Day Two Agenda

Thursday, July 17, 2025

8:30 am Check In & Light Breakfast

9:20 am Chair’s Opening Remarks

Maximizing Security Frameworks to Ensure Safety of Data

9:30 am Cloud Systems Cybersecurity Considerations

  • Chris Clayton Director - Information Technology, INCOG BioPharma Services

Synopsis

  • Fundamentals to ensure your Cloud Provider is truly secure
  • Authentication and using AI to detect anomalies and enable risk-based access
  • Balancing strong protection with frictionless user access

10:00 am Strategies to Meet FDA Cybersecurity Requirements While Using Cloud Providers

Synopsis

  • Ensure clear division of security responsibilities between your organization and cloud providers to meet FDA compliance
  • Use continuous monitoring, threat detection, and AI-driven analytics to proactively manage cybersecurity risks
  • Integrate FDA cybersecurity requirements into cloud-based medical device development from the start

Ensuring Cross-Functional Alignment to Ensure Cloud Compliance

10:30 am Translating Cross Functionally to CSV Experts to Showcase Accurate Deliverables Required

Synopsis

  • Communicating compliance needs clearly to CSV (Computer System Validation) experts to align technical and regulatory goals
  • Establishing clear validation documentation, test scripts, and compliance checkpoints
  • Implementing structured workflows, shared responsibilities, and cross-functional training to ensure seamless validation processes

11:00 am Morning Break

11:30 am Understanding Organizational Change Management (OCM) & Strategizing to Ensure Expectations Brought by This Change Are Addressed Across All Functions

Synopsis

  • Understanding the role of OCM in managing regulatory and operational shifts, especially in compliance environments
  • Ensuring clear communication, stakeholder involvement, and understanding of new compliance requirements throughout the organization
  • Establishing feedback loops, training programs, and continuous monitoring to address challenges and optimize long-term success

12:00 pm Panel Discussion: Who Does Data Governance, Data Security, & Chain of Custody Lie With? What Are the Controls in Place Internally to Ensure Data Governance?

Synopsis

  • As data moves across systems, who should be accountable for governance, security, and chain of custody, and how can we ensure these responsibilities are clearly defined and effectively shared?
  • Implementing access controls, data classification policies, audit trails, encryption, and regular risk assessments to protect sensitive information and maintain compliance
  • Establishing regular training, reporting mechanisms, and internal audits to monitor data usage, track compliance, and prevent unauthorized access or misuse?

12:45 pm Lunch & Networking

1:45 pm Overcoming Data Ownership Challenges to Better Understand Roles & Responsibilities Within a Company While Ensuring Accountability

  • Jenna Hall Associate Director, Global Quality Systems, Alkermes

Synopsis

  • Establishing ownership roles across departments to clarify accountability for data management, protection, and compliance
  • Implementing policies, access controls, and data stewardship responsibilities to ensure transparency and compliance
  • Encouraging collaboration between legal, IT, and compliance teams to align on responsibilities and address ownership gaps

2:15 pm Roundtable Discussion: The Importance of Bringing a Mindset Shift from ‘Compliance After Product Development’ to ‘Compliance During Product Development’ to Maximize Effective Cloud Compliance

Synopsis

  • Embedding compliance practices from the outset of product development to prevent costly rework and ensure adherence to regulations
  • Fostering close collaboration between development, quality assurance, and compliance teams for real-time feedback and alignment
  • Ensuring ongoing compliance through integrated validation processes, audits, and automated checks throughout the development lifecycle

2:45 pm Demystifying Responsibilities When Moving from On-Premises to Cloud to Increase Visibility and Control Over Your Dat

Synopsis

  • Understanding the division of responsibilities between your organization and the cloud provider to ensure data security and compliance
  • Defining roles, access controls, and compliance requirements to maintain visibility and control over data in the cloud
  • Utilizing real-time monitoring, audit trails, and automated alerts to maintain oversight and ensure ongoing compliance with regulatory standards

3:15 pm Chair’s Closing Remarks