber national security investigations that have spanned the globe, this session will highlight lessons learned and best practices attendees can consider for themselves, their companies, agencies, or schools to help mitigate threats in their environments. This session will also discuss how these best practices can be applied to cyber threats such as ransomware, supply chain attacks, extortion, and Business Email Compromise (BEC) in the year 2021 and beyond. Moreover, this session will touch on cyber criminal and cyber nation state actors who are responsible for cyber attacks, giving attendees further insights on what to protect both in the real world and online. Finally, the session will offer insights on working with law enforcement, and the importance of proactively establishing relationships.
With 18 years of experience at the FBI, Mr. Hunt is currently a Supervisory Special Agent in the Atlanta Field Office. There he leads a team that conducts investigations in support of the FBI Cyber Division’s mission to identify, pursue, and defeat adversaries to impost risks and consequence upon them. Mr. Hunt also served as a Program Manager at FBI Cyber Division Headquarters, and was assigned to Australia as a cyber Assistant Legal Attaché. Prior to joining the FBI, he worked for twelve years in private industry.
This speaker has no real or perceived conflicts of interest that relate to this presentation.
At the conclusion of this session, participants should be able to:
- Apply best practices to help mitigate cyber attacks.
- Discuss best practices to reduce likelihood of becoming a victim of cyber crime.
- Explain current cyber threats.
- Understand more about the individuals and groups responsible for cyber attacks.
Describe law enforcement’s role in cyber matters.
Chief Executive Officer, Chief Information Officer, Chief Medical Officer, Chief Nursing Officer, Compliance Officer, Emergency Department Personnel, IT personnel, Joint Commission Coordinator, Medical Records, Quality Improvement personnel, Risk Manager, Legal Counsel.
Chad Hunt, CISSP, CISM
Supervisory Special Agent
Computer Intrusion Squad (CY1)
September 22; 5:00 p.m. MTN
Access instructions and materials will be emailed to the person completing the registration prior to the program date. If you do not receive the instructions at least 24-hours in advance, please contact IHA.