HCCA Managed Care Conference. Agenda 2/12/2015

Size: px
Start display at page:

Download "HCCA Managed Care Conference. Agenda 2/12/2015"

Transcription

1 HCCA Managed Care Conference February 15, 2015 Las Vegas, NV Agenda How your SIU functions Basic operation of the SIU Importance of coordination and collaboration SIU, general counsel and compliance department overlaps Current trends in SIU Hot issues Analytics 2 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 1

2 Special investigation unit Definition A unit whose mission is to detect, investigate and prevent fraudulent activities affecting policies issued and claims filed for payment by an insurer. The name of the investigative unit may vary, but special investigations unit is the most common Purpose Operate as a centralized investigative unit with cross functional reporting activities Utilize personnel with varied backgrounds (investigators, coders, clinicians, etc.) Communicate and coordinate with senior management, the compliance department, and outside parties Utilize data analytics to proactively identify high risk areas of fraud, waste, and abuse State mandates that insurance carriers maintain in-house SIU or contract out The liaison with other entities handling claims fraud Source: 3 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Overview Leading practices for SIU The leading practices for anti-fraud units can be broken out across the following three components: Mission, Organizational structure, and Processes 1 Mission 2 Organizational Structure and People 3 Processes and Technology A B C D E Pre-Payment Review Proactive Problem Solving Post Payment Investigations Post Payment Review Collections 4 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 2

3 1 Mission Approach to fraud and abuse Centralized investigation Operating Unit - Clearly defined polices for delegation and issue resolution - Standardized investigation process and procedure Anti-fraud efforts focused on all areas in which fraudulent or abusive behavior could exist (providers, members, employees, etc.) Cross functional reporting to communicate case activities and issues across the organization Coordination and communication Anti-fraud efforts in the organization are highly visible to Senior Management and the Board of Directors - Regular communications to appraise management of anti-fraud efforts and investigations within the organization - SIU independence, autonomy, and ability to initiate and conduct investigations across the company s lines of business Information sharing with outside parties (health care fraud task forces, anti-fraud organizations and regulators) Information sharing with internal parties 5 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Overview Leading practices for SIU The leading practices for anti-fraud units can be broken out across the following three components: Mission, Organizational structure, and Processes 1 Mission 2 Organizational Structure and People 3 Processes and Technology A B C D E Pre-Payment Review Proactive Problem Solving Post Payment Investigations Post Payment Review Collections 6 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 3

4 2 Organizational Structure and People Composition of unit Personnel Multi-Discipline Team: Investigators (law enforcement background), coders, clinicians, auditors, etc. Skills Analytic ability, interviewing skills, knowledge of claims processing Size FTE size aligns with claims volume and membership Training SIU staff training - SIU staff meets all basic training requirements in subjects including current healthcare trends, antifraud and abuse technology, interviewing/investigation skills - SIU staff maintains appropriate certifications Plan-wide training - Extensive, frequent, and scheduled fraud and abuse training for all employees - Fraud and abuse training included in new employee training 7 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Overview Leading practices for SIU The leading practices for anti-fraud units can be broken out across the following three components: Mission, Organizational structure, and Processes 1 Mission 2 Organizational Structure and People 3 Processes and Technology A B C D E Pre-Payment Review Proactive Problem Solving Post Payment Investigations Post Payment Review Collections 8 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 4

5 3 Processes and Technology Pre-payment review Aggressive use of pre-payment edits to stop fraudulent and abusive behavior before claims are paid Strong coordination between credentialing and the SIU to eliminate or closely monitor high risk providers Translation/migration of fraud and abuse issues into analytics program Ability to appropriately flag out of network and abusive high volume/high cost in network providers without substantial impact to claims processing requirements Proactive problem identification Formal collaboration between SIU and other internal units such as network management, provider contracting, credentialing, utilization management, etc. SIU has formal relationships with a variety of external resources that provide investigation leads and are used to combine efforts such as the NHCAA, other health plans, or government agencies (FBI, OIG, DOJ, CMS, state insurance) Data Analytics is used and data triaged to identify high priority/high risk opportunities 9 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 3 Processes Post-payment investigations Robust management information system to support: - Tracking of case loads - Staff productivity - Outcomes (Savings/Recovery) - Referral sources - Timelines of investigations - Milestones and accomplishments Well defined and effective case supervision - Supervisor approval of case initiation and close - Mandatory and uniform case file system - Uniform processes for case documentation Well defined metrics for measuring anti-fraud effectiveness and priorities - Impact on patient care - Monetary recovery metrics - Loss prevention - Impact on the plan/support of plan initiatives - Administrative activities Credentialing and terminations/suspensions Access to necessary expertise, such as medical management, finance, and information technology to support investigation activities 10 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 5

6 3 Processes Post-payment review Systems to conduct post payment reviews of provider and member payments (individually and aggregate) Cross functional roles and responsibilities are clearly defined SIU participates in cross functional proactive risk assessments of system weaknesses Monitoring of pharmacy payments, specifically PBM efforts related to retrospective claims review and collection Collections Centralized area for collections with the ability to: - Control offsets - Control recoupments - Control repayments - Establish uniform policies related to the forgiveness of debt Clear delegation of authority regarding what levels of the organization can forgive potential debt Management information and metrics regarding plan collection of collection efforts 11 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Assessing the allegation Common Sources of Initial Information Current and Former Employees Board Members Internal Audit/Compliance Reviews Vendors Patients Physicians Consultants Competitors Governmental Agencies Hot Line Whistleblower Media 12 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 6

7 Concluding the investigation and reporting results Reporting Results Essentials Will reporting be verbal or written General parameters for reporting: An impartial, fair and objective recounting of facts Detail Investigative Procedures Summarize Factual Findings Avoid distortions and inaccuracies Be mindful of drawing inferences and conclusions, and using opinions Recommended Portage Remedial Actions Reporting to other interested parties or stake holders Independent Auditors Outside agencies/regulatory bodies/law Enforcement Business Partners Does reporting need to be modified for external use? 13 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Coordination and Collaboration Special Investigations Unit General Counsel Compliance Department 14 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 7

8 SIU and Compliance Regularly works with variety of compliance business partners Regulatory compliance Medicare compliance Medicaid compliance Commercial compliance Privacy compliance International compliance Proactive compliance 15 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Effective SIU/Compliance Relationship Effective SIU/Compliance Relationship Prompt Response to Detected Offenses Written Policies & Standards of Conduct Compliance Officer, Compliance Committee, & Oversight Risk Assessment, Monitoring & Auditing 7 Core Elements Training & Education Well-Publicized Disciplinary Standards Effective Lines of Communication 8

9 Works closely with Legal Share data to assist with court actions Work with Legal to coordinate undercover operations with law enforcement Legal provides input on letters Legal provides counsel in connection with investigations Proactive legal training 17 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Detect and prevent Use of advanced data analytics 9

10 Need for fraud/waste/abuse solutions for healthcare claims fraud A study from the Institute of Medicine estimated health care fraud at $75 billion a year and found that about 30 percent of total US health spending in 2009 roughly $750 billion was wasted on unnecessary services, excessive administrative costs, fraud and other problems. 1 The median time to detect for billing fraud, if detected at all, is 24 months after the fraud is detected.2 If the time to detection can be reduced from months to less than 7 months, the dollar cost of fraud can be reduced by 2/3.2 An effective anti-fraud program can save money: one government study showed a return of $7.20 for every $1.00 expended on fighting healthcare fraud. 3 Median Loss per Fraud (Thousands of Dollars) Identifying fraud earlier results in greater savings Median Loss Based on Duration of Fraud Less than 7 months7-12 months months months months months months 1 Source: New York Times, published September 11, 2012) 2 Source: Association of Certified Fraud Examiners: Report to the Nations on Occupational Fraud and Abuse: 2014 Global Fraud Study 3 Source: US Department of Health and Human Services and US Department of Justice, Health Care Fraud and Abuse Control Program Annual Report for Fiscal Year 2011, Feb 2012) 19 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. A new approach to fraud prevention Enterprise Fraud and Misuse Management (EFM) refers to an integrated approach to fraud management including the technology platform, advanced analytics, and anti-fraud processes to proactively monitor for fraud. The four pillars of EFM include: Time Proactively screen transactions on a real-time basis Remedy issue before it causes financial or reputational damage Definition of real time can vary by industry and sector Enterprise View Look inside and outside organization for evidence of fraud Move away from siloed approach to fraud management Consider both ERP and operational technology platforms Data Profile Evaluate structured and unstructured data populations Process Big Data terabytes, petabytes, and beyond Breadth is evolving video imagery, voice recognition, etc. Analytics Perform transaction and entity analysis on data populations Map diverse tool set of techniques to business needs Predictive, anomaly detection, link, text, geospatial analytics 20 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 10

11 EFM dimensions An organization can tailor an EFM approach to its business needs. Environment Analytics Time 21 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Advanced analytics with EFM platforms Organizations can apply sophisticated analytics to help stay ahead of fraud and corruption. Business Rules (Transactions) Use if-then logic to identify known patterns or clear-cut cases of fraud, waste, and abuse. Anomaly Detection (Transactions) Identify patterns that are inconsistent with normal activity with statistical profiling and outlier detection. Example: If a provider is billing more patients than possible to see in a day (e.g., business rule threshold set at 30 patients per day), then flag for investigation. Example: Providers who write an unusually large number of prescriptions for pain medication, relative to their historical pattern or their peers. Predictive Modeling (Transactions) Discover complex patterns in historical data and make predictions against current information. Network Analysis (Entities) Discover associations between entities to identify fraud networks and other collusive behavior. Example: Providers can be modeled based on their case load, patient mix, and other characteristics to determine the factors associated with writing prescriptions. Example: Expose all of the beneficiaries associated with a fraudulent provider or uncover hidden relationships between suspicious providers. 22 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 11

12 Advanced analytics with EFM platforms Organizations can apply sophisticated analytics to help stay ahead of fraud and corruption. Business Rules (Transactions) Use if-then logic to identify known patterns or clear-cut cases of fraud, waste, and abuse. Example: If a provider is billing more patients than possible to see in a day (e.g., business rule threshold set at 30 patients per day), then flag for investigation. 23 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Advanced analytics with EFM platforms Organizations can apply sophisticated analytics to help stay ahead of fraud and corruption. Anomaly Detection (Transactions) Identify patterns that are inconsistent with normal activity with statistical profiling and outlier detection. Example: Providers who write an unusually large number of prescriptions for pain medication, relative to their historical pattern or their peers. 24 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 12

13 Advanced analytics with EFM platforms Organizations can apply sophisticated analytics to help stay ahead of fraud and corruption. Predictive Modeling (Transactions) Discover complex patterns in historical data and make predictions against current information. Example: Providers can be modeled based on their case load, patient mix, and other characteristics to determine the factors associated with writing prescriptions. 25 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Advanced analytics with EFM platforms Organizations can apply sophisticated analytics to help stay ahead of fraud and corruption. Network Analysis (Entities) Discover associations between entities to identify fraud networks and other collusive behavior. Example: Expose all of the beneficiaries associated with a fraudulent provider or uncover hidden relationships between suspicious providers. 26 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 13

14 How is this different than current claim edit approaches? Claim Edits Uses business rules to ensure claims are properly coded, and complaint with payer requirements Good for addressing issues such as procedure-to-diagnosis mismatches, unbundling occurrences, use of nonspecific diagnosis codes, Rules are manually coded and updated based on subject matter experts Works on one claim at a time, or one set of claims at a time Enterprise Fraud Management Uses advanced analytics to identify patterns that correspond to potential misuse or fraud Good for identifying anomalies and outliers over very large data sets Good for identifying underlying links between organizations to identify potential misuse or fraud between providers or beneficiaries Works on large sets of claims to identify underlying patterns Both are valuable, and play different roles 27 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. Current fraud and abuse trends Detect and Prevent Quality of Care Patient Harm Medical Identity Theft Credentialing/Provider Qualifications Ambulatory Surgical Centers Laboratories/Drug Screening Inpatient/Outpatient Hospital Rehab Facilities Pharmaceutical Drug Diversion/Addiction Home Health Care Hospice Durable Medical Equipment Anti-Kickback/Stark Law Expansion of the False Claims Act Self-Disclosures 28 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 14

15 Examples where SIU can help Par Hospital Non-Par Physician Par Surgeon Non-Par Ambulatory Surgical Center Par Surgeon Non-Par Assistant Surgeon or Surgical Assistant Par Physician Non-Par Facility Par Physician Non-Par Lab 29 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. SIU Can Make An Impact Get your billions back SIU 30 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. 15

16 Appendix A Contact information Rob Cepielik Partner Deloitte Financial Advisory Services LLP 1700 Market Street Philadelphia, PA Tel/Direct: rcepielik@deloitte.com Mike Little Senior Manager Deloitte Financial Advisory Services LLP 1700 Market Street Philadelphia, PA Tel/Direct: mlittle@deloitte.com Paul Weller, Esquire Head of Provider Litigation Aetna 980 Jolly Road Blue Bell, PA Tel/Direct: pdweller@aetna.com 31 HCCA Managed Care Conference Copyright 2015 Deloitte Development LLC. All rights reserved. About Deloitte Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as Deloitte Global ) does not provide services to clients. Please see for a detailed description of DTTL and its member firms. Please see for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright 2015 Deloitte Development LLC. All rights reserved. 36 USC Member of Deloitte Touche Tohmatsu Limited 16

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC

Auditing and Monitoring for HIPAA Compliance. HCCA COMPLIANCE INSTITUTE 2003 April, Presented by: Suzie Draper Sheryl Vacca, CHC Auditing and Monitoring for HIPAA Compliance HCCA COMPLIANCE INSTITUTE 2003 April, 2003 Presented by: Suzie Draper Sheryl Vacca, CHC 1 The Elements of Corporate Compliance Program There are seven key elements

More information

SECTION/OWNER: CCO CONTRACTORS

SECTION/OWNER: CCO CONTRACTORS Policy/Procedures POLICY NO: UOP ACO-COMP-005 SANCTION PROCESS- SECTION/OWNER: CCO CONTRACTORS EFFECTIVE DATE: 01/01/2017 DATE TO QIC: 01/15/2017 DATE TO BOARD: 01/31/2017 1.0 PURPOSE This policy is to

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

INTELLIGENCE DRIVEN GRC FOR SECURITY

INTELLIGENCE DRIVEN GRC FOR SECURITY INTELLIGENCE DRIVEN GRC FOR SECURITY OVERVIEW Organizations today strive to keep their business and technology infrastructure organized, controllable, and understandable, not only to have the ability to

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

Deloitte Forensic Caribbean & Bermuda Countries Guide

Deloitte Forensic Caribbean & Bermuda Countries Guide Deloitte Forensic Caribbean & Bermuda Countries Guide Deloitte Forensic Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or

More information

Anticipating the wider business impact of a cyber breach in the health care industry

Anticipating the wider business impact of a cyber breach in the health care industry Anticipating the wider business impact of a cyber breach in the health care industry John Gelinne, Director Cyber Risk Services Deloitte & Touche LLP jgelinne@deloitte.com commodore_22 Hector Calzada,

More information

WHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE. WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009

WHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE. WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009 , II C II EA i :1'11 C.\Il C(HI l' I.L\ '" C..\SSOCIATI \"'l\lull...... Ii \ ~ L~ WHEN TO HOLD YOUR TONGUE - THE BENEFITS AND RISKS OF SELF-DISCLOSURE WHAT IS A PHYSICIAN PRACTICE TO DO? October 13, 2009

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

The ACFE Law Enforcement and Government Alliance

The ACFE Law Enforcement and Government Alliance What is the ACFE? The Association of Certified Fraud Examiners (ACFE) is the world s largest anti-fraud organization and premier provider of anti-fraud training and education with more than 80,000 members

More information

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO

More information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines New York Department of Financial Services ( DFS ) Regulation 23 NYCRR 500 requires that entities

More information

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI

GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI GOVERNANCE, RISK MANAGEMENT AND COMPLIANCE TRENDS BY FCPAK ERIC KIMANI CONTENTS Overview Conceptual Definition Implementation of Strategic Risk Governance Success Factors Changing Internal Audit Roles

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

PLEASE NOTE. - Text the phrase MICHAELBERWA428 to the number /23/2016 1

PLEASE NOTE. - Text the phrase MICHAELBERWA428 to the number /23/2016 1 PLEASE NOTE This is an interactive panel, and we will be conducting voting throughout. To make voting easy, please register NOW, before the panel starts. To register: - Text the phrase MICHAELBERWA428

More information

HIPAA Privacy, Security and Breach Notification

HIPAA Privacy, Security and Breach Notification HIPAA Privacy, Security and Breach Notification HCCA East Central Regional Annual Conference October 2013 Disclaimer The information contained in this document is provided by KPMG LLP for general guidance

More information

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE COMPLIANCE ADVISOR NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE A PUBLICATION BY THE EXCESS LINE ASSOCIATION OF NEW YORK One Exchange Plaza 55 Broadway 29th Floor New York, New York 10006-3728 Telephone:

More information

The New Healthcare Economy is rising up

The New Healthcare Economy is rising up The New Healthcare Economy is rising up February 2017 The ever-rising costs of healthcare are fostering innovative solutions and disruptive business models Cybersecurity concerns come to medical technology

More information

Cyber Risk and Networked Medical Devices

Cyber Risk and Networked Medical Devices Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan

Ready, Willing & Able. Michael Cover, Manager, Blue Cross Blue Shield of Michigan Ready, Willing & Able Michael Cover, Manager, Blue Cross Blue Shield of Michigan Agenda 1. Organization Overview 2. GRC Journey Story 3. GRC Program Roadmap 4. Program Objectives and Guiding Principals

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010

SAS 70 Audit Concepts. and Benefits JAYACHANDRAN.B,CISA,CISM. August 2010 JAYACHANDRAN.B,CISA,CISM jb@esecurityaudit.com August 2010 SAS 70 Audit Concepts and Benefits Agenda Compliance requirements Overview Business Environment IT Governance and Compliance Management Vendor

More information

FOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013

FOUNDED GOAL of New ORGANIZATION. CLEAR Annual Educational Conference Getting the Most Out of CLEAR. St. Louis October 3-5, 2013 Deanna Williams FOUNDED 1980 In 1980, a group of professional and occupational regulators and private sector representatives met in New Orleans to discuss their need to share information. GOAL of New ORGANIZATION

More information

Implementing an Audit Program for HIPAA Compliance

Implementing an Audit Program for HIPAA Compliance Implementing an Audit Program for HIPAA Compliance Mike Lynch Fifth National HIPAA Summit November 1, 2002 Seven Guiding Principles of HIPAA Rules Quality and Availability of Care Nothing in the proposed

More information

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE

ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN THE DEPARTMENT OF JUSTICE 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ESTABLISHMENT OF AN OFFICE OF FORENSIC SCIENCES AND A FORENSIC SCIENCE BOARD WITHIN

More information

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!

More information

HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance

HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group 4401 South Quebec Street, #100 Denver, CO 80237 (303) 488-9911

More information

10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment

10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment Preparing Your Organization for a HHS OIG Information Security Audit David Holtzman, JD, CIPP/G CynergisTek, Inc. Brian C. Johnson, CPA, CISA HHS OIG Section 1: Models for Risk Assessment Section 2: Preparing

More information

Projecting and Budgeting Costs and Savings of HIPAA Compliance

Projecting and Budgeting Costs and Savings of HIPAA Compliance Projecting and Budgeting Costs and Savings of HIPAA Compliance Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group 4401 South Quebec Street, #100 Denver, CO 80237 (303) 488-9911 sslazarus@aol.com

More information

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Plan a Pragmatic Approach to the new EU Data Privacy Regulation AmChamDenmark event: EU Compliant & Cyber Resistant Plan a Pragmatic Approach to the new EU Data Privacy Regulation Janus Friis Bindslev, Partner Cyber Risk Services, Deloitte 4 February 2016 Agenda General

More information

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp Agenda Introductions HIPAA Background and History Overview of HIPAA Requirements

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com Spread your wings Professional qualifications and development at Deloitte What impact will you make? careers.deloitte.com It s your future. How far will you take it? Do you want to make an impact in your

More information

Department of Justice Policing and Victim Services BUSINESS PLAN

Department of Justice Policing and Victim Services BUSINESS PLAN Policing and Victim Services BUSINESS PLAN 2004-2005 1. The Creation of a New Division The was created in 2001 by joining the former Divisions: Policing and Public Safety Services and Victims Services.

More information

WHITE PAPER. Title. Managed Services for SAS Technology

WHITE PAPER. Title. Managed Services for SAS Technology WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive

More information

Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation

Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation Booz Allen Hamilton Proprietary 1 Conference Presentation Identity Theft: Enterprise-Wide Strategies for Prevention, Detection and Remediation Kris O Neal Dan Steinberg Harvard Privacy Symposium August

More information

Stopping Insider Threats Before They Start: Using Leading Techniques and Predictive Analysis to Presage Your Environment

Stopping Insider Threats Before They Start: Using Leading Techniques and Predictive Analysis to Presage Your Environment Stopping Insider Threats Before They Start: Using Leading Techniques and Predictive Analysis to Presage Your Environment 1 Attachmate Corporation. All rights reserved. Results show that it can take more

More information

Cybersecurity and Data Protection Developments

Cybersecurity and Data Protection Developments Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB

More information

Information Technology General Control Review

Information Technology General Control Review Information Technology General Control Review David L. Shissler, Senior IT Auditor, CPA, CISA, CISSP Office of Internal Audit and Risk Assessment September 15, 2016 Background Presenter Senior IT Auditor

More information

OVERVIEW BROCHURE GRC. When you have to be right

OVERVIEW BROCHURE GRC. When you have to be right OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

NATIONAL INSTITUTE OF FORENSIC SCIENCE

NATIONAL INSTITUTE OF FORENSIC SCIENCE NATIONAL INSTITUTE OF FORENSIC SCIENCE LEGISLATIVE OUTLINE National Institute of Forensic Sciences (NIFS) The NIFS will be responsible for the coordination, administration, and oversight of all of the

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

HIPAA Federal Security Rule H I P A A

HIPAA Federal Security Rule H I P A A H I P A A HIPAA Federal Security Rule nsurance ortability ccountability ct of 1996 HIPAA Introduction - What is HIPAA? HIPAA = The Health Insurance Portability and Accountability Act A Federal Law Created

More information

SOC for cybersecurity

SOC for cybersecurity April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory

More information

GRC SURVEY RESULT Please indicate your profession

GRC SURVEY RESULT Please indicate your profession COPENHAGEN?=! CO?=! MPLIANCE T o p i c a l a n d T i m e l y Riskability GRC Controllers Governance, Risk & Compliance COPENHAGEN?=! CHARTER Bribery, Fraud & Corruption GRC SURVEY RESULT. Please indicate

More information

Getting Security Right: The CISO of the Future

Getting Security Right: The CISO of the Future Getting Security Right: The CISO of the Future Presented by: Mac McMillan CEO, CynergisTek CynergisTek, Inc. 11410 Jollyville Road, Suite 2201, Austin TX 78759 512.402.8550 info@cynergistek.com cynergistek.com

More information

2015 HFMA What Healthcare Can Learn from the Banking Industry

2015 HFMA What Healthcare Can Learn from the Banking Industry 2015 HFMA What Healthcare Can Learn from the Banking Industry Agenda Introduction- Background and Experience Healthcare vs. Banking The Results OCR Audit Results Healthcare vs. Banking The Theories Practical

More information

Credit Card Data Compromise: Incident Response Plan

Credit Card Data Compromise: Incident Response Plan Credit Card Data Compromise: Incident Response Plan Purpose It is the objective of the university to maintain secure financial transactions. In order to comply with state law and contractual obligations,

More information

Achieving effective risk management and continuous compliance with Deloitte and SAP

Achieving effective risk management and continuous compliance with Deloitte and SAP Achieving effective risk management and continuous compliance with Deloitte and SAP 2 Deloitte and SAP: collaborating to make GRC work for you Meeting Governance, Risk and Compliance (GRC) requirements

More information

Audit and Compliance Committee - Agenda

Audit and Compliance Committee - Agenda Audit and Compliance Committee - Agenda Board of Trustees Audit and Compliance Committee April 17, 2018, 1:30 2:30 p.m. President s Board Room Conference Call-In Phone #1-800-442-5794, passcode 463796

More information

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand

More information

VII. GUIDE TO AGENCY PROGRAMS

VII. GUIDE TO AGENCY PROGRAMS VII. GUIDE TO AGENCY PROGRAMS Executive Offices and Centers David L. Lakey, M.D., Commissioner Kirk Cole, Associate Commissioner Luanne Southern, Deputy Commissioner FTEs: 71.1 Commissioner FTEs: 1.5 The

More information

PROTERRA CERTIFICATION PROTOCOL V2.2

PROTERRA CERTIFICATION PROTOCOL V2.2 PROTERRA CERTIFICATION PROTOCOL V2.2 TABLE OF CONTENTS 1. Introduction 2. Scope of this document 3. Definitions and Abbreviations 4. Approval procedure for Certification Bodies 5. Certification Requirements

More information

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION

BENEFITS of MEMBERSHIP FOR YOUR INSTITUTION PROFILE The Fiduciary and Investment Risk Management Association, Inc. (FIRMA ) is the leading provider of fiduciary and investment risk management education and networking to the fiduciary and investment

More information

Certification Council of Medical Auditors, Inc. Recertification Handbook

Certification Council of Medical Auditors, Inc. Recertification Handbook Certification Council of Medical Auditors, Inc. Recertification Handbook No part of this publication may be reproduced, transmitted, or copied by any means without the written permission of the Certification

More information

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 Cybersecurity Questions for Bank CEOs and the Board of Directors 4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors

More information

Deloitte Discovery Caribbean & Bermuda Countries Guide

Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Deloitte Discovery Caribbean & Bermuda Countries Guide Caribbean & Bermuda Countries Our Region Deloitte CBC primarily serves businesses located or

More information

Opening and Closing the Door to Medicaid. Program Integrity Joseph Kopsa, MA, JD Section Chief Program Integrity DHH HIPAA Privacy & Security Officer

Opening and Closing the Door to Medicaid. Program Integrity Joseph Kopsa, MA, JD Section Chief Program Integrity DHH HIPAA Privacy & Security Officer Opening and Closing the Door to Medicaid Program Integrity Joseph Kopsa, MA, JD Section Chief Program Integrity DHH HIPAA Privacy & Security Officer PURPOSE Assure the Programmatic and Fiscal Integrity

More information

Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification

Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification July 2016 Follow @Paul_Hastings Five Ways that Privacy Shield is Different from Safe Harbor and Five Simple Steps Companies Can Take to Prepare for Certification By Paul Hastings Global Privacy and Cybersecurity

More information

Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice

Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice Compliance With HIPAA Privacy Rule Before Security & Enforcement Rules are Final: Challenges in Practice National Audioconference Sponsored by the HIPAA Summit June 6, 2002 Chris Apgar, CISSP Data Security

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

OMIG s Certification Process: Mandatory Compliance Programs & Deficit Reduction Act of 2005

OMIG s Certification Process: Mandatory Compliance Programs & Deficit Reduction Act of 2005 OMIG s Certification Process: Mandatory Compliance Programs & Deficit Reduction Act of 2005 Webinar # 35 November 2015 November 2015 2 The Fine Print These slides are not intended to provide legal advice;

More information

ZONE PROGRAM INTEGRITY CONTRACTOR (ZPIC) TASK ORDER STATEMENT OF WORK Zone 1 - Parts A, B, DME and HH +H

ZONE PROGRAM INTEGRITY CONTRACTOR (ZPIC) TASK ORDER STATEMENT OF WORK Zone 1 - Parts A, B, DME and HH +H Attachment J.2.A Page 1 of 6 I. SCOPE ZONE PROGRAM INTEGRITY CONTRACTOR (ZPIC) TASK ORDER STATEMENT OF WORK Zone 1 - Parts A, B, DME and HH +H The ZPIC shall perform fraud, waste and abuse detection, deterrence

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

Bharath Chari Cyber Risk Sr. Manager, Deloitte & Touche LLP

Bharath Chari Cyber Risk Sr. Manager, Deloitte & Touche LLP Prioritizing & enabling internal during ERP/Cloud SaaS and other enterprise system implementations NASC Conference March 21, 2018 Introduction Moderator Presenters Jim Kennedy Senior Deputy Director of

More information

Conference for Food Protection. Standards for Accreditation of Food Protection Manager Certification Programs. Frequently Asked Questions

Conference for Food Protection. Standards for Accreditation of Food Protection Manager Certification Programs. Frequently Asked Questions Conference for Food Protection Standards for Accreditation of Food Protection Manager Certification Programs Frequently Asked Questions Q. What was the primary purpose for the Conference for Food Protection

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

OpenText Buys Guidance Software

OpenText Buys Guidance Software OpenText Buys Guidance Software September 14, 2017 NASDAQ: OTEX TSX: OTEX Safe Harbor Statement Certain statements in this presentation, including statements regarding OpenText's plans, objectives, expectations

More information

From Dabbling to Doing The Age of the Intuitive Enterprise

From Dabbling to Doing The Age of the Intuitive Enterprise GMA Executive Forum From Dabbling to Doing The Age of the Intuitive Enterprise The Clorox Company Unilever Deloitte Consulting LLP please welcome our panelists Frank Tataseo EVP, New Business Development

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview

PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS. Overview Overview PRODUCT SAFETY PROFESSIONAL CERTIFICATION PROGRAM DETAILS The Product Safety Professional Certification Program at the Richard A. Chaifetz School of Business focuses on the theoretical as well

More information

The value of visibility. Cybersecurity risk management examination

The value of visibility. Cybersecurity risk management examination The value of visibility Cybersecurity risk management examination Welcome to the "new normal" Cyberattacks are inevitable. In fact, it s no longer a question of if a breach will occur but when. Cybercriminals

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

2.1. Scope of environmental site assessment

2.1. Scope of environmental site assessment 1. PURPOSE AND SCOPE This document contains the criteria used by the Québec Association of Environmental Auditors (QAEA) to determine whether a person may obtain the title of certified environmental site

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

CYBER RISK MANAGEMENT

CYBER RISK MANAGEMENT CYBER RISK MANAGEMENT AND BEST PRACTICES Heather Fields, JD, CHC, CCEP (414) 298-8166 hfields@reinhartlaw.com 1000 North Water Street, Suite 1700, Milwaukee, WI 53202 www.reinhartlaw.com 0 Agenda Role

More information

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services When it comes to GDPR compliance, is OK for now enough? EY CertifyPoint s GDPR certification process will help you achieve and demonstrate compliance. Minds made for protecting financial services Introduction

More information

Preparing for a Breach October 14, 2016

Preparing for a Breach October 14, 2016 Preparing for a Breach October 14, 2016 Jeremy Gilbert, GCFE, GASF, EnCE, CPA Manager, DHG Forensics forensics 1 Agenda Medical data breaches Why? Types? Frequency? Impact of a data breach How to prepare

More information

2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar

2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar 2017 Ethics & Compliance Hotline & Incident Management Benchmark Report Webinar Presented by Carrie Penman Chief Compliance Officer & Senior Vice President, Advisory Services Edwin O Mara Operations Manager,

More information

Advising the C-Suite and Boards of Directors on Cybersecurity. February 11, 2015

Advising the C-Suite and Boards of Directors on Cybersecurity. February 11, 2015 Advising the C-Suite and Boards of Directors on Cybersecurity February 11, 2015 Agenda Introductions / Administrative Cybersecurity risk legal landscape Cyber threats Legal risks in the aftermath of a

More information

Incident Response and Cybersecurity: A View from the Boardroom

Incident Response and Cybersecurity: A View from the Boardroom IT, Privacy & Data Security Webinar Incident Response and Cybersecurity: A View from the Boardroom Gerard M. Stegmaier, Reed Smith Partner IT, Privacy & Data Security Samuel F. Cullari, Reed Smith Counsel

More information

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.

THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA. CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr. THE INTERNATIONAL INSTITUTE OF CERTIFIED FORENSIC ACCOUNTANTS, INC. USA CERTIFIED IN FRAUD & FORENSIC ACCOUNTING (Cr.FFa) BROCHURE Contents INTRODUCTION... 3 THE IICFA... 4 Basic Entry qualifications...

More information

The Customer Relationship:

The Customer Relationship: View the Replay on YouTube The Customer Relationship: Behind the Scenes with Managed Privacy Services September 10 th 2015 Executive Series Webinar Today s Speakers Ann Marie Harvey Privacy Manager Baptist

More information

DATA BREACH NUTS AND BOLTS

DATA BREACH NUTS AND BOLTS DATA BREACH NUTS AND BOLTS Your Company Has Been Hacked Now What? January 20, 2016 Universal City, California Sponsored by Hogan Lovells Moderator: Stephanie Yonekura, Hogan Lovells #IHCC16 Panelists:

More information

The HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion.

The HITECH Act. 5 things you can do Right Now to pave the road to compliance. 1. Secure PHI in motion. The HITECH Act 5 things you can do Right Now to pave the road to compliance Beginning in 2011, HITECH Act financial incentives will create a $5,800,000 opportunity over four years for mid-size hospital

More information

MHA Consulting BCM Metrics Resiliency Through Measurement

MHA Consulting BCM Metrics Resiliency Through Measurement 0 MHA Consulting BCM Metrics Resiliency Through Measurement Presented by: Michael Herrera, CBCP March, 2013 2009 2013 MHA MHA Consulting All All Rights Rights Reserved. Reserved. Agenda 1 Overview A Menu

More information

Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices

Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices Living with HIPAA: Compendium of Next steps from Rural Hospitals to Large Health Systems to Physician Practices Presented by HIPAA Pros 5th Annual HIPAA Summit Baltimore, Maryland October 31. 2002 Living

More information

FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions

FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions Public Sector Best Practices that Protect the Citizens against Financial Losses, Waste and Fraud Using Advanced Controls FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

DAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT

DAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT APRIL 7, 2019 David Behinfar, Chief Privacy Officer University of North Carolina Health Katherine Georger, Associate

More information