2023 Cybersecurity Awareness Month (CAM) Symposium
Target Audience
Learning Objectives
After this activity, participants will be able to:
- Recall how to strengthen research security when working with external partners through recognized best practices, intellectual property safeguards, and collaboration guidelines;
- Identify secure practices and behaviors to adopt into daily activities that promote a cybersecurity culture;
- State the importance of cybersecurity, the risks associated with cyber threats, and their role in preventing cyberattacks;
- Describe core cybersecurity concepts, such as threat identification, risk assessment, standardized system setup, and mitigation strategies;
- Discuss how collaboration across the institution will create a platform for knowledge sharing, collaboration, and the development of new ideas to enhance the institution's cybersecurity posture.
- 6.00 AMA PRA Category 1 Credit™
- 6.00 Participation
8:00 a.m. – 9:00 a.m. – Registration
Talbot Hall/Library Lounge/Cloister Club
Registration and Breakfast
9:00 a.m. – 9:15 a.m. – Opening Remarks
Cloister Club
Opening Remarks and Introduction
Understanding the University’s Cybersecurity Threat Landscape: A Data-based Review
Kevin Boyd, Chief Information Officer, IT Services; Matt Morton, Chief Information Security Officer, IT Services; Jessica Sandy, Governance Risk and Compliance Manager
9:15 a.m. – 10:15 a.m. – Keynote Speaker
Cloister Club
Keynote: The Convergence of Security and Research
Samuel L. Volchenboum, Associate Professor of Pediatrics; Associate Director, Institute for Translational Medicine; Associate Chief, Research Informatics Officer; Dean of Master’s Education
10:30 a.m. – 12:15 p.m. – Dual Track Sessions
Track A: Core Security Concepts
10:30 a.m. – 11:15 a.m – Presentation Third Floor Theatre
The Human Firewall: Defending
Against Social Engineering Attacks
Kendall Williams, Information Security Engineer,
University of Chicago
Craig Drake, Information Security Engineer,
University of Chicago
11:30 a.m. – 12:15 p.m. – Presentation Third Floor Theatre
How to Protect your Data from Insider Threats
Jay Patel, Assistant Special Agent in Charge, FBI Chicago Field Office
Track B: Research Security
10:30 a.m. – 11:15 a.m. – Presentation Library
Password Research: The Intersection of Human Computer Interaction, Privacy, and Security
Blase Ur, Neubauer Family Assistant Professor, Department of Computer Science
11:30 a.m. – 12:15 p.m. – Live Demo Library
Three Ways to Secure Your Research Data
Mike Abreu, Security Engineer, IT Services; Eddie Martinez, Security Engineer, BSD
12:15 p.m. – 1:15 p.m. – Panel Discussion and Lunch
Cloister Club
Security Lessons Learned
Harold Pollack, PhD, Co-Director of the Health Lab and Helen Ross Professor, Crown Family School of Social Work, Policy, and Practice, University of Chicago; David Awschalom, PhD, Liew Family Professor of Molecular Engineering and Vice Dean for Research and Infrastructure, Samuel L. Volchenboum, Associate Professor of Pediatrics; Associate Director, Institute for Translational Medicine; Associate Chief, Research Informatics Officer; Dean of Master’s Education
1:30 p.m. – 2:15 p.m. – Panel Discussion Third Floor Theatre
Ask a CISO
Matt Morton, CISO, IT Services; Les McCollum II, MPS-CRM, CISO, UChicago Medicine
2:30 p.m. – 3:15 p.m. – Presentation Third Floor Theatre
Application Security Overview
Heather Stratford, Founder and CEO, Drip7
3:30 p.m. – 4:15 p.m. – Presentation Third Floor Theatre
HIPAA and Other Regulated Data
Karen Habercoss, Chief Privacy Officer, UChicago Medicine
1:30 p.m. – 2:15 p.m. – Presentation Library
Don’t Let Storage Hold Up Your Research: How to Choose the Right Solution for Your Needs
Cornelia Bailey, Director, Information Assurance, IT Services; Knut Boehmer, IT Risk Analyst, IT Services
2:30 p.m. – 3:15 p.m. – Presentation Library
A Researcher’s Overview of Security and Compliance for Data Commons and Other Data Platforms
Bob Grossman, Frederick H. Rawson Distinguished Service Professor in Medicine and Computer Science; Jim and Karen Frank Director, Center for Translational Data Science (CTDS); Chief, Section of Biomedical Data Science, Dept. of Medicine; Chief Research Informatics Officer (CRIO), Biological Sciences Division
3:30 p.m. – 4:15 p.m. – Presentation Library
Securing Your Research in the Cloud
Shelley Rossell, Cloud Security Architect, IT Services
4:30 p.m. – 4:45 p.m. – Closing Remarks
Cloister Clu
Closing Remarks
Erin Adams, Vice Provost for Research, Joseph Regenstein Professor of Biochemistry and Molecular Biology Committee on Cancer Biology; Kevin Boyd, CIO, IT Services; Matt Morton, CISO, IT Services
4:45 p.m. – 5:30 p.m. – Dessert Hour
Talbot Hall/Library Lounge/Cloister Club
Dessert Hour
*The agenda is subject to change.
WANT TO KNOW MORE?
ACCESSIBILITY The ASTCT and EBMT are committed to providing equal access appropriate to need and circumstances and complies fully with legal requirements of the Americans with Disabilities Act. If you are in need of special accommodation, please contact Cornelia Bailey via email at cornelia@uchicago.edu.
The University of Chicago reserves the right to cancel or postpone this conference due to unforeseen circumstances. In the unlikely event this activity must be cancelled or postponed, the registration fee will be refunded; however, ASTCT and EBMT are not responsible for any related costs, charges, or expenses to participants, including fees assessed by airline/travel/lodging agencies.
UNIVERSITY OF CHICAGO PLANNING COMMITTEE
Cornelia Bailey Director of Information Assurance, Information Technology Services | David Mendez Risk Analyst, Information Technology Services |
Kevin Boyd, MA Chief Information Security Officer, Information Technology Services | Heather Mirabelli Graphic Design Specialist 1, Information Technology Services |
Elise Covic, PhD Chief Operating Officer, Information Technology Services | Tina Morris Executive Assistant, Information Technology Services |
Astrid Fingerhut Project and Services Coordinator, Information Technology Services | Matt Morton, MA Chief Information Security Officer, Information Technology Services |
Vanessa Martin Risk Analyst, Information Technology Services | Kolleen Ritz Communications Manager, Information Technology Services |
Gabe McElwain Project and Services Coordinator, Information Technology Services | Jessica Sandy, MA Governance, Risk, and Compliance Manager, Information Technology Services |
As a provider accredited by the ACCME, The University of Chicago Pritzker School of Medicine asks everyone in a position to control the content of an education activity to disclose all financial relationships with any ineligible companies. This includes any entity whose primary business is producing, marketing, selling, re-selling, or distributing healthcare products used by or on patients. Financial relationships are relevant if a financial relationship, in any amount, exists between the person in control of content and an ineligible company during the past 24 months, and the content of the education is related to the products of an ineligible company with whom the person has a financial relationship. Mechanisms are in place to identify and mitigate any relevant financial relationships prior to the start of the activity.
Additionally, The University of Chicago Pritzker School of Medicine requires Authors to identify investigational products or off-label uses of products regulated by the US Food and Drug Administration at first mention and where appropriate in the content.
The University of Chicago Pritzker School of Medicine is accredited by the Accreditation Council for Continuing Medical Education (ACCME) to provide continuing medical education for physicians.
Other healthcare professionals will receive a Certificate of Participation. For information on the applicability and acceptance of Certificates of Participation for educational activities certified for AMA PRA Category 1 Credit™ from organizations accredited by the ACCME, please consult your professional licensing board.
Click the button below to get started!
REGISTER TODAY!
Please Note: The credit claiming process will close three months after the activity ends. Requests for certificates after three months will be subject to additional fees.