PAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016

Size: px
Start display at page:

Download "PAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016"

Transcription

1 Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges, Northeast Ohio Health Information Management (NOHIMA) Spring Conference, Independence, OH, May 6, 2016 State of Healthcare Security, Incident Response, Tabletop Exercise, Ohio Healthcare Security Consortium, Columbus, OH, May 5, 2016 Leveraging the Skills of an HIM Professional to help IT staff with Security, Kansas Health Information Management Association (KHIMA) Spring Meeting, Wichita, KS, April 13, 2016 Cybersecurity, Kansas Health Information Management Association (KHIMA) Spring Meeting, Wichita, KS, April 13, 2016 From the Front Lines: Healthcare Information Security Trends, Risks, and Best Practices, Cleveland Marshall College of Law: Journal of Law and Health Symposium, Cleveland, OH, April 9, 2016 Cyber Security and Privacy Protection Conference, Moderator Healthcare Perspectives Panel, Cleveland, OH, April 8, 2016 CISO for an Hour, Central Ohio Information Security Summit, Columbus, OH, March 30, 2016 PHI Protection Network, Keith Fricke -Keynote Speaker & Panel Member, Philadelphia, PA, March 17-18, 2016 Overview of Healthcare and Public Health Sector, Cleveland InfraGard Quarterly Chapter Meeting, Cleveland, OH, March 4, 2016 Cybersecurity: Time to Improve Your Posture, HIMSS- Preconference symposium, Las Vegas, NV, February 29, 2016 PAST PRESENTATIONS 2015 HIPAA Compliant What does that mean?, HIMSS Privacy & Security Forum, Boston, MA, December 1, 2015 Securing Mobile Devices and Business Data In the wild, ISACA KC Chapter, Leawood, KS, November 12, 2015

2 HIPAA Compliant Really? Are you sure?, AHIMA 2015 Privacy and Security Institute, New Orleans, LA, September 26 & 27, 2015 What Is (or should be) Keeping You Up at Night? Hot Topics in Privacy and Security, Health Care Compliance Association, Kansas City, MO, September 25, 2015 (co-presenter) Disaster Recovery and Information Security Evaluation, Central Ohio Business Resumption Association, Columbus, OH, September 17, 2015 Information Security Awareness Topics, NOHIMA Spring Conference, Cleveland, OH, May 8, 2015 What does HIPAA Compliant mean?, HIMSS15 Annual Conference, Chicago, IL, April 15, 2015 (co-presented educational session #137) Privacy and Security Workshop Navigating the Practical and Legal Aspects of HIPAA, HIMSS15 Annual Conference, Chicago, IL, April 12, 2015 (all-day workshop) Data at Rest Securing Vital Records, Spring Seminar, Kansas Capital Chapter of ARMA, Topeka, KS, April 8, 2015 How a Mock Audit can identify gaps in preparedness, American Health Information Management Association (AHIMA) webinar, February 12, 2015 PAST PRESENTATIONS 2014 Risk Analysis Risk for HIPAA and Meaningful Use, Monthly Education Meeting, Greater Kansas City Medical Managers Association (GKCMMA) Overland Park, KS, September 17, 2014 (Keynote) The BYOD Tight Rope: Balance User Demands and Your Organization s Risk Tolerance, 4th Annual HIMSS Privacy & Security Forum, Boston, MA, September 8, 2014 (Panel moderator) Information Security Risk Analysis, 2014 Audit Symposium, Federal Reserve Bank of Kansas City, Kansas City, MO, August 27, 2014 Effectively Completing and Documenting a Risk Analysis, HIPAA Collaborative of Wisconsin (HIPAA COW) 2014 Spring Conference, Stevens Point, WI, April 11, 2014 (Breakout Session) Are You Ready for an OCR Audit?, HIPAA Collaborative of Wisconsin (HIPAA COW) 2014 Spring Conference, Stevens Point, WI, April 11, 2014 (Keynote Session) An Update on Information Security: What You Need to Know, Health Information Technology and Meaningful Use Workshop, Kansas Hospital Association, Wichita, KS, January 23, 2014

3 PAST PRESENTATIONS 2013 Information Security Risk Analysis, ISSA and ISACA Joint chapter meeting, Overland Park, KS, December 12, 2013 Will you pass or fail an OCR security audit?, PDS 2013 Technology Conference, Milwaukee, WI, September 26, 2013 Managing Mobile Device Security, American Health Information Management Association (AHIMA) webinar, May 16, 2013 Impact of the Omnibus Rule on HIPAA and HITECH Compliance, MoHIMA Spring Workshop, Blue Springs, MO, April 18, 2013 Risk Analysis Nine Steps to Follow, SecureWorld Conference, Kansas City, MO, April 17, 2013 Impact of the Omnibus Rule on HIPAA and HITECH Compliance, KHIMA Spring Workshop, Junction City, KS, April 12, 2013 (Keynote speaker) Continuous HIPAA Readiness, Missouri Hospital Association, Blue Springs, MO and St. Louis, MO, March 26 and 28, 2013 (two - all day workshops) Does Your Information Security Program Measure Up?, HIMSS13 Annual Conference, New Orleans, LA, March 5, 2013 (co-presented educational session #74) Privacy and Security Workshop Preparing for an OCR Audit, HIMSS13 Annual Conference, New Orleans, LA, March 3, 2013 (all-day workshop) Information Security: Audits, Risks and Meaningful Use, Kansas Hospital Association webinar/podcast, February 13, 2013 PAST PRESENTATIONS 2012 Advanced Mobile Device Management, American Health Information Management Association (AHIMA), Privacy & Security Institute, September 29, 2012 Risk Analysis Workshop, Workshop, Kansas Hospital Association, Salina, KS, September 11, 2012 Risk Analysis, Hawaii Primary Care Association (HPCA) Annual Conference, Honolulu, Hawaii August 23, 2012 Health Information Technology (HIT) Security, HPCA Annual Conference, Honolulu, Hawaii August 23, 2012 Risk Analysis Workshop, Health Information Security Conference, Kansas Hospital Association, Wichita, KS, April 27, 2012 Privacy and Security Workshop: Seven Indicators for Determining Whether Your Information Security Program is Real or Fantasy, HIMSS Annual Conference, Las Vegas, NV, February 20, 2012 (all-day workshop)

4 Risk Analysis Workshop, Alabama Regional Extension Center (ALREC), Huntsville, AL, January 11, 2012 and Birmingham, AL January 12, 2012 PAST PRESENTATIONS 2011 Risk Analysis Workshop, Alabama Regional Extension Center (ALREC), Mobile, AL, December 8, 2011 Breach Analysis Case Study Determining Root Cause, Response & Prevention Techniques, Kansas Health Information Management Association, Manhattan, KS, September 20, 2011 Disaster Recover Maintaining High Availability & Resiliency in Healthcare, Kansas Health Information Management Association, Manhattan, KS, September 20, 2011 PCI: What Healthcare Organizations Need to Know, Information Security Media Group Webinar, May 16, 2011 Risk Analysis Workshop, Health Information Security Conference, Kansas Hospital Association, Wichita, KS, May 5, 2011 Privacy and Security Workshop, Life in the Fast Lane Privacy and Security in the Age of the Electronic Health Record, HIMSS Annual Conference, Orlando, FL, February 20, 2011 (all-day workshop) HITECH Tips: Using EHR Security Functions for Protecting Patient Information, Information Security Media Group Webinar, January 17, 2011 PAST PRESENTATIONS 2010 Writing Proper Policies and Procedures, Kansas Chapter of HIMSS Conference, Salina, KS, October 8, 2010 Five Things a Privacy Officer Needs to Know About Security for HITECH, Missouri/Kansas Health Information Management Associations Conference, Kansas City, MO, September 17, 2010 HIPAA Modifications and HITECH Rules: A Guide to the Security Essentials, Information Security Media Group Webinar, August 2010 HITECH Update: Privacy and Security Enforcement, Part 1, American Health Information Management Association (AHIMA) Webinar, June 23, 2010 Auditing for Privacy and Security Compliance, American Health Information Management Association (AHIMA) webinar, August 26, 2010 ARRA Privacy and Security Workshop, HIMSS Annual Conference, Atlanta, GA, February 28, 2010 (all-day workshop)

5 PAST PRESENTATIONS 2009 ARRA Changes to Healthcare Privacy and Security, KHIMA Conference, Wichita, KS, September 17, 2009 (Keynote presentation) Staying out of the headlines and what to do, just in case..., KHIMA Conference, Wichita, KS, September 17, 2009 Auditing for Privacy and Security Compliance, American Health Information Management Association (AHIMA) webinar, June 23, 2009 The Years in Review, DOE Cyber Security Conference, Henderson, NV, May 14, 2009 (closing keynote) Presentation Skills for Information Security Professionals, DOE Cyber Security Conference, Henderson, NV, May 13, 2009 Information Security: The Next Level, HIMSS Annual Conference, Chicago, IL, April 4, 2009 (allday workshop) Disaster Recovery Costs and Impacts on Healthcare Operations, HIPAA COW, Green Bay, WI, April 3, 2009 Security and Privacy Requirements Beyond HIPAA, HIPAA COW, Green Bay, WI, April 3, 2009 (Keynote presentation) Presentation Skills for Information Security Professionals, InfoSec World Annual Conference hosted by MIS Training Institute, Orlando, FL, March 9, 2009 Making Information Security A Business Process, InfoSec World Annual Conference hosted by MIS Training Institute, Orlando, FL, March 9, 2009 Aligning the Generations, CISO Executive Summit hosted by MIS Training Institute, Orlando, FL, March 8, 2009 (panel discussion)

Ensuring Privacy and Security of Health Information Exchange in Pennsylvania

Ensuring Privacy and Security of Health Information Exchange in Pennsylvania Ensuring Privacy and Security of Health Information Exchange in Pennsylvania The Pennsylvania ehealth Initiative in collaboration with the Pennsylvania ehealth Partnership Authority Introduction The Pennsylvania

More information

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013 Update from HIMSS National Privacy & Security Lisa Gallagher, VP Technology Solutions November 14, 2013 Agenda Update on HIMSS new Technology Solutions Department HIPAA Omnibus Rules Meaningful Use 2 P&S

More information

All Aboard the HIPAA Omnibus An Auditor s Perspective

All Aboard the HIPAA Omnibus An Auditor s Perspective All Aboard the HIPAA Omnibus An Auditor s Perspective Rick Dakin CEO & Chief Security Strategist February 20, 2013 1 Agenda Healthcare Security Regulations A Look Back What is the final Omnibus Rule? Changes

More information

A HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP,

A HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP, A HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP, JD Director, HHS Office for Civil Rights Nicholas Heesters,

More information

Information Governance, the Next Evolution of Privacy and Security

Information Governance, the Next Evolution of Privacy and Security Information Governance, the Next Evolution of Privacy and Security Katherine Downing, MA, RHIA, CHPS, PMP Sr. Director AHIMA IG Advisors Follow me @HIPAAQueen 2017 2017 Objectives Part Part I IG Topic

More information

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute Health Law Institute Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More Brooke Bennett Aziere October 18, 2017 Agenda Enforcement Trends Phase 2 HIPAA Audits Upcoming Initiatives 1 Enforcement

More information

Developing Your Records Retention Schedule: It s Bigger Than Just Health Records

Developing Your Records Retention Schedule: It s Bigger Than Just Health Records Developing Your Records Retention Schedule: It s Bigger Than Just Health Records Webinar August 11, 2009 Copyright 2009 American Health Information Management Association. All rights reserved. Disclaimer

More information

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D. HIPAA GENERAL RULE PHI may not be disclosed without patient authorization

More information

HIPAA-HITECH: Privacy & Security Updates for 2015

HIPAA-HITECH: Privacy & Security Updates for 2015 South Atlantic Regional Annual Conference Orlando, FL February 6, 2015 1 HIPAA-HITECH: Privacy & Security Updates for 2015 Darrell W. Contreras, Esq., LHRM Gregory V. Kerr, CHPC, CHC Agenda 2 OCR On-Site

More information

Pennsylvania s HIE Journey

Pennsylvania s HIE Journey Pennsylvania s HIE Journey Alix Goss, Executive Director Pennsylvania ehealth Partnership Authority William Buddy Gillespie Director Healthcare Solutions DSS What is HIE? Health Information Exchange puts

More information

Standards and Procedures Alaska Medicaid

Standards and Procedures Alaska Medicaid Standards and Procedures Written Policies Start with the Rule How will you comply Procedures Reflect what you are doing Include appropriate operational departments Will need to revise regularly annually

More information

Standards and Procedures Alaska Medicaid 2/24/2017. Written Policies. Procedures

Standards and Procedures Alaska Medicaid 2/24/2017. Written Policies. Procedures Standards and Procedures Written Policies Start with the Rule How will you comply Procedures Reflect what you are doing Include appropriate operational departments Will need to revise regularly annually

More information

Legal Disclaimer. Copyright Notice

Legal Disclaimer. Copyright Notice Legal Disclaimer Although the information provided by Clearwater Compliance may be helpful in informing customers and others who have an interest in data privacy and security issues, it does not constitute

More information

HCISPP HealthCare Information Security and Privacy Practitioner

HCISPP HealthCare Information Security and Privacy Practitioner HCISPP HealthCare Information Security and Privacy Practitioner William Buddy Gillespie, HCISPP Global Academic Instructor (ISC)² Former Healthcare CIO Chair Advocacy Committee, CPAHIMSS budgill@aol.com

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec

More information

HIPAA Compliance is not a Cybersecurity Strategy

HIPAA Compliance is not a Cybersecurity Strategy HIPAA Compliance is not a Cybersecurity Strategy Presented by: Hector Rodriguez, WW Health CISO, Microsoft Jay Trinckes, Director, Coalfire Speaker Introductions Hector Rodriguez, WW Health CISO, Microsoft

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

HIPAA Security: What Everyone Should Know

HIPAA Security: What Everyone Should Know HIPAA Security: What Everyone Should Know Webinar January 17, 2008 Practical Tools for Seminar Learning Copyright 2008 American Health Information Management Association. All rights reserved. Disclaimer

More information

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules Marissa Gordon-Nguyen Office for Civil Rights (OCR) U.S. Department of Health and Human Services June

More information

The ABCs of HIPAA Security

The ABCs of HIPAA Security The ABCs of HIPAA Security Daniel F. Shay, Esq 24 th Annual Health Law Institute Pennsylvania Bar Institute March 13, 2018 c. 2018 Alice G. Gosfield and Associates PC 1 Daniel F. Shay, Esq. Alice G. Gosfield

More information

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS Vendor Events SANS offers a variety of events which bring you in touch with the highly qualified SANS community. SANS National Events over 1200 profession IT Security attendees and over 45 SANS classes

More information

Journey to HIMSS18: Privacy, Security and Cybersecurity

Journey to HIMSS18: Privacy, Security and Cybersecurity Journey to HIMSS18: Privacy, Security and Cybersecurity Thompson H. Boyd, III, M.D., FHIMSS, FACHE, FABQAURP, CPHIMS, CHCQM Medical Director of Informatics Hahnemann University Hospital Today s Speaker

More information

ARRA State & Local Energy Assurance Planning & Implementation

ARRA State & Local Energy Assurance Planning & Implementation State Energy Policy and Technology Outlook Conference February 2, 2010, Washington, DC ARRA State & Local Energy Assurance Planning & Implementation Alice Lippert Senior Technical Advisor Office of Electricity

More information

Data Privacy & Protection

Data Privacy & Protection Data Privacy & Protection March 10, 2016 Data Breach Notification and Cybersecurity Developments in 2016 Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy Professional/US This

More information

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Memphis Chapter. President s Message. This annual event is designed to provide students with a Memphis Chapter F E B R U A R Y 2 0 1 5 Remember: Update your IIA profile for the most up-to-date news. RSVP for the Annual Student Day February 24, 2015 This annual event is designed to provide students

More information

Establishing a Credible Cybersecurity Program. September 2016

Establishing a Credible Cybersecurity Program. September 2016 Establishing a Credible Cybersecurity Program September 2016 Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP) Member FBI InfraGard AFTERNOON PLENARY SESSION AGENDA Cyber Risk = Disruptive Business Risk Breaches:

More information

2017 Sponsorship Opportunities

2017 Sponsorship Opportunities 2017 Sponsorship Opportunities Access Education Networking A Better You. A Best Practice. Sponsorships with MGMA of Greater St. Louis Your sponsorship helps to support education, professional development

More information

Office of Indian Energy Policy and Programs

Office of Indian Energy Policy and Programs DOE OFFICE OF INDIAN ENERGY Office of Indian Energy Policy and Programs NETWIG January 2016 Sarai Geary, Program Manager, Office of Indian Energy Office of Indian Energy Policy and Programs MISSION To

More information

HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017

HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017 HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017 Session 9, February 20, 2017 Deven McGraw, Deputy Director, Health Information Privacy HHS Office for Civil Rights 1 Speaker Introduction

More information

HIPAA Privacy, Security and Breach Notification

HIPAA Privacy, Security and Breach Notification HIPAA Privacy, Security and Breach Notification HCCA East Central Regional Annual Conference October 2013 Disclaimer The information contained in this document is provided by KPMG LLP for general guidance

More information

Print and Online Editorial Calendar

Print and Online Editorial Calendar January 2014 Ad close: 12/2/13 Materials due: 12/5/13 Campus Security & Life Safety Mobile Apps Security Locks, Doors, and Hardware ID Cards Municipal Security Video Surveillance Locks FETC, Jan. 28-31,

More information

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice

More information

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance Russell L. Jones Partner Health Sciences Sector Deloitte & Touche LLP Security & Privacy IMLA 2013 Annual Conference San

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Protective Security Advisors and Special Event Domestic Incident Tracker Overview Federal

More information

The Customer Relationship:

The Customer Relationship: View the Replay on YouTube The Customer Relationship: Behind the Scenes with Managed Privacy Services September 10 th 2015 Executive Series Webinar Today s Speakers Ann Marie Harvey Privacy Manager Baptist

More information

Is Your Compliance Strategy Putting Your Business at Risk?

Is Your Compliance Strategy Putting Your Business at Risk? Is Your Compliance Strategy Putting Your Business at Risk? January 20, 2015 2015 NASDAQ-LISTED: EGHT Today s Speakers Michael McAlpen Exec. Dir. of Security & Compliance, 8x8, Inc. David Leach Business

More information

Document Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee

Document Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee 0 Document Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee Co-Chairs: Walter G. Suarez, MD, Institute for HIPAA/HIT Education

More information

Incident Response Plans: The Emergency Shutoff Control for Cyber Risk. Tabitha Greiner, Acumera Chris Lietz, Coalfire

Incident Response Plans: The Emergency Shutoff Control for Cyber Risk. Tabitha Greiner, Acumera Chris Lietz, Coalfire Incident Response Plans: The Emergency Shutoff Control for Cyber Risk Tabitha Greiner, Acumera Chris Lietz, Coalfire Housekeeping Presenters About Conexxus Presentation Q & A Agenda Housekeeping This webinar

More information

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017 HIPAA How to Comply with Limited Time & Resources Jonathan Pantenburg, MHA, Senior Consultant JPantenburg@Stroudwater.com August 17, 2017 Stroudwater Associates is a leading national healthcare consulting

More information

Mohammad Shahadat Hossain

Mohammad Shahadat Hossain Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network

More information

Clearwater HIPAA Security Assessment Software. Demonstration

Clearwater HIPAA Security Assessment Software. Demonstration Clearwater HIPAA Security Assessment Software Demonstration Bob Chaput 615-656-4299 or 800-704-3394 bob.chaput@clearwatercompliance.com Clearwater Compliance LLC 1 About HIPAA-HITECH Compliance 1. We are

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

HIMSS 15 Doing Better Business in the Era of Data Security and Privacy

HIMSS 15 Doing Better Business in the Era of Data Security and Privacy HIMSS 15 Doing Better Business in the Era of Data Security and Privacy Michael D. Stovsky, Esq. Partner and Chair, Innovations, Information Technology and IP Group Cleveland Columbus Indianapolis Philadelphia

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

Healthcare HIPAA and Cybersecurity Update

Healthcare HIPAA and Cybersecurity Update Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Healthcare HIPAA and Cybersecurity Update Agenda > Introductions > Cybersecurity

More information

B.2 Measures of Central Tendency and Dispersion

B.2 Measures of Central Tendency and Dispersion Appendix B. Measures of Central Tendency and Dispersion B B. Measures of Central Tendency and Dispersion What you should learn Find and interpret the mean, median, and mode of a set of data. Determine

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Technology General Controls and HIPAA Security Compliance: Covering the Bandwidth in One Audit

Technology General Controls and HIPAA Security Compliance: Covering the Bandwidth in One Audit Technology General Controls and HIPAA Security Compliance: Covering the Bandwidth in One Audit Michael Morrow, Jennifer McGillCompany Carolinas Healthcare System 2011 AHIA Annual Conference Track D1 Wednesday,

More information

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty WHITE PAPER HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty By Jill Brooks, MD, CHCO and Katelyn Byrne, BSN, RN Data Breaches

More information

Applying ISO and NIST to Address Compliance Mandates The Four Laws of Information Security

Applying ISO and NIST to Address Compliance Mandates The Four Laws of Information Security Applying ISO 27000 and NIST to Address Compliance Mandates The Four Laws of Information Security Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP) ecfirst, chief executive Member, FBI InfraGard Challenges PHI Is

More information

CURRICULUM VITA. Richard E. Biehl, Ph.D.

CURRICULUM VITA. Richard E. Biehl, Ph.D. CURRICULUM VITA Richard E. Biehl, Ph.D. Lecturer Department of Industrial Engineering and Management Systems College of Engineering & Computer Science University of Central Florida 12800 Pegasus Dr., Orlando,

More information

HOW TO BE AN EFFECTIVE CYBERSECURITY LEADER IN HEALTHCARE

HOW TO BE AN EFFECTIVE CYBERSECURITY LEADER IN HEALTHCARE HOW TO BE AN EFFECTIVE CYBERSECURITY LEADER IN HEALTHCARE Session CYB1, March 5, 2018 Karl J. West, CISO & AVP Intermountain Healthcare Erik Decker, CPSO The University of Chicago Medicine 1 Conflict of

More information

Developing Consistency in ITS Safety Solutions: Intersection Conflict Warning Systems E N T E R P R I S E

Developing Consistency in ITS Safety Solutions: Intersection Conflict Warning Systems E N T E R P R I S E Developing Consistency in ITS Safety Solutions: Intersection Conflict Warning Systems E N T E R P R I S E ITS Canada 2012 Annual Conference and General Meeting June 13, 2012 Agenda Intersection Conflict

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance Context and Alignment Policy 4.1 4.4 800-26 164.308 12.4 EDM01 IT Governance Policy 5.1 800-30 12.5 EDM02 Leadership Mergers and Acquisitions Policy A.6.1.1 800-33 EDM03 Context Terms and Definitions

More information

HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance

HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance Presented By: Steven S. Lazarus, PhD, FHIMSS Boundary Information Group 4401 South Quebec Street, #100 Denver, CO 80237 (303) 488-9911

More information

IU Alumni Association Membership Statistics

IU Alumni Association Membership Statistics IU Alumni Association Membership Statistics Paid Members Membership Type Jun-2017 Jun-2018 Annual 11,213 8,754 Auto-Renewal 733 1,614 Life 44,597 45,355 June 30 - Fiscal Year 2018 Year To Date vs. Fiscal

More information

Healthcare Security Professional Roundtable. The Eighth National HIPAA Summit Monday, March 8, 2004

Healthcare Security Professional Roundtable. The Eighth National HIPAA Summit Monday, March 8, 2004 1 Healthcare Security Professional Roundtable The Eighth National HIPAA Summit Monday, March 8, 2004 Panelists John Parmigiani, Sr.VP for Consulting Services, QuickCompliance, Inc.; President, John C.

More information

The Next Frontier in Medical Device Security

The Next Frontier in Medical Device Security The Next Frontier in Medical Device Security Session #76, February 21, 2017 Denise Anderson, President, NH-ISAC Dr. Dale Nordenberg, Executive Director, MDISS 1 Speaker Introduction Denise Anderson, MBA

More information

HIPAA 2017 Compliancy Group, LLC

HIPAA 2017 Compliancy Group, LLC 1 Meet Your Expert Charles Weiselberg Compliancy Group, LLC Director of Customer Service Chuck@compliancygroup.com ENDORSED PARTNER 2 Compliancy Group We simplify compliance so you can confidently focus

More information

Energy Benchmarking Commercial Buildings. Cities that support or require energy benchmarking of commercial buildings

Energy Benchmarking Commercial Buildings. Cities that support or require energy benchmarking of commercial buildings Energy Benchmarking Commercial Buildings Cities that support or require energy benchmarking of commercial buildings Large Cities (250,000+ people) Madison WI 250,000 We are working on a voluntary program.

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

HIPAA Audit Don t just bet the odds Good luck is a residue of preparation. Jack Youngblood

HIPAA Audit Don t just bet the odds Good luck is a residue of preparation. Jack Youngblood HIPAA Audit Don t just bet the odds Good luck is a residue of preparation. Jack Youngblood Braun Tacon Process Architect / Auditor Owner: www.majorincidenthandling.com Winning Lotto.1 in 175 Million Attacked

More information

Why you should adopt the NIST Cybersecurity Framework

Why you should adopt the NIST Cybersecurity Framework Why you should adopt the NIST Cybersecurity Framework It s important to note that the Framework casts the discussion of cybersecurity in the vocabulary of risk management Stating it in terms Executive

More information

Document Number: HITSP 08 N 378 Date: December 17, 2008 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee

Document Number: HITSP 08 N 378 Date: December 17, 2008 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee 0 Document Number: HITSP 08 N 378 Date: December 17, 2008 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee Co-Chairs: Walter G. Suarez, MD, Institute for HIPAA/HIT Education

More information

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017 Sponsored by: Kansas Municipal Utilities Kansas Municipal Energy Agency Kansas Power Pool CYBERSECURITY TRAINING EXERCISE DATE November

More information

DAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT

DAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT APRIL 7, 2019 David Behinfar, Chief Privacy Officer University of North Carolina Health Katherine Georger, Associate

More information

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework From the Trenches: Lessons learned from using the NIST Cybersecurity Framework Greg Witte Sr. Cybersecurity Engineer G2, Inc. Greg.Witte@G2-inc.com Tom Conkle Cybersecurity Engineer G2, Inc. Tom.Conkle@G2-inc.com

More information

The Massachusetts Health

The Massachusetts Health HST.921 / HST.922 Information Technology in the Health Care System of the Future, Spring 2009 Harvard-MIT Division of Health Sciences and Technology Course Directors: Dr. Steven Locke, Dr. Bryan Bergeron,

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

Art of Performing Risk Assessments

Art of Performing Risk Assessments Clinical Practice Compliance Conference Art of Performing Risk Assessments October 2016 Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP) Member FBI InfraGard AGENDA Cyber Risk = Disruptive Business Risk Breaches:

More information

Introduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst

Introduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst Introduction Angela Holzworth, RHIA, CISA, GSEC Sr. IT Infrastructure Analyst Kimberly Gray, Esq., CIPP/US Chief Privacy Officer, Global, IMS Health 1 Incorporating Privacy into the CSF: Approach and Benefits

More information

Defensible Security DefSec 101

Defensible Security DefSec 101 Defensible Security DefSec 101 Security Day November 2017 Information Security Branch Paul Falohun Senior Security Analyst Dan Lathigee Senior Project Manager Content 1 Introduction 2 DefSec for PSO 3

More information

HIPAA For Assisted Living WALA iii

HIPAA For Assisted Living WALA iii Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...

More information

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity

More information

HIPAA 101: What All Doctors NEED To Know

HIPAA 101: What All Doctors NEED To Know HIPAA 101: What All Doctors NEED To Know 1 HIPAA Basics HIPAA: Health Insurance and Portability Accountability Act of 1996 Purpose: to protect confidential information through improved security and privacy

More information

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

Hospital Council of Western Pennsylvania. June 21, 2012

Hospital Council of Western Pennsylvania. June 21, 2012 Updates on OCR s HIPAA Enforcement and Regulations Hospital Council of Western Pennsylvania June 21, 2012 Topics HIPAA Privacy and Security Rule Enforcement HITECH Breach Notification OCR Audit Program

More information

The Role of IT in HIPAA Security & Compliance

The Role of IT in HIPAA Security & Compliance The Role of IT in HIPAA Security & Compliance Mario Cruz OFMQ Chief Information Officer For audio, you must use your phone: Step 1: Call (866) 906-0123. Step 2: Enter code 2071585#. Mario Cruz Mario Cruz

More information

IU Alumni Association Membership Statistics

IU Alumni Association Membership Statistics IU Alumni Association Membership Statistics Paid Members Membership Type Jun-2017 Mar-2018 Annual 11,213 9,517 Auto-Renewal 733 1,466 Life 44,597 45,145 Total 56,543 56,128 70,000 65,000 60,000 55,000

More information

IT in Healthcare Day

IT in Healthcare Day San Francisco ISACA Chapter Proudly Presents IT in Healthcare Day A Day-Long, Multi-Session Event, being held in Walnut Creek! Where: Walnut Creek Marriott - 2355 North Main Street Walnut Creek, CA 94596

More information

This webinar requires that you utilize the integrated audio functions (your computer speakers or headphones); there is no dial-in number.

This webinar requires that you utilize the integrated audio functions (your computer speakers or headphones); there is no dial-in number. CSOHIMSS Lunch & Learn Webinar The Good, the Bad, and the Ugly of Data Analytics Presented By: Albert Lai, PHD from Dept of Biomedical Informatics, The Ohio State University The webinar will begin promptly

More information

Healthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002

Healthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002 Healthcare Information and Management Systems Society HIMSS U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002 HIMSS / Phoenix Health Systems Healthcare Industry Quarterly

More information

Health Care: Privacy & Security in a Digital Age

Health Care: Privacy & Security in a Digital Age Health Care: Privacy & Security in a Digital Age HIPAA Summit West Data Security Mini Summit March 14, 2002 Chris Apgar, Data Security & HIPAA Compliance Officer Providence Health Plans 1 Presentation

More information

HIPAA Compliance Strategies for IPAs and Medical Groups

HIPAA Compliance Strategies for IPAs and Medical Groups HIPAA Compliance Strategies for IPAs and Medical Groups A. John Blair, III, MD Chairman and Chief Executive Officer Taconic IPA, Inc. Fishkill, NY Background Practicing Physician 15 years Revenue Reductions

More information

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp Agenda Introductions HIPAA Background and History Overview of HIPAA Requirements

More information

ManTech Advanced Systems International 2018 Security Training Schedule

ManTech Advanced Systems International 2018 Security Training Schedule ManTech Advanced Systems International 2018 Security Training Schedule Risk Management Framework Course Dates Course Location Course Cost February 12 15, 2018 Las Vegas, NV $1,950.00 March 12 15, 2018

More information

Compliant. Secure. Dependable.

Compliant. Secure. Dependable. NAVIFY Cloud Security with the NAVIFY Tumor Board solution Compliant. Secure. Dependable. Trust that your oncology patients healthcare information stays protected. In the era of precision medicine, you

More information

Data Backup and Contingency Planning Procedure

Data Backup and Contingency Planning Procedure HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

How to Become a CMA (Certified Management Accountant) May 10, 2017

How to Become a CMA (Certified Management Accountant) May 10, 2017 How to Become a CMA (Certified Management Accountant) May 10, 2017 Today s Moderator Featured Presenter Agenda The CMA Designation Institute of Management Accountants (IMA) Why get a CMA? CMA Requirements

More information

Disclaimer Ground Rules

Disclaimer Ground Rules Critical Success Factors in a Complex BCP Development Environment Don Groth Disclaimer Ground Rules The views and opinions expressed today do not necessarily reflect the position of Froedtert and Community

More information

SANS Vendor Offerings Detail

SANS Vendor Offerings Detail SANS Vendor Offerings Detail After working with SANS for a few years now, the audience at SANS events and webinars continues to represent some of the most forward thinking IT security practitioners looking

More information

2018 CALENDAR OF ACTIVITIES

2018 CALENDAR OF ACTIVITIES 2018 CALENDAR OF ACTIVITIES WHO WE ARE AND WHAT WE OFFER Ý Public Trainings Technical Sessions Reviews GMM Other Chapter Activities Conferences Professionals Night ISACA was incorporated by individuals

More information

Mayra D. Portalatin, RS, SFP, LEED AP O+M Senior Professional

Mayra D. Portalatin, RS, SFP, LEED AP O+M Senior Professional Mayra D. Portalatin, RS, SFP, LEED AP O+M Senior Professional Years with FEA: 9 Total years of experience: 16 Education: Bachelor of Science / Civil & Environmental Engineering / University of Michigan

More information

New York DFS Cybersecurity Regulation:

New York DFS Cybersecurity Regulation: New York DFS Cybersecurity Regulation: Countdown to the August 28 Compliance Deadline Presented by: Craig Hoffman, Melinda McLellan & Jonathan Forman Moderated by: Carol Van Cleef July 27, 2017 Craig A.

More information

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS Stephanie Poe, DNP, RN-BC CNIO, The Johns Hopkins Hospital and Health System Discussion Topics The Age of Acceleration Cyber

More information

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager, Deloitte & Touche LLP 1 Speaker Introduction Sanjeev

More information

Mastering Data Privacy, Social Media, & Cyber Law

Mastering Data Privacy, Social Media, & Cyber Law Mastering Data Privacy, Social Media, & Cyber Law Data Breach Notification and Cybersecurity Developments Melissa J. Krasnow, Dorsey & Whitney LLP, and Certified Information Privacy Professional/US 1 State

More information