HIMSS AsiaPac17 Conference & Exhibition

The exclusive Nursing Track will also be running concurrently. Click here for details

Tuesday, 12 September 2017
08:00 - 09:00Registration and Coffee
09:00 - 09:05Opening Ceremony
09:05 - 09:30Opening and Welcome Addresses
09:30 - 10:15Opening Keynote Session
10:15 - 11:15Plenary Session
11:15 - 11:45Dedicated Exhibition Hall Time
11:45 - 17:20Population HealthIHiS
11:45 - 12:30Featured Session P1Featured Session: 3 'Mega' Shifts in Transforming Health
12:30 - 12:35Session Transition
12:35 - 13:00Session P2Session 2
13:00 - 14:00Networking Lunch
14:00 - 14:25Session P3 (Reserved Industry Solution Session)Session 3
14:25 - 14:30Session Transition
14:30 - 14:55Session P4Session 4
14:55 - 15:00Session Transition
15:00 - 15:25Session P5 (Reserved Industry Solution Session)Session 5
15:25 - 15:55Tea Break
15:55 - 16:20Session P6Session 6
16:20 - 16:25Session Transition
16:25 - 16:50Session P7 (Reserved Industry Solution Session)Session 7
16:50 - 16:55Session Transition
16:55 - 17:20Session P8Session 8

Wednesday, 13 September 2017
08:30 - 09:00Registration and Coffee
09:00 - 09:45Keynote Session: The New Era of Cyber Threats: The Shift to Self-Learning and Self-Defending Networks [More Info]
Sanjay Aurora, Managing Director, Darktrace, Asia Pacific, Singapore

With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.

This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.

Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

In this session, learn about:
• The new age of silent, stealthy attacks that lie low in networks for weeks and months
• Why legacy approaches, like rules and signatures, are proving inadequate on their own
• How new ‘immune system’ technologies based on advanced mathematics and machine learning are being deployed today
09:45 - 10:30Plenary Session
10:30 - 11:00Dedicated Exhibition Hall Time
11:00 - 16:00Data & TechnologyCollaborative CareValue-Based Care
11:00 - 11:45Featured Session D1Featured Session C1Featured Session V1
11:45 - 11:50Session Transition
11:50 - 12:15Session D2Session C2Session V2
12:15 - 13:15Networking Lunch
13:15 - 13:40Session D3 (Reserved Industry Solution Session)Session C3 (Reserved Industry Solution Session)Session V3 (Reserved Industry Solution Session)
13:40 - 13:45Session Transition
13:45 - 14:10Session D4Session C4Session V4
14:10 - 14:15Session Transition
14:15 - 14:40Session D5 (Reserved Industry Solution Session)Session C5 (Reserved Industry Solution Session)Session V5 (Reserved Industry Solution Session)
14:40 - 14:45Session Transition
14:45 - 15:10Session D6Session C6Session V6
15:10 - 15:15Session Transition
15:15 - 15:40Session D7 (Reserved Industry Solution Session)Session C7 (Reserved Industry Solution Session)Session V7 (Panel Discussion)
15:40 - 15:45Session Transition
15:45 - 16:10Session D8Session C8
16:10 - 16:40Dedicated Exhibition Hall Time
16:40 - 17:25Keynote Session
17:25 - 17:45Closing