This document discusses security considerations for building reactive systems in regulated industries. It provides an overview of the IBM Watson and Cloud Platform, and background on the presenter. It then discusses examples like the Equifax data breach and Abbott pacemaker recall that demonstrate the need for risk aversion in these industries. The document proposes moving from a monolithic patient vitals application to a reactive one using event sourcing and CQRS patterns. It outlines how these patterns can help with compliance, recovery from incidents, and reducing risk according to the NIST Cybersecurity Framework categories of Identify, Protect, Detect, Respond and Recover. A demo of the reactive patient vitals app is proposed to show how it reduces risk. The document concludes