Stephen Fridakis

Chief Information Security Officer WW (Weight Watchers) International

Dr. Fridakis is an experienced technologist, international business manager, IT strategist with experience in programs and industries around the world including humanitarian programs, NGOs, IT development, defense, financial services, and electronic commerce. Capable of delivering solutions, managing complex projects, developing business teams and partnerships, and determining the appropriate technical and business approach to meeting compliance, financial and operational goals. A certified business continuity and information security manager has written extensively on matters of operational and economic strategy and speaks regularly in conferences in matters of risk, IT strategy metrics and business

Day Two: Tuesday, May 19, 2020

Tuesday, May 19th, 2020

1:20 PM Securing the Front Lines: Cybersecurity Awareness & Other Human-Centered Approaches to Overcoming Insider Threats

While the proliferation of threat vectors continues to create challenges to CISO’s within the healthcare space, it’s important to recognize that insider threats will remain a serious vulnerability for organizations for the foreseeable future. This session will delve into how a renewed focus on cybersecurity awareness training is a fundamental component of minimizing and containing the huge vulnerability that insider threats pose to long-term cyber resiliency within a healthcare-focused organization. 


Participate in this session to gain a better understanding of: 

  • emphasizing the human factor of cybersecurity to front-line employees in a meaningful, digestible way that fits the unique nature and risks 
  • development and implementation of a rewards program to foster transparency through positive reinforcement 
  • strategies to identify and empower cross-functional “cyber champions” to reinforce best practices outside of the training room 
  • optimizing clinical workflows to reduce friction and seamlessly integrate advanced cybersecurity technology  
  • the use of identity management to protect against cyber security threats 

Check out the incredible speaker line-up to see who will be joining Stephen.

Download The Latest Agenda