X12 Clearinghouse Caucus. January 31, :00-6:30 pm Sheraton Seattle Hotel / Metropolitan B
|
|
- Kevin Lucas
- 5 years ago
- Views:
Transcription
1 X12 Clearinghouse Caucus January 31, :00-6:30 pm Sheraton Seattle Hotel / Metropolitan B
2 Clearinghouse Caucus Sponsors
3 Clearinghouse Caucus - ASC X12 Standing Meeting January 31, :00-6:15pm Sheraton Seattle Hotel / Metropolitan B Welcome and Introduction -Sherry Wilson, Board Chair, Cooperative Exchange and EVP/ CCO, Jopari Solutions ASC X12 Update - Stacey Barber, ASC X12N Chair BCBSA Member ID Update - Gail Kocher, BCBSA Value Based Payment Implementation - Preparing for Change - Open forum stakeholder exchange - Implementation considerations for success Presenter: Crystal Ewing, Board Member, Cooperative Exchange and Manager of Data Integrity, ZirMed Moderator: Debra Strickland, Education Chair, Cooperative Exchange and Project Manager, Conduent 7030 Clearinghouse Review Update Presenter - Betty Lengyel-Gomez, Co-Chair, Emerging Trends and Strategic Innovation Committee, Cooperative Exchange and Compliance Director, Government Healthcare Solutions, Conduent Moderator: Joe Bell, Vice Chair, Cooperative Exchange and Senior Program Manager, Product Strategy, esolutions Transaction Processing Top Cybersecurity Findings Presenter - Doreen Espinoza, Board Member, Cooperative Exchange and Vice President of Regulatory Affairs and Privacy Officer, UHIN Moderator: Debbi Meisner, Secretary, Cooperative Exchange and Vice President Regulatory Compliance, Change Healthcare
4 Overview of Cooperative Exchange (CE) 25 Clearinghouse Member Companies Represent over 90% of the clearinghouse industry Over 750,000 submitting provider organizations Maintain over 8,000 Payer connections 1000 plus HIT vendor connections Process over 4 plus billion claims annually Value of transactions over $1.1 Trillion Infrastructure framework supports BOTH administrative and clinical transactions
5 Our Members
6 ASC X12 Update Stacy Barber, Chair, ASC X12N
7 BCBSA Member ID Update Gail Kocher, BCBSA
8 Value Based Payment Implementation Discussion Moderator: Crystal Ewing, ZirMed Debra Strickland, Conduent
9 Value Based Payment it is a reality 50% of Medicare Payments will be tied to an Alternative Payment Model (ACO or Bundled Payment) by the end of % of traditional Medicare payments will be tied to quality of value by 2018 through programs such as Hospital Readmissions Reduction The coalition known as the Health Care Transformation Task which includes 20 health systems and insurers says it is committed to moving 75% of its contracts into alternate payment models by 2020 Source:
10 The Triple AIM
11 Value Based Program Examples MIPS and APMs Value Modifier, PQRS, Meaningful Use (Replaced by MIPS) Hospital Readmission Reduction Hospital Value Based Purchasing Program (HVBP) End Stage Renal Disease (ESRD) Quality Incentive Program Hospital-Acquired Condition (HAC) Reduction Program Skilled Nursing Facility Program (SNFVBP) Home Health Value Based Program (HHVBP)
12 Alternative Payment Model Framework
13 It s Complicated
14 How can we make this transition successful?
15 Payer Use Cases Few examples of payer use cases: Quality measures requests and responses (HEDIS data) Connecting to other orgs/networks (EHR data pull) Value based payments (future models for encounter /claims) Patient access their care plans (CCD) Notifications alerts (CDS Hooks) Transitions of Care (Admit, Discharge, Transfer, and care management) Prior Authorizations Gaps in care (population health analytics)
16 Payer Perspective What types of functionality are used in your current implementation of value based payment models? What type of training tools are available? What type of functionality and training tools are needed by payers to ensure the success of alternative payment models? What are the sources and format of your data? (X12, EMR, HL7, etc.) Is it meeting your business needs? Do you have any lessons learned so far?
17 Provider Perspective What types of functionality is used in your current implementations of value based payment models? What functionality do you as providers think you need to ensure success of alternative payment models? What are the sources and format of your data? (X12, EMR, HL7, etc.) Is it meeting your business needs? Do you have any Lessons Learned so far? What functionality do you need from your payers to ensure the success of alternative payments models? What type of training tools do you need from your payers to ensure the success of alternative payment models?
18 Clearinghouse Perspective What can clearinghouses do to ensure the industry succeeds in the transition to alternative payment models?
19 7030 Clearinghouse Review Update Betty Lengyel-Gomez, Co-Chair, Emerging Trends and Strategic Innovation Committee, Cooperative Exchange and Compliance Director, Government Healthcare Solutions, Conduent Moderator: Joe Bell, Vice Chair, Cooperative Exchange and Senior Program Manager, Product Strategy, esolutions
20 7030 Clearinghouse Review The 7030 Workgroup is comprised of Cooperative Exchange members who want to be involved in the review of X12 s proposed changes for Version 7030, all affected transaction sets, all cycles. The workgroup provides: Discussion and collaboration of all proposed changes as well as a means for clarification of these changes if needed. Opportunity to have a positive impact on the proposed changes while addressing clearinghouses business needs for version Opportunity to educate our stakeholders on impactful changes.
21 Highlights since timeline release Workgroup has completed 2 cycles 277CA - removal of STC12 Workgroup agreed that to remove this segment would result in a slow-down of claim correction and adjudication Increase the number of calls to the payer for clarification of non-codified messages Providers would be forced to obtain additional information from payer portals Clearinghouses provide a more efficient path for getting information to the provider Surveyed members on usage application reviewing results will share with X12 Will work with WEDI, X12 and Cooperative Exchange on education, efficiency and solution initiatives
22 Highlights since timeline release Workgroup has completed 2 cycles 835 proposed changes discussed - Credit Card information within the 835 transaction. This poses a security risk and needs to be revised to use a token number instead of an actual card number. The HPID should not be used as an identifier for the payer within the 835 transaction, the payer id should be the standard. CAS/RAS changes that occurred in 6020 that moved forward in 7030 code values deleted or added where there was a CAS will now change to RAS 835 DTM segment of the 2100 Loop Clean Claim Date Need for a clear and concise definition of clean claim.
23 CE V7030 upcoming review meetings
24 How can you participate? Join the Work Group meet twice a month co-chairs Betty.Lengyel-Gomez@conduent.com Joan.Kossow@ssigroup.com Lisa Beard - lisa@m3solutionsllc.com
25 Transaction Processing 2016 Top Cybersecurity Findings Doreen Espinoza, Board Member, Cooperative Exchange and Vice President of Regulatory Affairs and Privacy Officer, UHIN Moderator: Debbi Meisner, Secretary, Cooperative Exchange and Vice President Regulatory Compliance, Change Healthcare
26 CE proactive preparation for Cyber War: Economic war is here
27 We are not prepared for Cyber War and it is Economic war now 2017 Prediction - Top Target Healthcare Data
28 Key Trends for Healthcare Data
29 2016 Healthcare Industry Top Target for Cybersecurity Attacks* Healthcare Payments and Medical Records yield more value on the black market than credit card information 90% Breaches - Targeted Spear Phishing - Average 187 days to detect beach - Average global organization containment cost $ 3.7 million Increase in targeted Hacktivist Intent to harm organization reputation Inadequate authentication and verification controls ranks high on breach incidents *
30 Attacks are focusing on higher value data targets ,000,000+ records breached, with no signs of decreasing in the future ,000,000,000 records breached, while CISOs cite increasing risks from external threats Healthcare mega-breaches set the trend for high value targets of sensitive information Source: IBM X-Force Threat Intelligence Report
31
32 Highly regulated industries have the highest per-record data breach costs $359 $294 $227 $206 Healthcare Education Pharmaceutical Financial $155 $141 $122 $105 Consumer Energy Hospitality Retail *Currencies converted to US dollars Source: 2014 Cost of Data Breach Study: Global Analysis, Ponemon Institute,
33 Community Health Systems Breach Data from 5.4M patients, including social security numbers Cost: $75-$150M Class action filed immediately Hackers used the Heartbleed bug to access VPN credentials CHS used a lot of open source or free security software Bug reported in April records still being stolen in June
34 CE Cyber Security 2017 Initiatives In addition To : Clearinghouse HIPAA /OCR Audit Certification Engaged with Top Cybersecurity Industry Leaders- Resources National Institute Standard Technology SP Update on Digital Authentication Guideline Homeland Cybersecurity Participating in ONC and HIT Security Committees Engaged with International CCM3 Cloud Security Alliance Clearinghouse Security Best Practices for Cloud Tool Kit: Clearinghouse Cyber Security Certification
35 Clearinghouse Caucus Sponsors
36 Thank You Cooperative Exchange Contact Information Lisa Beard, Executive Director, Cooperative Exchange Sherry Wilson, Board Chair Cooperative Exchange EVP and Chief Compliance Officer Jopari Solutions
ASC X12 Clearinghouse Caucus
ASC X12 Clearinghouse Caucus January 23, 2018 AGENDA 1. Welcome and Introduction - Joe Bell, Board Chair, Cooperative Exchange and Senior Program Manager, esolutions Inc. 2. ASC X12N Update - Stacey Barber,
More informationX12 Clearinghouse Caucus. June 6, :00-6:15pm Hyatt Regency San Antonio Rio Grande East / Center
X12 Clearinghouse Caucus June 6, 2017-5:00-6:15pm Hyatt Regency San Antonio Rio Grande East / Center Clearinghouse Caucus Sponsors Overview of Cooperative Exchange (CE) 24 Clearinghouse Member Companies
More informationResponse to CMS. WEDI Attachment Forum Questions. August 9th Attachment Standard
Response to CMS WEDI Attachment Forum Questions August 9th 2016 Attachment Standard August 25, 2016 Cooperative Exchange National Association of Clearinghouses 28 Clearinghouse member companies Represent
More informationUpdate from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013
Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More information2017 RIMS CYBER SURVEY
2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationNERC Staff Organization Chart Budget 2019
NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Officer Senior Vice President, General Counsel and Corporate
More informationHIPAA Compliance is not a Cybersecurity Strategy
HIPAA Compliance is not a Cybersecurity Strategy Presented by: Hector Rodriguez, WW Health CISO, Microsoft Jay Trinckes, Director, Coalfire Speaker Introductions Hector Rodriguez, WW Health CISO, Microsoft
More informationAchieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)
Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association
More informationEngaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,
Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev
More informationCertification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption
Certification Commission for Healthcare Information Technology CCHIT A Catalyst for EHR Adoption Alisa Ray, Executive Director, CCHIT Sarah Corley, MD, Chief Medical Officer, NextGen Healthcare Systems;
More informationNYDFS Cybersecurity Regulations
SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy
More informationNERC Staff Organization Chart Budget 2018
NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate
More informationThis Webcast Will Begin Shortly
This Webcast Will Begin Shortly If you have any technical problems with the Webcast or the streaming audio, please contact us via email at: webcast@acc.com Thank You! 1 Cybersecurity Changing Landscape
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationDigital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria
Digital Healthcare Yordan Iliev Director R&D Healthcare Regional Cybersecurity Forum, 29-30 November 2016, Grand Hotel Sofia, Bulgaria AGENDA Introduction Security challenges in healthcare IT Change ahead
More informationHIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance
HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group 4401 South Quebec Street, #100 Denver, CO 80237 (303) 488-9911
More informationChoosing the right two-factor authentication solution for healthcare
Choosing the right two-factor authentication solution for healthcare The healthcare industry s transition from paper to electronic records has introduced significant security risk from hackers around the
More informationCLINICAL DIRECT MESSAGING FREQUENTLY ASKED QUESTIONS
Surescripts has the experience to handle all of your direct messaging needs. Serving the nation with the single most trusted and capable health information network since 2001, we seamlessly connect the
More informationMission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS
Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber
More informationCyber Risk and Third Party Risk Management. Lisa Murphy First Horizon National Corporation
Cyber Risk and Third Party Risk Management Lisa Murphy First Horizon National Corporation The Cyber Risks Third Party Breach Advance Persistent Threat The Headlines Goodwill Names Vendor in Breach C&K
More informationHCISPP HealthCare Information Security and Privacy Practitioner
HCISPP HealthCare Information Security and Privacy Practitioner William Buddy Gillespie, HCISPP Global Academic Instructor (ISC)² Former Healthcare CIO Chair Advocacy Committee, CPAHIMSS budgill@aol.com
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationThe Massachusetts Health
HST.921 / HST.922 Information Technology in the Health Care System of the Future, Spring 2009 Harvard-MIT Division of Health Sciences and Technology Course Directors: Dr. Steven Locke, Dr. Bryan Bergeron,
More informationMANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors
Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationISACA West Florida Chapter - Cybersecurity Event
ISACA West Florida Chapter - Cybersecurity Event Presented by Sri Sridharan Managing Director & Chief Operating Officer Florida Center for Cybersecurity CURRENT TRENDS Top Cybersecurity Trends of 2015
More informationContinuity of Operations During Disasters: Electronic Systems and Medical Records
Idaho Health Care Association Continuity of Operations During Disasters: Electronic Systems and Medical Records Philip Niemer, MBA, MS, HEM Director Operational Continuity & Emergency Management Children
More informationPULSE TAKING THE PHYSICIAN S
TAKING THE PHYSICIAN S PULSE TACKLING CYBER THREATS IN HEALTHCARE Accenture and the American Medical Association (AMA) surveyed U.S. physicians regarding their experiences and attitudes toward cybersecurity.
More informationElectronic payments in the Netherlands
Electronic payments in the Netherlands The Dutch approach on Cybersecurity Gijs Boudewijn Deputy General Manager Vienna May 19 th 2015 Agenda Facts and figures Fraud developments in the Netherlands - Situation
More informationOutcomes and Lessons Learned From 5010 Testing Project Collaboration
Outcomes and Lessons Learned From 5010 Testing Project Collaboration Elliot Sloane, PhD, CCE Villanova University Co-Chair, IHE International Bob Bowman CORE Manager CAQH Paul Decrosta Manager, IPP Regulatory
More informationHealthcare HIPAA and Cybersecurity Update
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity
More informationCompliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice
Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationCYBERSECURITY IN THE POST ACUTE ARENA AGENDA
CYBERSECURITY IN THE POST ACUTE ARENA AGENDA 2 Introductions 3 Assessing Your Organization 4 Prioritizing Your Review 5 206 Benchmarks and Breaches 6 Compliance 0 & Cybersecurity 0 7 Common Threats & Vulnerabilities
More informationBored with Your Board s Involvement with Privacy/Security Program?
Bored with Your Board s Involvement with Privacy/Security Program? Marti Arvin, Cynergistek Joseph A. Dickinson, Tucker Ellis March 28, 2017 1 Initial Exercise: CISO Board Update Board of Directors/Trustees
More informationPonemon Institute s 2018 Cost of a Data Breach Study
Ponemon Institute s 2018 Cost of a Data Breach Study September 18, 2018 1 IBM Security Speakers Deborah Snyder CISO State of New York Dr. Larry Ponemon Chairman and Founder Ponemon Institute Megan Powell
More informationThe HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion.
The HITECH Act 5 things you can do Right Now to pave the road to compliance Beginning in 2011, HITECH Act financial incentives will create a $5,800,000 opportunity over four years for mid-size hospital
More informationMeaningful Use or Meltdown: Is Your Electronic Health Record System Secure?
SESSION ID: PDAC-R03 Meaningful Use or Meltdown: Is Your Electronic Health Record System Secure? Gib Sorebo Chief Cybersecurity Strategist Leidos @gibsorebo High Cost of Healthcare Data Breaches Source:
More informationOperationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results
Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationRethinking Information Security Risk Management CRM002
Rethinking Information Security Risk Management CRM002 Speakers: Tanya Scott, Senior Manager, Information Risk Management, Lending Club Learning Objectives At the end of this session, you will: Design
More informationMaintaining Trust: Visa Inc. Payment Security Strategy
Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among
More informationThe New Healthcare Economy is rising up
The New Healthcare Economy is rising up February 2017 The ever-rising costs of healthcare are fostering innovative solutions and disruptive business models Cybersecurity concerns come to medical technology
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationHITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013
HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013 The Smart Card Alliance hereby submits the following comments regarding the Health Information Technology Policy Committee
More informationIntroduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst
Introduction Angela Holzworth, RHIA, CISA, GSEC Sr. IT Infrastructure Analyst Kimberly Gray, Esq., CIPP/US Chief Privacy Officer, Global, IMS Health 1 Incorporating Privacy into the CSF: Approach and Benefits
More informationAudit and Compliance Committee - Agenda
Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More informationPennsylvania s HIE Journey
Pennsylvania s HIE Journey Alix Goss, Executive Director Pennsylvania ehealth Partnership Authority William Buddy Gillespie Director Healthcare Solutions DSS What is HIE? Health Information Exchange puts
More informationDon t Be the Next Headline! PHI and Cyber Security in Outsourced Services.
Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. June 2017 Melanie Duerr Fazzi Associates Partner, Director of Coding Operations Jami Fisher Fazzi Associates Chief Information
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationImplementing and Enforcing the HIPAA Security Rule
Implementing and Enforcing the HIPAA Security Rule John Parmigiani National Practice Director Regulatory and Compliance Services CTG HealthCare Solutions, Inc. Introductions Final Security Rule How we
More informationBringing Cybersecurity to the Boardroom Bret Arsenault
SESSION ID: CXO-T11 Bringing Cybersecurity to the Boardroom Bret Arsenault Corporate Vice President & CISO Microsoft Security has Transcended from to a an 3 How Microsoft Approaches Security Reinventproductivity
More informationThe Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services
The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationHIPAA Privacy, Security and Breach Notification
HIPAA Privacy, Security and Breach Notification HCCA East Central Regional Annual Conference October 2013 Disclaimer The information contained in this document is provided by KPMG LLP for general guidance
More informationThe Relationship Between HIPAA Compliance and Business Associates
The Relationship Between HIPAA Compliance and Business Associates 1 HHS Wall of Shame 20% Involved Business Associates Based on HHS Breach Portal: Breaches Affecting 500 or More Individuals, Type of Breach
More informationReducing Cybersecurity Costs & Risk through Automation Technologies
Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research
More informationSecuring the Internet of Things (IoT) at the U.S. Department of Veterans Affairs
Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber
More informationCyber Insurance: What is your bank doing to manage risk? presented by
Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an
More informationI. The Medical Technology Industry s Cybersecurity Efforts and Requirements
701 Pennsylvania Avenue, NW Suite 800 Washington, D.C. 20004 2654 Tel: 202 783 8700 Fax: 202 783 8750 www.advamed.org June 12, 2018 U.S. House of Representatives Committee on Energy and Commerce 2125 Rayburn
More informationCase Study. Medical Information Records, LLC. Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance
Case Study Medical Information Records, LLC Medical Information Records, LLC Medical Software Company Relies on Azure to Improve Scalability, Cut Costs & Ensure Compliance Overview Industry: Healthcare
More informationNERC Staff Organization Chart Budget 2017
NERC Staff Organization Chart Budget 2017 President and CEO Administrative Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel
More informationHealthcare Security Success Story
Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Healthcare Security Success Story
More informationCybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.
Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During
More informationFDA & Medical Device Cybersecurity
FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US
More informationProjecting and Budgeting Costs and Savings of HIPAA Compliance
Projecting and Budgeting Costs and Savings of HIPAA Compliance Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group 4401 South Quebec Street, #100 Denver, CO 80237 (303) 488-9911 sslazarus@aol.com
More informationForging a Stronger Approach for the Cybersecurity Challenge. Session 34, February 12, 2019 Tom Stafford, VP & CIO, Halifax Health
Forging a Stronger Approach for the Cybersecurity Challenge Session 34, February 12, 2019 Tom Stafford, VP & CIO, Halifax Health 1 Speaker Introduction Tom Stafford, Vice President & CIO Education: Bachelors
More informationInformation Technology (CCHIT): Report on Activities and Progress
Certification Commission for Healthcare Information Technology Certification Commission for Healthcare Information Technology (CCHIT): Report on Activities and Progress Mark Leavitt, MD, PhD Chair, CCHIT
More informationPREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice
PREPARING FOR SOC CHANGES AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice On May 1, 2017, SSAE 18 went into effect and superseded SSAE 16. The following information is here
More informationCYBER RISK MANAGEMENT
CYBER RISK MANAGEMENT AND BEST PRACTICES Heather Fields, JD, CHC, CCEP (414) 298-8166 hfields@reinhartlaw.com 1000 North Water Street, Suite 1700, Milwaukee, WI 53202 www.reinhartlaw.com 0 Agenda Role
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationHIMSS 15 Doing Better Business in the Era of Data Security and Privacy
HIMSS 15 Doing Better Business in the Era of Data Security and Privacy Michael D. Stovsky, Esq. Partner and Chair, Innovations, Information Technology and IP Group Cleveland Columbus Indianapolis Philadelphia
More informationThe Cost of Denial-of-Services Attacks
The Cost of Denial-of-Services Attacks Sponsored by Akamai Technologies Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report The Cost of Denial-of-Service
More informationBusiness continuity management and cyber resiliency
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,
More information2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification
2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification Presenters Jared Hamilton CISSP CCSK, CCSFP, MCSE:S Healthcare Cybersecurity Leader, Crowe Horwath Erika Del Giudice CISA, CRISC,
More informationA HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP,
A HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP, JD Director, HHS Office for Civil Rights Nicholas Heesters,
More informationUncovering the Risk of SAP Cyber Breaches
Uncovering the Risk of SAP Cyber Breaches Research sponsored by Onapsis Independently Conducted by Ponemon Institute LLC February 2016 1 Part 1. Introduction Uncovering the Risks of SAP Cyber Breaches
More informationHHS/CMS Unified Agenda - NPRM
Attachment Regulation Panel - Durwin Day (HCSC), Tony Benson (BCBSAL), Christol Green (Anthem) August, 29, 10:45 12:00 Durwin Day, Health Information Manager, HCSC HL7 Attachment WG Co-chair, PUG Co-chair
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationManaging Cybersecurity Risk
Managing Cybersecurity Risk Maureen Brundage Andy Roth August 9, 2016 Managing Cybersecurity Risk Cybersecurity: The Current Legal and Regulatory Environment Cybersecurity Governance: Considerations for
More informationOverview of Presentation
A HIPAA Security Incident and Investigation. It Can Happen to You. Sandra a L. Sessoms, RN, CPHQ, CHC Interim Vice President, System Compliance West Penn Allegheny Health System Robert R. Michalski, CHC
More informationHow Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq.
How Secure Do You Feel About Your HIPAA Compliance Plan? Daniel F. Shay, Esq. Word Count: 2,268 Physician practices have lived with the reality of HIPAA for over twenty years. In that time, it has likely
More informationDeMystifying Data Breaches and Information Security Compliance
May 22-25, 2016 Los Angeles Convention Center Los Angeles, California DeMystifying Data Breaches and Information Security Compliance Presented by James Harrison OM32 5/25/2016 3:00 PM - 4:15 PM The handouts
More informationEnsuring Privacy and Security of Health Information Exchange in Pennsylvania
Ensuring Privacy and Security of Health Information Exchange in Pennsylvania The Pennsylvania ehealth Initiative in collaboration with the Pennsylvania ehealth Partnership Authority Introduction The Pennsylvania
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationHIPAA ( ) HIPAA 2017 Compliancy Group, LLC
855 85 HIPAA (855-854-4722) www.compliancygroup.com 1 Started in 2005 by HIPAA auditors & Compliance experts Market need for a total end client solution Created The Guard: cloud-based solution Compliance
More informationHEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
More information2018 Guide to Building Your Security Strategy. January 23, pm 2 pm ET
2018 Guide to Building Your Security Strategy January 23, 2018 1 pm 2 pm ET Agenda Welcome and Introductions Claudia Ellison, Program Director, ehealth Initiative Discussion & Comments Ryan Witt, Managing
More informationExecutive Insights. Protecting data, securing systems
Executive Insights Protecting data, securing systems February 2018 Protecting data, securing systems Product and information security is a combination of education, policies and procedures, physical security
More information2018 THALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. HEALTHCARE EDITION www.thales-esecurity.com 2018 THALES DATA THREAT REPORT NOW IN ITS SIXTH YEAR SWEDEN NETHERLANDS U.S. U.K.
More informationGetting Your Privacy House in Order
Getting Your Privacy House in Order Lisa J. Sotto Ewa Abrams Victoria King Partner Associate General Counsel Global Privacy Officer Hunton & Williams LLP Tiffany & Co. UPS (212) 309-1223 (212) 230-5351
More information(60 min) California State Updates
(60 min) California State Updates Presenters: 30 min Speranza Avram, CEO, CalHIPSO: EHR status & uptake in CA 20 min David A. Minch, President & COO, HealthShare Bay Area: HIE status 10 min Questions 1
More informationCybersecurity and Nonprofit
Cybersecurity and Nonprofit 2 2 Agenda Cybersecurity and Non Profits Scenario #1 Scenario #2 What Makes a Difference Cyber Insurance and How it Helps Question and Answer 3 3 Cybersecurity and Nonprofit
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationAgenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute
Health Law Institute Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More Brooke Bennett Aziere October 18, 2017 Agenda Enforcement Trends Phase 2 HIPAA Audits Upcoming Initiatives 1 Enforcement
More information