PAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016
|
|
- Millicent Pierce
- 5 years ago
- Views:
Transcription
1 Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges, Northeast Ohio Health Information Management (NOHIMA) Spring Conference, Independence, OH, May 6, 2016 State of Healthcare Security, Incident Response, Tabletop Exercise, Ohio Healthcare Security Consortium, Columbus, OH, May 5, 2016 Leveraging the Skills of an HIM Professional to help IT staff with Security, Kansas Health Information Management Association (KHIMA) Spring Meeting, Wichita, KS, April 13, 2016 Cybersecurity, Kansas Health Information Management Association (KHIMA) Spring Meeting, Wichita, KS, April 13, 2016 From the Front Lines: Healthcare Information Security Trends, Risks, and Best Practices, Cleveland Marshall College of Law: Journal of Law and Health Symposium, Cleveland, OH, April 9, 2016 Cyber Security and Privacy Protection Conference, Moderator Healthcare Perspectives Panel, Cleveland, OH, April 8, 2016 CISO for an Hour, Central Ohio Information Security Summit, Columbus, OH, March 30, 2016 PHI Protection Network, Keith Fricke -Keynote Speaker & Panel Member, Philadelphia, PA, March 17-18, 2016 Overview of Healthcare and Public Health Sector, Cleveland InfraGard Quarterly Chapter Meeting, Cleveland, OH, March 4, 2016 Cybersecurity: Time to Improve Your Posture, HIMSS- Preconference symposium, Las Vegas, NV, February 29, 2016 PAST PRESENTATIONS 2015 HIPAA Compliant What does that mean?, HIMSS Privacy & Security Forum, Boston, MA, December 1, 2015 Securing Mobile Devices and Business Data In the wild, ISACA KC Chapter, Leawood, KS, November 12, 2015
2 HIPAA Compliant Really? Are you sure?, AHIMA 2015 Privacy and Security Institute, New Orleans, LA, September 26 & 27, 2015 What Is (or should be) Keeping You Up at Night? Hot Topics in Privacy and Security, Health Care Compliance Association, Kansas City, MO, September 25, 2015 (co-presenter) Disaster Recovery and Information Security Evaluation, Central Ohio Business Resumption Association, Columbus, OH, September 17, 2015 Information Security Awareness Topics, NOHIMA Spring Conference, Cleveland, OH, May 8, 2015 What does HIPAA Compliant mean?, HIMSS15 Annual Conference, Chicago, IL, April 15, 2015 (co-presented educational session #137) Privacy and Security Workshop Navigating the Practical and Legal Aspects of HIPAA, HIMSS15 Annual Conference, Chicago, IL, April 12, 2015 (all-day workshop) Data at Rest Securing Vital Records, Spring Seminar, Kansas Capital Chapter of ARMA, Topeka, KS, April 8, 2015 How a Mock Audit can identify gaps in preparedness, American Health Information Management Association (AHIMA) webinar, February 12, 2015 PAST PRESENTATIONS 2014 Risk Analysis Risk for HIPAA and Meaningful Use, Monthly Education Meeting, Greater Kansas City Medical Managers Association (GKCMMA) Overland Park, KS, September 17, 2014 (Keynote) The BYOD Tight Rope: Balance User Demands and Your Organization s Risk Tolerance, 4th Annual HIMSS Privacy & Security Forum, Boston, MA, September 8, 2014 (Panel moderator) Information Security Risk Analysis, 2014 Audit Symposium, Federal Reserve Bank of Kansas City, Kansas City, MO, August 27, 2014 Effectively Completing and Documenting a Risk Analysis, HIPAA Collaborative of Wisconsin (HIPAA COW) 2014 Spring Conference, Stevens Point, WI, April 11, 2014 (Breakout Session) Are You Ready for an OCR Audit?, HIPAA Collaborative of Wisconsin (HIPAA COW) 2014 Spring Conference, Stevens Point, WI, April 11, 2014 (Keynote Session) An Update on Information Security: What You Need to Know, Health Information Technology and Meaningful Use Workshop, Kansas Hospital Association, Wichita, KS, January 23, 2014
3 PAST PRESENTATIONS 2013 Information Security Risk Analysis, ISSA and ISACA Joint chapter meeting, Overland Park, KS, December 12, 2013 Will you pass or fail an OCR security audit?, PDS 2013 Technology Conference, Milwaukee, WI, September 26, 2013 Managing Mobile Device Security, American Health Information Management Association (AHIMA) webinar, May 16, 2013 Impact of the Omnibus Rule on HIPAA and HITECH Compliance, MoHIMA Spring Workshop, Blue Springs, MO, April 18, 2013 Risk Analysis Nine Steps to Follow, SecureWorld Conference, Kansas City, MO, April 17, 2013 Impact of the Omnibus Rule on HIPAA and HITECH Compliance, KHIMA Spring Workshop, Junction City, KS, April 12, 2013 (Keynote speaker) Continuous HIPAA Readiness, Missouri Hospital Association, Blue Springs, MO and St. Louis, MO, March 26 and 28, 2013 (two - all day workshops) Does Your Information Security Program Measure Up?, HIMSS13 Annual Conference, New Orleans, LA, March 5, 2013 (co-presented educational session #74) Privacy and Security Workshop Preparing for an OCR Audit, HIMSS13 Annual Conference, New Orleans, LA, March 3, 2013 (all-day workshop) Information Security: Audits, Risks and Meaningful Use, Kansas Hospital Association webinar/podcast, February 13, 2013 PAST PRESENTATIONS 2012 Advanced Mobile Device Management, American Health Information Management Association (AHIMA), Privacy & Security Institute, September 29, 2012 Risk Analysis Workshop, Workshop, Kansas Hospital Association, Salina, KS, September 11, 2012 Risk Analysis, Hawaii Primary Care Association (HPCA) Annual Conference, Honolulu, Hawaii August 23, 2012 Health Information Technology (HIT) Security, HPCA Annual Conference, Honolulu, Hawaii August 23, 2012 Risk Analysis Workshop, Health Information Security Conference, Kansas Hospital Association, Wichita, KS, April 27, 2012 Privacy and Security Workshop: Seven Indicators for Determining Whether Your Information Security Program is Real or Fantasy, HIMSS Annual Conference, Las Vegas, NV, February 20, 2012 (all-day workshop)
4 Risk Analysis Workshop, Alabama Regional Extension Center (ALREC), Huntsville, AL, January 11, 2012 and Birmingham, AL January 12, 2012 PAST PRESENTATIONS 2011 Risk Analysis Workshop, Alabama Regional Extension Center (ALREC), Mobile, AL, December 8, 2011 Breach Analysis Case Study Determining Root Cause, Response & Prevention Techniques, Kansas Health Information Management Association, Manhattan, KS, September 20, 2011 Disaster Recover Maintaining High Availability & Resiliency in Healthcare, Kansas Health Information Management Association, Manhattan, KS, September 20, 2011 PCI: What Healthcare Organizations Need to Know, Information Security Media Group Webinar, May 16, 2011 Risk Analysis Workshop, Health Information Security Conference, Kansas Hospital Association, Wichita, KS, May 5, 2011 Privacy and Security Workshop, Life in the Fast Lane Privacy and Security in the Age of the Electronic Health Record, HIMSS Annual Conference, Orlando, FL, February 20, 2011 (all-day workshop) HITECH Tips: Using EHR Security Functions for Protecting Patient Information, Information Security Media Group Webinar, January 17, 2011 PAST PRESENTATIONS 2010 Writing Proper Policies and Procedures, Kansas Chapter of HIMSS Conference, Salina, KS, October 8, 2010 Five Things a Privacy Officer Needs to Know About Security for HITECH, Missouri/Kansas Health Information Management Associations Conference, Kansas City, MO, September 17, 2010 HIPAA Modifications and HITECH Rules: A Guide to the Security Essentials, Information Security Media Group Webinar, August 2010 HITECH Update: Privacy and Security Enforcement, Part 1, American Health Information Management Association (AHIMA) Webinar, June 23, 2010 Auditing for Privacy and Security Compliance, American Health Information Management Association (AHIMA) webinar, August 26, 2010 ARRA Privacy and Security Workshop, HIMSS Annual Conference, Atlanta, GA, February 28, 2010 (all-day workshop)
5 PAST PRESENTATIONS 2009 ARRA Changes to Healthcare Privacy and Security, KHIMA Conference, Wichita, KS, September 17, 2009 (Keynote presentation) Staying out of the headlines and what to do, just in case..., KHIMA Conference, Wichita, KS, September 17, 2009 Auditing for Privacy and Security Compliance, American Health Information Management Association (AHIMA) webinar, June 23, 2009 The Years in Review, DOE Cyber Security Conference, Henderson, NV, May 14, 2009 (closing keynote) Presentation Skills for Information Security Professionals, DOE Cyber Security Conference, Henderson, NV, May 13, 2009 Information Security: The Next Level, HIMSS Annual Conference, Chicago, IL, April 4, 2009 (allday workshop) Disaster Recovery Costs and Impacts on Healthcare Operations, HIPAA COW, Green Bay, WI, April 3, 2009 Security and Privacy Requirements Beyond HIPAA, HIPAA COW, Green Bay, WI, April 3, 2009 (Keynote presentation) Presentation Skills for Information Security Professionals, InfoSec World Annual Conference hosted by MIS Training Institute, Orlando, FL, March 9, 2009 Making Information Security A Business Process, InfoSec World Annual Conference hosted by MIS Training Institute, Orlando, FL, March 9, 2009 Aligning the Generations, CISO Executive Summit hosted by MIS Training Institute, Orlando, FL, March 8, 2009 (panel discussion)
Ensuring Privacy and Security of Health Information Exchange in Pennsylvania
Ensuring Privacy and Security of Health Information Exchange in Pennsylvania The Pennsylvania ehealth Initiative in collaboration with the Pennsylvania ehealth Partnership Authority Introduction The Pennsylvania
More informationUpdate from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013
Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S
More informationAll Aboard the HIPAA Omnibus An Auditor s Perspective
All Aboard the HIPAA Omnibus An Auditor s Perspective Rick Dakin CEO & Chief Security Strategist February 20, 2013 1 Agenda Healthcare Security Regulations A Look Back What is the final Omnibus Rule? Changes
More informationA HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP,
A HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP, JD Director, HHS Office for Civil Rights Nicholas Heesters,
More informationInformation Governance, the Next Evolution of Privacy and Security
Information Governance, the Next Evolution of Privacy and Security Katherine Downing, MA, RHIA, CHPS, PMP Sr. Director AHIMA IG Advisors Follow me @HIPAAQueen 2017 2017 Objectives Part Part I IG Topic
More informationAgenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute
Health Law Institute Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More Brooke Bennett Aziere October 18, 2017 Agenda Enforcement Trends Phase 2 HIPAA Audits Upcoming Initiatives 1 Enforcement
More informationDeveloping Your Records Retention Schedule: It s Bigger Than Just Health Records
Developing Your Records Retention Schedule: It s Bigger Than Just Health Records Webinar August 11, 2009 Copyright 2009 American Health Information Management Association. All rights reserved. Disclaimer
More informationInside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.
Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization
More informationHIPAA-HITECH: Privacy & Security Updates for 2015
South Atlantic Regional Annual Conference Orlando, FL February 6, 2015 1 HIPAA-HITECH: Privacy & Security Updates for 2015 Darrell W. Contreras, Esq., LHRM Gregory V. Kerr, CHPC, CHC Agenda 2 OCR On-Site
More informationPennsylvania s HIE Journey
Pennsylvania s HIE Journey Alix Goss, Executive Director Pennsylvania ehealth Partnership Authority William Buddy Gillespie Director Healthcare Solutions DSS What is HIE? Health Information Exchange puts
More informationStandards and Procedures Alaska Medicaid
Standards and Procedures Written Policies Start with the Rule How will you comply Procedures Reflect what you are doing Include appropriate operational departments Will need to revise regularly annually
More informationStandards and Procedures Alaska Medicaid 2/24/2017. Written Policies. Procedures
Standards and Procedures Written Policies Start with the Rule How will you comply Procedures Reflect what you are doing Include appropriate operational departments Will need to revise regularly annually
More informationLegal Disclaimer. Copyright Notice
Legal Disclaimer Although the information provided by Clearwater Compliance may be helpful in informing customers and others who have an interest in data privacy and security issues, it does not constitute
More informationHCISPP HealthCare Information Security and Privacy Practitioner
HCISPP HealthCare Information Security and Privacy Practitioner William Buddy Gillespie, HCISPP Global Academic Instructor (ISC)² Former Healthcare CIO Chair Advocacy Committee, CPAHIMSS budgill@aol.com
More informationPutting It All Together:
Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,
More informationOperationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results
Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec
More informationHIPAA Compliance is not a Cybersecurity Strategy
HIPAA Compliance is not a Cybersecurity Strategy Presented by: Hector Rodriguez, WW Health CISO, Microsoft Jay Trinckes, Director, Coalfire Speaker Introductions Hector Rodriguez, WW Health CISO, Microsoft
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationHIPAA Security: What Everyone Should Know
HIPAA Security: What Everyone Should Know Webinar January 17, 2008 Practical Tools for Seminar Learning Copyright 2008 American Health Information Management Association. All rights reserved. Disclaimer
More informationUpdate on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules
Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Marissa Gordon-Nguyen Office for Civil Rights (OCR) U.S. Department of Health and Human Services June
More informationThe ABCs of HIPAA Security
The ABCs of HIPAA Security Daniel F. Shay, Esq 24 th Annual Health Law Institute Pennsylvania Bar Institute March 13, 2018 c. 2018 Alice G. Gosfield and Associates PC 1 Daniel F. Shay, Esq. Alice G. Gosfield
More informationSANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.
SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes
More informationJourney to HIMSS18: Privacy, Security and Cybersecurity
Journey to HIMSS18: Privacy, Security and Cybersecurity Thompson H. Boyd, III, M.D., FHIMSS, FACHE, FABQAURP, CPHIMS, CHCQM Medical Director of Informatics Hahnemann University Hospital Today s Speaker
More informationARRA State & Local Energy Assurance Planning & Implementation
State Energy Policy and Technology Outlook Conference February 2, 2010, Washington, DC ARRA State & Local Energy Assurance Planning & Implementation Alice Lippert Senior Technical Advisor Office of Electricity
More informationData Privacy & Protection
Data Privacy & Protection March 10, 2016 Data Breach Notification and Cybersecurity Developments in 2016 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy Professional/US This
More informationMemphis Chapter. President s Message. This annual event is designed to provide students with a
Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students
More informationEstablishing a Credible Cybersecurity Program. September 2016
Establishing a Credible Cybersecurity Program September 2016 Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP) Member FBI InfraGard AFTERNOON PLENARY SESSION AGENDA Cyber Risk = Disruptive Business Risk Breaches:
More information2017 Sponsorship Opportunities
2017 Sponsorship Opportunities Access Education Networking A Better You. A Best Practice. Sponsorships with MGMA of Greater St. Louis Your sponsorship helps to support education, professional development
More informationOffice of Indian Energy Policy and Programs
DOE OFFICE OF INDIAN ENERGY Office of Indian Energy Policy and Programs NETWIG January 2016 Sarai Geary, Program Manager, Office of Indian Energy Office of Indian Energy Policy and Programs MISSION To
More informationHIPAA Privacy, Security Lessons from 2016 and What's Next in 2017
HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017 Session 9, February 20, 2017 Deven McGraw, Deputy Director, Health Information Privacy HHS Office for Civil Rights 1 Speaker Introduction
More informationHIPAA Privacy, Security and Breach Notification
HIPAA Privacy, Security and Breach Notification HCCA East Central Regional Annual Conference October 2013 Disclaimer The information contained in this document is provided by KPMG LLP for general guidance
More informationPrint and Online Editorial Calendar
January 2014 Ad close: 12/2/13 Materials due: 12/5/13 Campus Security & Life Safety Mobile Apps Security Locks, Doors, and Hardware ID Cards Municipal Security Video Surveillance Locks FETC, Jan. 28-31,
More informationBalancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld
Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice
More informationThe HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance
The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal
More informationThe Customer Relationship:
View the Replay on YouTube The Customer Relationship: Behind the Scenes with Managed Privacy Services September 10 th 2015 Executive Series Webinar Today s Speakers Ann Marie Harvey Privacy Manager Baptist
More informationIs Your Compliance Strategy Putting Your Business at Risk?
Is Your Compliance Strategy Putting Your Business at Risk? January 20, 2015 2015 NASDAQ-LISTED: EGHT Today s Speakers Michael McAlpen Exec. Dir. of Security & Compliance, 8x8, Inc. David Leach Business
More informationDocument Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee
0 Document Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee Co-Chairs: Walter G. Suarez, MD, Institute for HIPAA/HIT Education
More informationIncident Response Plans: The Emergency Shutoff Control for Cyber Risk. Tabitha Greiner, Acumera Chris Lietz, Coalfire
Incident Response Plans: The Emergency Shutoff Control for Cyber Risk Tabitha Greiner, Acumera Chris Lietz, Coalfire Housekeeping Presenters About Conexxus Presentation Q & A Agenda Housekeeping This webinar
More informationHIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017
HIPAA How to Comply with Limited Time & Resources Jonathan Pantenburg, MHA, Senior Consultant JPantenburg@Stroudwater.com August 17, 2017 Stroudwater Associates is a leading national healthcare consulting
More informationMohammad Shahadat Hossain
Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network
More informationClearwater HIPAA Security Assessment Software. Demonstration
Clearwater HIPAA Security Assessment Software Demonstration Bob Chaput 615-656-4299 or 800-704-3394 bob.chaput@clearwatercompliance.com Clearwater Compliance LLC 1 About HIPAA-HITECH Compliance 1. We are
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationHIMSS 15 Doing Better Business in the Era of Data Security and Privacy
HIMSS 15 Doing Better Business in the Era of Data Security and Privacy Michael D. Stovsky, Esq. Partner and Chair, Innovations, Information Technology and IP Group Cleveland Columbus Indianapolis Philadelphia
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions
More informationHealthcare HIPAA and Cybersecurity Update
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity
More informationB.2 Measures of Central Tendency and Dispersion
Appendix B. Measures of Central Tendency and Dispersion B B. Measures of Central Tendency and Dispersion What you should learn Find and interpret the mean, median, and mode of a set of data. Determine
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationTechnology General Controls and HIPAA Security Compliance: Covering the Bandwidth in One Audit
Technology General Controls and HIPAA Security Compliance: Covering the Bandwidth in One Audit Michael Morrow, Jennifer McGillCompany Carolinas Healthcare System 2011 AHIA Annual Conference Track D1 Wednesday,
More informationWHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty
WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty By Jill Brooks, MD, CHCO and Katelyn Byrne, BSN, RN Data Breaches
More informationApplying ISO and NIST to Address Compliance Mandates The Four Laws of Information Security
Applying ISO 27000 and NIST to Address Compliance Mandates The Four Laws of Information Security Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP) ecfirst, chief executive Member, FBI InfraGard Challenges PHI Is
More informationCURRICULUM VITA. Richard E. Biehl, Ph.D.
CURRICULUM VITA Richard E. Biehl, Ph.D. Lecturer Department of Industrial Engineering and Management Systems College of Engineering & Computer Science University of Central Florida 12800 Pegasus Dr., Orlando,
More informationHOW TO BE AN EFFECTIVE CYBERSECURITY LEADER IN HEALTHCARE
HOW TO BE AN EFFECTIVE CYBERSECURITY LEADER IN HEALTHCARE Session CYB1, March 5, 2018 Karl J. West, CISO & AVP Intermountain Healthcare Erik Decker, CPSO The University of Chicago Medicine 1 Conflict of
More informationDeveloping Consistency in ITS Safety Solutions: Intersection Conflict Warning Systems E N T E R P R I S E
Developing Consistency in ITS Safety Solutions: Intersection Conflict Warning Systems E N T E R P R I S E ITS Canada 2012 Annual Conference and General Meeting June 13, 2012 Agenda Intersection Conflict
More informationAltius IT Policy Collection Compliance and Standards Matrix
Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions
More informationHIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance
HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group 4401 South Quebec Street, #100 Denver, CO 80237 (303) 488-9911
More informationIU Alumni Association Membership Statistics
IU Alumni Association Membership Statistics Paid Members Membership Type Jun-2017 Jun-2018 Annual 11,213 8,754 Auto-Renewal 733 1,614 Life 44,597 45,355 June 30 - Fiscal Year 2018 Year To Date vs. Fiscal
More informationHealthcare Security Professional Roundtable. The Eighth National HIPAA Summit Monday, March 8, 2004
1 Healthcare Security Professional Roundtable The Eighth National HIPAA Summit Monday, March 8, 2004 Panelists John Parmigiani, Sr.VP for Consulting Services, QuickCompliance, Inc.; President, John C.
More informationThe Next Frontier in Medical Device Security
The Next Frontier in Medical Device Security Session #76, February 21, 2017 Denise Anderson, President, NH-ISAC Dr. Dale Nordenberg, Executive Director, MDISS 1 Speaker Introduction Denise Anderson, MBA
More informationHIPAA 2017 Compliancy Group, LLC
1 Meet Your Expert Charles Weiselberg Compliancy Group, LLC Director of Customer Service Chuck@compliancygroup.com ENDORSED PARTNER 2 Compliancy Group We simplify compliance so you can confidently focus
More informationEnergy Benchmarking Commercial Buildings. Cities that support or require energy benchmarking of commercial buildings
Energy Benchmarking Commercial Buildings Cities that support or require energy benchmarking of commercial buildings Large Cities (250,000+ people) Madison WI 250,000 We are working on a voluntary program.
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationHIPAA Audit Don t just bet the odds Good luck is a residue of preparation. Jack Youngblood
HIPAA Audit Don t just bet the odds Good luck is a residue of preparation. Jack Youngblood Braun Tacon Process Architect / Auditor Owner: www.majorincidenthandling.com Winning Lotto.1 in 175 Million Attacked
More informationWhy you should adopt the NIST Cybersecurity Framework
Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive
More informationDocument Number: HITSP 08 N 378 Date: December 17, 2008 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee
0 Document Number: HITSP 08 N 378 Date: December 17, 2008 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee Co-Chairs: Walter G. Suarez, MD, Institute for HIPAA/HIT Education
More informationCYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017
CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November
More informationDAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT
P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT APRIL 7, 2019 David Behinfar, Chief Privacy Officer University of North Carolina Health Katherine Georger, Associate
More informationFrom the Trenches: Lessons learned from using the NIST Cybersecurity Framework
From the Trenches: Lessons learned from using the NIST Cybersecurity Framework Greg Witte Sr. Cybersecurity Engineer G2, Inc. Greg.Witte@G2-inc.com Tom Conkle Cybersecurity Engineer G2, Inc. Tom.Conkle@G2-inc.com
More informationThe Massachusetts Health
HST.921 / HST.922 Information Technology in the Health Care System of the Future, Spring 2009 Harvard-MIT Division of Health Sciences and Technology Course Directors: Dr. Steven Locke, Dr. Bryan Bergeron,
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationArt of Performing Risk Assessments
Clinical Practice Compliance Conference Art of Performing Risk Assessments October 2016 Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP) Member FBI InfraGard AGENDA Cyber Risk = Disruptive Business Risk Breaches:
More informationIntroduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst
Introduction Angela Holzworth, RHIA, CISA, GSEC Sr. IT Infrastructure Analyst Kimberly Gray, Esq., CIPP/US Chief Privacy Officer, Global, IMS Health 1 Incorporating Privacy into the CSF: Approach and Benefits
More informationDefensible Security DefSec 101
Defensible Security DefSec 101 Security Day November 2017 Information Security Branch Paul Falohun Senior Security Analyst Dan Lathigee Senior Project Manager Content 1 Introduction 2 DefSec for PSO 3
More informationHIPAA For Assisted Living WALA iii
Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationHIPAA 101: What All Doctors NEED To Know
HIPAA 101: What All Doctors NEED To Know 1 HIPAA Basics HIPAA: Health Insurance and Portability Accountability Act of 1996 Purpose: to protect confidential information through improved security and privacy
More informationA New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO
A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationHospital Council of Western Pennsylvania. June 21, 2012
Updates on OCR s HIPAA Enforcement and Regulations Hospital Council of Western Pennsylvania June 21, 2012 Topics HIPAA Privacy and Security Rule Enforcement HITECH Breach Notification OCR Audit Program
More informationThe Role of IT in HIPAA Security & Compliance
The Role of IT in HIPAA Security & Compliance Mario Cruz OFMQ Chief Information Officer For audio, you must use your phone: Step 1: Call (866) 906-0123. Step 2: Enter code 2071585#. Mario Cruz Mario Cruz
More informationIU Alumni Association Membership Statistics
IU Alumni Association Membership Statistics Paid Members Membership Type Jun-2017 Mar-2018 Annual 11,213 9,517 Auto-Renewal 733 1,466 Life 44,597 45,145 Total 56,543 56,128 70,000 65,000 60,000 55,000
More informationIT in Healthcare Day
San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596
More informationThis webinar requires that you utilize the integrated audio functions (your computer speakers or headphones); there is no dial-in number.
CSOHIMSS Lunch & Learn Webinar The Good, the Bad, and the Ugly of Data Analytics Presented By: Albert Lai, PHD from Dept of Biomedical Informatics, The Ohio State University The webinar will begin promptly
More informationHealthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002
Healthcare Information and Management Systems Society HIMSS U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002 HIMSS / Phoenix Health Systems Healthcare Industry Quarterly
More informationHealth Care: Privacy & Security in a Digital Age
Health Care: Privacy & Security in a Digital Age HIPAA Summit West Data Security Mini Summit March 14, 2002 Chris Apgar, Data Security & HIPAA Compliance Officer Providence Health Plans 1 Presentation
More informationHIPAA Compliance Strategies for IPAs and Medical Groups
HIPAA Compliance Strategies for IPAs and Medical Groups A. John Blair, III, MD Chairman and Chief Executive Officer Taconic IPA, Inc. Fishkill, NY Background Practicing Physician 15 years Revenue Reductions
More informationHIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp
HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp Agenda Introductions HIPAA Background and History Overview of HIPAA Requirements
More informationManTech Advanced Systems International 2018 Security Training Schedule
ManTech Advanced Systems International 2018 Security Training Schedule Risk Management Framework Course Dates Course Location Course Cost February 12 15, 2018 Las Vegas, NV $1,950.00 March 12 15, 2018
More informationCompliant. Secure. Dependable.
NAVIFY Cloud Security with the NAVIFY Tumor Board solution Compliant. Secure. Dependable. Trust that your oncology patients healthcare information stays protected. In the era of precision medicine, you
More informationData Backup and Contingency Planning Procedure
HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationHow to Become a CMA (Certified Management Accountant) May 10, 2017
How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements
More informationDisclaimer Ground Rules
Critical Success Factors in a Complex BCP Development Environment Don Groth Disclaimer Ground Rules The views and opinions expressed today do not necessarily reflect the position of Froedtert and Community
More informationSANS Vendor Offerings Detail
SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking
More information2018 CALENDAR OF ACTIVITIES
2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals
More informationMayra D. Portalatin, RS, SFP, LEED AP O+M Senior Professional
Mayra D. Portalatin, RS, SFP, LEED AP O+M Senior Professional Years with FEA: 9 Total years of experience: 16 Education: Bachelor of Science / Civil & Environmental Engineering / University of Michigan
More informationNew York DFS Cybersecurity Regulation:
New York DFS Cybersecurity Regulation: Countdown to the August 28 Compliance Deadline Presented by: Craig Hoffman, Melinda McLellan & Jonathan Forman Moderated by: Carol Van Cleef July 27, 2017 Craig A.
More informationMission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS
Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber
More informationEngaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,
Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev
More informationMastering Data Privacy, Social Media, & Cyber Law
Mastering Data Privacy, Social Media, & Cyber Law Data Breach Notification and Cybersecurity Developments Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy Professional/US 1 State
More information