ASSESSMENT BEST PRACTICES


CLOUD


COMPLIANCE


CROSS-INDUSTRY ADOPTION


Information Risk in Travel and Hospitality
Information Risk in Travel and Hospitality

CYBERSECURITY


Dark and Stormy - Attacking Cloud Computing
Dark and Stormy – Attacking Cloud Computing

GENERAL SESSIONS


Adopting HITRUST as the Backbone of Your Information Security Program
Adopting HITRUST as the Backbone of Your Information Security Program
A Day in the Life of a Chief Privacy Officer
A Day in the Life of a Chief Privacy Officer
Evolving Role of the Chief Information Security Officer
Evolving Role of the Chief Information Security Officer
Establishing a Consistent Method for Managing Third-Party Risk
Establishing a Consistent Method for Managing Third-Party Risk

HEALTHCARE


PRE-CONFERENCE WORKSHOPS


PRIVACY


RISK MANAGEMENT


THIRD-PARTY ASSURANCE


Streamlining Your Third-Party Risk Management Program
Streamlining Your Third-Party Risk Management Program
Operating an Effective and Scalable Supplier Risk Management Program
Operating an Effective and Scalable Supplier Risk Management Program