IT in Healthcare Day

Size: px
Start display at page:

Download "IT in Healthcare Day"

Transcription

1 San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott North Main Street Walnut Creek, CA (925) *** Complimentary shuttle service to/from Walnut Creek BART will be available please arrange with the hotel. There are also plenty of taxis at Walnut Creek BART (or a minute walk) *** When: Wednesday, July 21st, 2010 Registration: 8:15 a.m. 9:00 a.m. Session: 9:00 a.m. 5:00 p.m. - Breakfast / Lunch / Afternoon Refreshments provided Speakers: See below for Sessions Agenda, Speaker Information, and Schedule CPE Hours: (TBD) Cost: $79.00 ISACA Members $90.00 Non-Members $40.00 Students $79 = 6-8 CPEs + Meals 4x the CPE units of our regular monthly luncheon sessions for less than 2x the cost = more than 50% savings for our valued members!!!

2 Session Synopses and Speaker Information: General Session Synopsis: As IT acquires a new strategic role in healthcare transformation, there is new accountability for the collection, use, sharing and protection of health information. The success of healthcare reform relies substantially upon the capability of health IT systems to provide timely, efficient and effective information and decision support. Join SF-ISACA in a health professionals day to discuss and learn about challenges and solutions to some of the industry s most pressing IT issues. Keynote Presentation: The Role of IT in Healthcare Reform (tentative session) Improved use of information technology will be the source of many billions of dollars of healthcare cost saving and health improvements. This talk explains how this can be and what the Federal government is doing to make it so. Session 1: Preparing for Meaningful Use Congress has mandated that the deployment and meaningful use of electronic medical records will be a requirement for full participation in government health programs. Commercial payers are likely to follow suit. This talk explains the meaningful use concept and the issues in its adoption and demonstration. Session 2: The Extended Healthcare Enterprise and the future of HIE in California Ann Geyer, Partner Tunitas Group Healthcare is an extended enterprise where many organizations collaborate to deliver positive health outcomes. The value of the health services depends upon the capability and willingness of competing healthcare organizations to share information in a timely and effective way. Once a leader,, California now lags other states in the development of an infrastructure to support such sharing. This talk explains the unique aspects of California s HIE problem, its history and prospects for resolution. Speaker Bio: Ann Geyer, Esq, MA, MBA, CISSP, CIPP, CPHRM is a consultant with the Tunitas Group, a health care specific IT and risk management consulting firm. Ann advises her clients, including some of the nation's largest

3 hospital organizations and health insurers as well as State and Federal agencies, on all aspects of information protection. Ann was the CEO of HDIC, a collaboration of California s health industry formed to build the State s HIE infrastructure in the mid 1990 s. Since then has since participated in numerous health IT collaborations and has a unique perspective on which lessons have been learned and which have not. She received her Masters in Statistics from UC Berkeley, MBA from Claremont and JD from the Concord Law School. Session 3: ICD-10: Much More than a Regulatory Mandate Mari Turvey, Senior Manager KPMG LLP The implications and challenges of the mandate for healthcare providers to move to the International Classification of Disease (ICD) version 10 (ICD-10) from the current ICD version 9 (ICD-9) are just now being recognized by the healthcare community. While the compliance deadline of October 1, 2013 may seem a long way off, the transition to ICD-10 is highly complex and can lead to significant changes in people, processes and technology. This session will walk through the structural changes of the ICD-10 coding system and the implications on operations from both the payor and provider perspectives. We will discuss implementation challenges and opportunities and the development of an ICD-10 road map to assist in achieving a successful conversion. Technical topics such as the use of General Equivalence Mappings (GEMs), crosswalk strategies and vendor alignment will also be discussed. The session will summarize implementation strategy alternatives, and timeline requirements. Speaker Bio: Mari is a senior manager in KPMG s IT Advisory Services practice supporting the KPMG Healthcare practice. Mari is a member of KPMG s National ICD-10 task force responsible for the delivery of ICD-10 assessment and strategic services to providers and payors throughout the United States. With more than 13 years of auditing and consulting experience, Mari focuses on healthcare companies, Insurance companies and financial institutions. She has significant experience in Healthcare IT strategy, process analysis and design including topics in: ICD-10; claims processing; third party administrator management; HIPAA transactions, and information security. Her technical expertise includes a wide range of applications, platforms and networks. Mari s current and past clients include some of the nation s leading healthcare and insurance companies. She holds a CISA certification and is a CPA in the States of California and Virginia. Session 4: The Incremental Privacy and Security Obligations of HITECH Bill Pankey, Partner Tunitas Group For IT to deliver its contribution to health reform, information and systems must reliable, agile and secure. Some of this requirement is explicitly stated I HITECH, other aspects are only implicit in the broad mandates of health transformation, and yet other are not yet generally recognized. This talk outlines the new requirements for security beyond HIPAA that will challenge the industry. Speaker Bio: Bill Pankey, CGEIT, CISA, CISSP, GIACx4, MCSE. Bill was a commenter to the original HIPAA Security NPRM in He has since consulted with a large part of the California industry on health infosec problems in well over 100 HIPAA projects. He has a unique perspective on the security capabilities of the industry s application infrastructure as a security inspector for the Commission for the Certification of Health Information Technology (CCHIT) and as a participant in health infosec standards development.

4 Session 5: The HIPAA/HITECH: Conditional Access Management for Business Performance Mark Seward, Director, Security and Compliance Solutions Splunk The current state of technology solutions for access management doesn t go far enough in helping healthcare providers with their compliance problems. Traditional access management systems -- either-you-have-access-oryou-don t -- approach doesn t fit with the unique business vision of providing healthcare. Specifically, solutions that try to monitor access can t take a broader conditional access view required for this business vertical. The presentation will address what can be done to provide access monitoring that makes business sense for healthcare. It will also look beyond HIPAA/HITECH to the broader issues of monitoring for fraud, performance management, and billing errors (revenue capture) allowing for a more holistic efficiency-based approach to solving some of this industry s unique problems. Speaker Bio: Mark Seward currently Director of Security and Compliance Solutions marketing at Splunk and has over 10 years of experience in the IT security management profession as a security practitioner and product manager with experience in log management and vulnerability management. Mark has been a featured speaker at international, national, and regional regional ISACA events. He will be speaking on Applying a Pattern-Based Strategy to IT Security and Risk Management at the ISACA Information Security and Risk Management Conference in Las Vegas in September. Mark has a Masters of Science in IT and a Federal CIO certification from the University of Maryland. Case Study: What s Worked and What Hasn t (tentative session) The business case for health IT is typically based on optimistic assumptions of improved outcomes and inflated cost savings while underestimating the difficulty encountered as practices try to effectively utilize the new information tools. Case studies provide needed reality as the industry undertakes transformation of its information infrastructure.

5 Session Schedule Session Topic Speaker/Panelist Start End Registration Continental Breakfast served Networking 8:15 9:00 Keynote The Role of IT in Healthcare Reform TBD 9:00 10:00 Session 1 Preparing for Meaningful Use TBD 10:00 11:00 Session 2 Extended Healthcare Enterprise and the future of HIE in California Ann Geyer, Partner Tunitas Group 11:00 12:00 Lunch Lunch Served Networking 12:00 1:00 Session 3 Session 4 Session 5 ICD-10: Much More than a Regulatory Mandate The Incremental Privacy and Security Obligations of HITECH The HIPAA/HITECH: Conditional Access Management for Business Performance Mari Turvey, Senior Manager KPMG LLP 1:00 2:00 Bill Pankey, Partner Tunitas Group 2:00 3:00 Mark Seward, Director, Security and Compliance Solutions Splunk 3:00 4:00 Break Refreshments and Coffee Networking 4:00 4:30 Case Study What s Worked and What Hasn t TBD 4:30 5:00

The Institute of Internal Auditors San Gabriel Valley Chapter

The Institute of Internal Auditors San Gabriel Valley Chapter The Institute of Internal Auditors San Gabriel Valley Chapter Presents INFORMATION TECHNOLOGY (IT) and PERFORMANCE AUDITING SEMINAR February 4 and 5, 2014 The San Gabriel Valley Chapter of the IIA is hosting

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

2018 Government Professional Accounting Seminar

2018 Government Professional Accounting Seminar 2018 Government Professional Accounting Seminar Thursday September 6, 2018 7:30 a.m. - Registration and Networking 8:00 a.m. 4:50 p.m. (Early Registration by Tuesday, July 31, 2018; Regular by Friday,

More information

SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE

SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE ABOUT ISACA For more than 50 years, ISACA (isaca.org) has been a pace-setting global professionals lead, adapt and assure trust in an evolving digital

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

Overview: Sponsored By:

Overview: Sponsored By: Overview: IIA Winnipeg is hosting its third annual full day Fraud Summit on Tuesday, March 15 th. The 2016 Fraud Summit will focus on fraud prevention, deterrence and detection along with topics including

More information

Handling Complex and Difficult Privacy and Information Security Issues

Handling Complex and Difficult Privacy and Information Security Issues Handling Complex and Difficult Privacy and Information Security Issues Rebecca Herold, CIPP, CISSP, CISM, CISA, FLMI Christopher Grillo, CISM, CISA, CPA, ITIL Presentation Overview: Handling complex and

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY :

THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY : THE ISACA CURACAO CHAPTER IS ORGANIZING FOLLOWING INFORMATION SECURITY AND TECHNOLOGY SESSIONS ON MAY 15-MAY 18 2017: INFORMATION SYSTEM AUDIT AND SECURITY MANAGEMENT ( 2 DAYS) MAY 15 AND 16 o INFORMATION

More information

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018

The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 The Integrated Auditor: Becoming the Go-to Resource Your Company Needs APRIL 24, 2018 Jeff Hemphill Partner and Central Region Leader, Risk Advisory Services Brian Kirkpatrick Managing Director, Risk Advisory

More information

CORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET

CORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET CORE Voluntary Certification: Certification from the Testing Vendor s Perspective February 18, 2015 2:00 3:00pm ET Participating in Today s Session Download a copy of today s presentation on the CAQH.org

More information

Maryland Health Care Commission

Maryland Health Care Commission Special Review Maryland Health Care Commission Security Monitoring of Patient Information Maintained by the State-Designated Health Information Exchange September 2017 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT

More information

INFORMATION TECHNOLOGY AUDIT &

INFORMATION TECHNOLOGY AUDIT & One day training on INFORMATION TECHNOLOGY AUDIT & 10 th May 2018 - Mövenpick Hotel, Karachi 14 th May 2018 - Sunfort Hotel, Lahore (10:00 AM to 5:00 PM) TRAINING OVERVIEW Every time people get to hear

More information

Checkpoint Learning Premier Plus CPE Package

Checkpoint Learning Premier Plus CPE Package Checkpoint Learning Premier Plus CPE Package More learning options for a single low annual price. 2 Premier Plus CPE Package Checkpoint Learning Premier Plus CPE Package The Checkpoint Learning Premier

More information

Information Security Officer (ISO) Education

Information Security Officer (ISO) Education Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville, Tenn. Information Security Officer (ISO) Education October 16, 2018 TBA Barrett Training Center Nashville,

More information

building for my Future 2013 Certification

building for my Future 2013 Certification I am building for my Future 2013 Certification Let ISACA help you open new doors of opportunity With more complex IT challenges arising, enterprises demand qualified professionals with proven knowledge

More information

Les joies et les peines de la transformation numérique

Les joies et les peines de la transformation numérique Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education

More information

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016

ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 ISACA MOSCOW CHAPTER Chapter meeting 22 September 2016 Introduction Special guest speaker ISACA Audit committee member, Rosemary Amato Open dialog Wrap-up and close Special guest speaker CISA, CMA, CPA,

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

COBIT 5 With COSO 2013

COBIT 5 With COSO 2013 Integrating COBIT 5 With COSO 2013 Stephen Head Senior Manager, IT Risk Advisory Services 1 Our Time This Evening Importance of Governance COBIT 5 Overview COSO Overview Mapping These Frameworks Stakeholder

More information

January 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities

January 25, Digital Governments. From KPMG s Harvey Nash survey to a future of opportunities January 25, 2018 Digital Governments From KPMG s Harvey Nash survey to a future of opportunities About the Survey 4,500 Responses 2 Decades $1-3trn IT budget 86 Countries 118 Government agencies 2 Digital

More information

PROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional.

PROFILE FRANCIS KAITANO. Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional. PROFILE FRANCIS KAITANO Francis Kaitano is a strategic, innovative, delivery focused Cyber Security professional. Originally from Zimbabwe Francis Kaitano came to New Zealand more than 10 years ago for

More information

Agenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5

Agenda-At-A-Glance 3 Sessions & Workshops 3 Management Certificates 4. Professional Certification 4 Registration Form 5 Hotel Accommodations 5 Dear Colleague, Unlike any other MAILCOM, the Annual Fall Convention puts you in touch with the leading executives and managers in the mail communication and distribution industry. For three days you will

More information

10-CM/PCS Barriers and Opportunities

10-CM/PCS Barriers and Opportunities HIPAA Summit West VI ICD-10 10-CM/PCS Barriers and Opportunities Dan Rode, MBA, CHPS, FHFMA Vice President, Advocacy and Policy AHIMA ICD-10 10-CM/PCS What we ll cover: AHIMA What is now known about ICD-10

More information

Pronouncement 7 CPD v3.0

Pronouncement 7 CPD v3.0 1. Preamble 1.1 The Board of Directors of the Institute of Public Accountants issues Continuing Professional Development ( the Pronouncement ). The following Pronouncement is issued pursuant to clause

More information

HIMSS 15 Doing Better Business in the Era of Data Security and Privacy

HIMSS 15 Doing Better Business in the Era of Data Security and Privacy HIMSS 15 Doing Better Business in the Era of Data Security and Privacy Michael D. Stovsky, Esq. Partner and Chair, Innovations, Information Technology and IP Group Cleveland Columbus Indianapolis Philadelphia

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

CYBERSECURITY AND THE MIDDLE MARKET

CYBERSECURITY AND THE MIDDLE MARKET CYBERSECURITY AND THE MIDDLE MARKET The Importance of Cybersecurity and How Middle Market Companies Manage Cyber Risks IN COLLABORATION WITH 2 Concerns about cybersecurity are not matched by plans. IMPORTANCE

More information

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com

Better together. KPMG LLP s GRC Advisory Services for IBM OpenPages implementations. kpmg.com Better together KPMG LLP s GRC Advisory Services for IBM OpenPages implementations kpmg.com KPMG A leader in GRC services KPMG LLP (KPMG) is the U.S. member firm of the KPMG global network of professional

More information

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES: (Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:

More information

PCI compliance the what and the why Executing through excellence

PCI compliance the what and the why Executing through excellence PCI compliance the what and the why Executing through excellence Tejinder Basi, Partner Tarlok Birdi, Senior Manager May 27, 2009 Agenda 1. Introduction 2. Background 3. What problem are we trying to solve?

More information

HIPAA Compliance Strategies for IPAs and Medical Groups

HIPAA Compliance Strategies for IPAs and Medical Groups HIPAA Compliance Strategies for IPAs and Medical Groups A. John Blair, III, MD Chairman and Chief Executive Officer Taconic IPA, Inc. Fishkill, NY Background Practicing Physician 15 years Revenue Reductions

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

ISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT )

ISACA. Certification Details for Certified in the Governance of Enterprise IT (CGEIT ) ISACA Pasitikėjimas informacinėmis sistemomis ir jų nauda Certification Details for Certified in the Governance of Enterprise IT (CGEIT ) Dainius Jakimavičius, CGEIT ISACA Lietuva tyrimų ir metodikos koordinatorius

More information

Three Key Challenges Facing ISPs and Their Enterprise Clients

Three Key Challenges Facing ISPs and Their Enterprise Clients Three Key Challenges Facing ISPs and Their Enterprise Clients GRC, enterprise services, and ever-evolving hybrid infrastructures are all dynamic and significant challenges to the ISP s enterprise clients.

More information

Training Opportunities

Training Opportunities July September 2014 Training Opportunities Meeting Your Training Needs and CPE Requirements Group-Live Course Group Internet-Based Course To learn more or register for any of these events, visit www.gfoa.org.

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

EARN UP TO 18 CPE CREDITS

EARN UP TO 18 CPE CREDITS Join Us in Nashville, TN, USA 370 Stay at the Heart of the Conference Action! The Omni Nashville 250 5th Avenue South Nashville, TN 37203, USA Hotel Reservations: 615-782-5300 2018 Governance, Risk, and

More information

Effective COBIT Learning Solutions Information package Corporate customers

Effective COBIT Learning Solutions Information package Corporate customers Effective COBIT Learning Solutions Information package Corporate customers Thank you f o r y o u r interest Thank you for showing interest in COBIT learning solutions from ITpreneurs. This document provides

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

How to avoid storms in the cloud. The Australian experience and global trends

How to avoid storms in the cloud. The Australian experience and global trends How to avoid storms in the cloud The Australian experience and global trends Discussion Topics 1. Understanding Cloud and Benefits 2. KPMG research The Australian Experience and Global Trends 3. Considerations

More information

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM

Ben Eu. Summary. Experience. Associate Partner, Infrastructure & Endpoint Security at IBM Ben Eu Associate Partner, Infrastructure & Endpoint Security at IBM Summary Ben Eu is currently an Associate Partner at IBM Security Services, North America. As an experienced information security executive

More information

ISACA CyberSecurity All Day Event. October 17, 2014

ISACA CyberSecurity All Day Event. October 17, 2014 ISACA CyberSecurity All Day Event October 17, 2014 7:30 AM 8:00 AM 8:00 AM 8:15 AM Agenda Registration, Hot Breakfast Buffet and Networking Introductions 8:15 AM 10:00 AM Session 1 Preparing for Cybergeddon:

More information

A Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances

A Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances A Quick Guide to EPCS What You Need to Know to Implement Electronic Prescriptions for Controlled Substances Many healthcare providers have delayed implementing electronic prescriptions for controlled substances

More information

Background of the North America Top Technology Initiatives Survey

Background of the North America Top Technology Initiatives Survey Kevin M. Martin, CPA.CITP, MCSE, MCP+I The 2013 North America* Top Technology Initiatives Survey *AICPA and CPA Canada The views expressed by the presenters do not necessarily represent the views, positions,

More information

HIPAA Compliance is not a Cybersecurity Strategy

HIPAA Compliance is not a Cybersecurity Strategy HIPAA Compliance is not a Cybersecurity Strategy Presented by: Hector Rodriguez, WW Health CISO, Microsoft Jay Trinckes, Director, Coalfire Speaker Introductions Hector Rodriguez, WW Health CISO, Microsoft

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005

Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005 Business Process Design and Internal Audit UNIVERSITY OF TEXAS AT DALLAS Course Syllabus Spring 2005 Instructor: Mark Salamasick, CIA, CISA, CSP Course Number: AIM 6380 Semester Hours: 3 Location: SOM

More information

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration

TOMORROW. TOGETHER Governance, Risk, and Control Conference. August 19-21, Phoenix, Arizona. An IIA & ISACA Collaboration TOMORROW. TOGETHER. 2013 Governance, Risk, and Control Conference An IIA & ISACA Collaboration Join two highly respected associations at one world-class event August 19-21, 2013 Phoenix, Arizona Reserve

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association

More information

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act Are your authentication, access, and audit paradigms up to date? Table of Contents Synopsis...1

More information

Health IT Certification

Health IT Certification Health IT Certification Sam King MPH, MBA, FHIMSS, FHFMA, CPHIMS, CPHQ, CHFP Senior Director, Professional Development HIMSS May 11, 2016 Agenda Today s Healthcare Environment The Impact of Meaningful

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

National Defense University and IRMC. National Defense University

National Defense University and IRMC. National Defense University The Forgotten Information Assurance Professional - Educating the Senior IT Manager Robert C. Norris, Jr. Information Resources Management College National Defense University 1 Overview Intro to IRMC and

More information

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES

FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES COURSE FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES November 13-14, 2018 EUCI Conference Center Denver, CO Furthered my learning regarding cyber security initiatives. Director, CPS Energy RELATED EVENT:

More information

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course

raining Meeting your training needs and CPE requirements opportunities July-September Group-Live Course Group Internet- Based Course Meeting your training needs and CPE requirements T raining opportunities July-September 2018 Group-Live Course Group Internet- Based Course To learn more or register for any of these events, visit www.gfoa.org

More information

Government Privacy. Julie Smith McEwen, CIPP/G, CISSP Principal Information Systems Privacy and Security Engineer

Government Privacy. Julie Smith McEwen, CIPP/G, CISSP Principal Information Systems Privacy and Security Engineer IAPP Privacy Certification Certified Information Privacy Professional/Government (CIPP/G) Government Privacy Julie Smith McEwen, CIPP/G, CISSP Principal Information Systems Privacy and Security Engineer

More information

The HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion.

The HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion. The HITECH Act 5 things you can do Right Now to pave the road to compliance Beginning in 2011, HITECH Act financial incentives will create a $5,800,000 opportunity over four years for mid-size hospital

More information

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev

More information

An Integrated Approach to Technology Risk Management and Compliance

An Integrated Approach to Technology Risk Management and Compliance An Integrated Approach to Technology Risk Management and Compliance Kerry Bryan, Sr. Manager Policy & Guidance Michael Makstman, Sr. Director Sherrie Osborne, Director, HIPAA Security Program Technology

More information

HCISPP HealthCare Information Security and Privacy Practitioner

HCISPP HealthCare Information Security and Privacy Practitioner HCISPP HealthCare Information Security and Privacy Practitioner William Buddy Gillespie, HCISPP Global Academic Instructor (ISC)² Former Healthcare CIO Chair Advocacy Committee, CPAHIMSS budgill@aol.com

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

Invest in. ISACA-certified professionals, see the. rewards.

Invest in. ISACA-certified professionals, see the. rewards. Invest in ISACA-certified professionals, see the rewards. Invest in ISACA-certified professionals, see the rewards. As a global IT association that has been around for more than 40 years, ISACA provides

More information

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne

The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne The National Medical Device Information Sharing & Analysis Organization (MD-ISAO) Initiative Session 2, February 19, 2017 Moderator: Suzanne Schwartz, Assoc. Dir., CDRH, FDA Denise Anderson, MBA, President,

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

2 nd Annual Meeting for Abacus North America Members

2 nd Annual Meeting for Abacus North America Members 2 nd Annual Meeting for Abacus North America Members April 30 May 1, 2019 The Ritz-Carlton Atlanta Atlanta, Georgia USA The Meeting Abacus Worldwide brings firms together on a global scale but our Regional

More information

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD

CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD CYBERSECURITY HOW IT IS TRANSFORMING THE IT ASSURANCE FIELD December 2014 KEVIN GROOM ISACA Involvement (Middle Tennessee Chapter) Treasurer (2009 2011) Vice President (2011 2013) President (2013 present)

More information

Partnership Information

Partnership Information SECOND INTERNATIONAL CONFERENCE ON ISO 31000 STANDARD USING ISO 31000 RISK MANAGEMENT STANDARD TO ACHIEVE OPTIMAL PERFORMANCE Conference Date: 28-29 May 2013 Master Classes Date: 30-31 May 2013 Location:

More information

FramewOrk to DeSign and implement ifc

FramewOrk to DeSign and implement ifc Marketing Partner Hotel Radisson GRT, 15 Leveraging COSO internal COntrOLS FramewOrk to DeSign and implement ifc 8 CPE Hours Networking Opportunities Qualified CIA Faculty about the Seminar The COSO Internal

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model July 16 17, 2014 Earn up to 16 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are you confident in

More information

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS

FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS COURSE FUNDAMENTALS OF CYBER SECURITY FOR NUCLEAR PLANTS February 22-23, 2018 Millennium Knickerbocker Hotel Chicago, IL RELATED EVENT: FUNDAMENTALS OF CYBER SECURITY FOR UTILITIES February 21-22, 2018

More information

Course Fees: 850 euro

Course Fees: 850 euro In conjuction with: Prishtinë: 19.02.2015. Offer: 2M Consulting & PECB, ISO 27001:2013 Lead Auditor Training Lecturer: Msc. CMC, Lekë Zogaj, Master ISO/IEC ISO 27001:2013 Convenient ISMS Lead Auditor Training

More information

HIPAA Privacy, Security and Breach Notification

HIPAA Privacy, Security and Breach Notification HIPAA Privacy, Security and Breach Notification HCCA East Central Regional Annual Conference October 2013 Disclaimer The information contained in this document is provided by KPMG LLP for general guidance

More information

1 st Annual Meeting for Abacus Latin America Members

1 st Annual Meeting for Abacus Latin America Members 1 st Annual Meeting for Abacus Latin America Members March 14-15, 2019 Hilton Garden Inn Montevideo, Uruguay The Meeting Abacus Worldwide brings firms together on a global scale but our Regional Meetings

More information

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa

Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Agenda and Speakers Cyber Security 2018: Building Resilience Now and For the Future Mar 1 2, 2018 Ottawa Thursday, March 01, 2018 7:30 am Registration and Continental Breakfast 8:00 am Opening Remarks

More information

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION 9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.

More information

Renewal Registration & CPE for CPAs in Iowa

Renewal Registration & CPE for CPAs in Iowa 1. When must I renew my certificate? Renewal Registration Process You must renew your certificate annually with the Iowa Accountancy Examining Board (IAEB). Online renewal is typically available May 15

More information

Cognizant Cloud Security Solution

Cognizant Cloud Security Solution CLOUD SECURITY OVERVIEW Cognizant Cloud Security Solution Transform your security operation to protect your business across public and hybrid cloud environments. December 2017 The advantages of moving

More information

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification

2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification 2018 HIPAA One All Rights Reserved. Beyond HIPAA Compliance to Certification Presenters Jared Hamilton CISSP CCSK, CCSFP, MCSE:S Healthcare Cybersecurity Leader, Crowe Horwath Erika Del Giudice CISA, CRISC,

More information

Monthly Meeting November 16, 2016

Monthly Meeting November 16, 2016 Monthly Meeting November 16, 2016 Agenda / Announcements Welcome to Parsons, 7110 Samuel Morse Drive, Suite 200 Columbia, Maryland 21046 Non-U.S. Citizen Requirements Any guests or new members in attendance?

More information

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec

More information

VISION Virtualized Storage Services Foundation for the Future Internet

VISION Virtualized Storage Services Foundation for the Future Internet VISION Virtualized Storage Services Foundation for the Future Internet Julian Satran, Hillel Kolodner, Dalit Naor *, Yaron Wolfsthal IBM, On Behalf of the VISION Consortium SNIA Cloud Storage Mini Summit

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Data Governance Quick Start

Data Governance Quick Start Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry

More information

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย

แนวทางการพ ฒนา Information Security Professional ในประเทศไทย แนวทางการพ ฒนา Information Security Professional ในประเทศไทย โดย Thailand Information Security Association (TISA) Agenda 1) Global Information Security Professional Situation 2) Current Thailand Information

More information

2018 Trends in Hosting & Cloud Managed Services

2018 Trends in Hosting & Cloud Managed Services PREVIEW 2018 Trends in Hosting & Cloud Managed Services DEC 2017 Rory Duncan, Research Director, Managed Services & Hosting Penny Jones, Principal Analyst - MTDC & Managed Services Aaron Sherrill, Senior

More information

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice

PREPARING FOR SOC CHANGES. AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice PREPARING FOR SOC CHANGES AN ARMANINO WHITE PAPER By Liam Collins, Partner-In-Charge, SOC Audit Practice On May 1, 2017, SSAE 18 went into effect and superseded SSAE 16. The following information is here

More information

Customer Success Story. ZeOmega. ZeOmega and ClearDATA partner to help a large IDN achieve Meaningful Use

Customer Success Story. ZeOmega. ZeOmega and ClearDATA partner to help a large IDN achieve Meaningful Use Customer Success Story ZeOmega ZeOmega and ClearDATA partner to help a large IDN achieve Meaningful Use Page 2 of 5 ZeOmega and ClearDATA Partner to Help a Large IDN Achieve Meaningful Use Table of Contents

More information

Number of CPE Hours Required for CCSA, CFSA, CGAP, CRMA. Specialty Certification CPE Requirements. Required Attestations at Time of CPE Reporting

Number of CPE Hours Required for CCSA, CFSA, CGAP, CRMA. Specialty Certification CPE Requirements. Required Attestations at Time of CPE Reporting Volume 16 Issue 5 Changes to Continuing Professional Education (CPE) Requirements and Reporting Processes to be Implemented in 2012 On Tuesday, November 15, 2011, the Global Board approved the implementation

More information