Your healthcare organization relies heavily on cloud-based applications, such as Microsoft 365, to communicate and keep things running. But with that comes challenges. It's difficult to secure data and adhere to data privacy and record keeping. At the same time, you must protect your organization and your end-users against fraudulent activity. This is why a people-centric approach to security and compliance is crucial to stopping these cyber threats and mitigating risks.

Join us for a panel discussion to hear how your peers are addressing these challenges. We will discuss steps to ensure compliance across your electronic communications ecosystem.

This session will cover:

• Common compliance challenges and pitfalls when it comes to e-discovery and risk detection

• How your content capture and archive strategy can augment your information protection program

• How a people-centric approach helps you better protect your organization

Attendees are eligible to receive 2 CPE credits.

Generously supported by:

supported by logo
speaker photo
Sarah Rugnetta
Healthcare Privacy Attorney, Beckage Law

Sarah Rugnetta advises hospitals, medical groups, insurers, foundations and not-for-profit entities on privacy and security matters. She works closely with clients to develop compliance programs that include privacy and security protocols, training seminars, and data breach response plans. Sarah uses tabletop exercises and incident response simulations to help her clients to develop strategies for securing data and to prepare for potential threats. Sarah also responds to privacy and security incidents and counsels organizations throughout the investigation, notification and reporting phases of a potential breach, helping them to mitigate legal risks at each critical stage.

speaker photo
Roy Wattanasin
Information Security Leader, Healthcare Industry

Roy Wattanasin is currently a healthcare information security professional. Additionally, Roy is an avid speaker who has spoken at many conferences and webinars. Roy also enjoys data forensics & incident response and building security in. He is heavily involved with many computer security groups including OWASP Boston, ISSA and the local communities. Roy is also a member of multiple advisory groups. He was an adjunct instructor at Brandeis University as part of the Health and Medical Informatics and is also the co-founder of that program. He is credited for bringing back the Security BSides Boston conference (setting the standards) and enjoys seeing it grow each year and being successful with its new team members.

speaker photo
Shannon Smith, Esq.
Regional Director, Compliance and eDiscovery, Proofpoint

Shannon Smith has worked at the crossroads of technology and the law for over a decade and understands the risk and challenges organizations face in managing increasing volumes of data.  As Regional Director, Compliance & eDiscovery, Shannon consults with clients on leveraging Proofpoint’s industry-leading technology to capture, manage and discover data related to litigation, internal investigations, and regulatory inquiries.  Prior to joining Proofpoint, Shannon worked with organizations to develop policies and processes to support information governance programs including complex retention policies, defensible litigation hold processes and repeatable ediscovery workflow. As an experienced attorney, Shannon brings an extensive knowledge of regulatory compliance, litigation readiness, and data management issues to her role. 

speaker photo
Ryan Witt
Managing Director for Healthcare, Proofpoint
speaker photo
Tom Bechtold
Digital Events Director, SecureWorld