PAST PRESENTATIONS Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016

Similar documents
Ensuring Privacy and Security of Health Information Exchange in Pennsylvania

Update from HIMSS National Privacy & Security. Lisa Gallagher, VP Technology Solutions November 14, 2013

All Aboard the HIPAA Omnibus An Auditor s Perspective

A HIPAA Compliance and Enforcement Update from the HHS Office for Civil Rights Session #24, 10:00 a.m. 11:00 a.m. March 6, 2018 Roger Severino, MSPP,

Information Governance, the Next Evolution of Privacy and Security

Agenda. Hungry, Hungry HIPAA: Security, Enforcement, Audits, & More. Health Law Institute

Developing Your Records Retention Schedule: It s Bigger Than Just Health Records

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

HIPAA-HITECH: Privacy & Security Updates for 2015

Pennsylvania s HIE Journey

Standards and Procedures Alaska Medicaid

Standards and Procedures Alaska Medicaid 2/24/2017. Written Policies. Procedures

Legal Disclaimer. Copyright Notice

HCISPP HealthCare Information Security and Privacy Practitioner

Putting It All Together:

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

HIPAA Compliance is not a Cybersecurity Strategy

Cybersecurity and the Board of Directors

HIPAA Security: What Everyone Should Know

Update on Administration and Enforcement of the HIPAA Privacy, Security, and Breach Notification Rules

The ABCs of HIPAA Security

SANS Vendor Events. SANS offers a variety of events which bring you in touch with the highly qualified SANS community.

Journey to HIMSS18: Privacy, Security and Cybersecurity

ARRA State & Local Energy Assurance Planning & Implementation

Data Privacy & Protection

Memphis Chapter. President s Message. This annual event is designed to provide students with a

Establishing a Credible Cybersecurity Program. September 2016

2017 Sponsorship Opportunities

Office of Indian Energy Policy and Programs

HIPAA Privacy, Security Lessons from 2016 and What's Next in 2017

HIPAA Privacy, Security and Breach Notification

Print and Online Editorial Calendar

Balancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld

The HIPAA Security & Privacy Rule How Municipalities Can Prepare for Compliance

The Office of Infrastructure Protection

The Customer Relationship:

Is Your Compliance Strategy Putting Your Business at Risk?

Document Number: HITSP 09 N 391 Date: February 20, 2009 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee

Incident Response Plans: The Emergency Shutoff Control for Cyber Risk. Tabitha Greiner, Acumera Chris Lietz, Coalfire

HIPAA How to Comply with Limited Time & Resources. Jonathan Pantenburg, MHA, Senior Consultant August 17, 2017

Mohammad Shahadat Hossain

Clearwater HIPAA Security Assessment Software. Demonstration

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

HIMSS 15 Doing Better Business in the Era of Data Security and Privacy

Altius IT Policy Collection Compliance and Standards Matrix

Healthcare HIPAA and Cybersecurity Update

B.2 Measures of Central Tendency and Dispersion

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

Technology General Controls and HIPAA Security Compliance: Covering the Bandwidth in One Audit

WHITE PAPER. HIPAA Breaches Continue to Rise: Avoid Becoming a Casualty

Applying ISO and NIST to Address Compliance Mandates The Four Laws of Information Security

CURRICULUM VITA. Richard E. Biehl, Ph.D.

HOW TO BE AN EFFECTIVE CYBERSECURITY LEADER IN HEALTHCARE

Developing Consistency in ITS Safety Solutions: Intersection Conflict Warning Systems E N T E R P R I S E

Altius IT Policy Collection Compliance and Standards Matrix

HIPAA Implementation: Steps to Creating a Budget for HIPAA Compliance

IU Alumni Association Membership Statistics

Healthcare Security Professional Roundtable. The Eighth National HIPAA Summit Monday, March 8, 2004

The Next Frontier in Medical Device Security

HIPAA 2017 Compliancy Group, LLC

Energy Benchmarking Commercial Buildings. Cities that support or require energy benchmarking of commercial buildings

Security and Privacy Governance Program Guidelines

HIPAA Audit Don t just bet the odds Good luck is a residue of preparation. Jack Youngblood

Why you should adopt the NIST Cybersecurity Framework

Document Number: HITSP 08 N 378 Date: December 17, 2008 Report from the HITSP Education, Communication and Outreach (HITSP-ECO) Committee

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

DAVID J BEHINFAR, JD., LLM., CHC, CHRC, CCEP, HCISPP, CIPP/US P23: AN EFFECTIVE PRIVACY PROGRAM BUILT THROUGH STRATEGIC VISION AND LEADERSHIP SUPPORT

From the Trenches: Lessons learned from using the NIST Cybersecurity Framework

The Massachusetts Health

4A Healthcare Data Security & Privacy

Art of Performing Risk Assessments

Introduction. Angela Holzworth, RHIA, CISA, GSEC. Kimberly Gray, Esq., CIPP/US. Sr. IT Infrastructure Analyst

Defensible Security DefSec 101

HIPAA For Assisted Living WALA iii

Vice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security

HIPAA 101: What All Doctors NEED To Know

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Cyber Resilience. Think18. Felicity March IBM Corporation

Hospital Council of Western Pennsylvania. June 21, 2012

The Role of IT in HIPAA Security & Compliance

IU Alumni Association Membership Statistics

IT in Healthcare Day

This webinar requires that you utilize the integrated audio functions (your computer speakers or headphones); there is no dial-in number.

Healthcare Information and Management Systems Society HIMSS. U.S. Healthcare Industry Quarterly HIPAA Compliance Survey Results: Summer 2002

Health Care: Privacy & Security in a Digital Age

HIPAA Compliance Strategies for IPAs and Medical Groups

HIPAA Compliance: What it is, what it means, and what to do about it. Adam Carlson, Security Solutions Consultant Intapp

ManTech Advanced Systems International 2018 Security Training Schedule

Compliant. Secure. Dependable.

Data Backup and Contingency Planning Procedure

The Office of Infrastructure Protection

How to Become a CMA (Certified Management Accountant) May 10, 2017

Disclaimer Ground Rules

SANS Vendor Offerings Detail

2018 CALENDAR OF ACTIVITIES

Mayra D. Portalatin, RS, SFP, LEED AP O+M Senior Professional

New York DFS Cybersecurity Regulation:

Mission: Continuity BUILDING RESILIENCE AGAINST UNPLANNED SERVICE INTERRUPTIONS

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Mastering Data Privacy, Social Media, & Cyber Law

Transcription:

Past Presentations PAST PRESENTATIONS 2016 Healthcare Information Security Discussion, Cleveland ISSA Chapter, Brecksville, OH, May 12, 2016 Current Healthcare Information Security Trends and Challenges, Northeast Ohio Health Information Management (NOHIMA) Spring Conference, Independence, OH, May 6, 2016 State of Healthcare Security, Incident Response, Tabletop Exercise, Ohio Healthcare Security Consortium, Columbus, OH, May 5, 2016 Leveraging the Skills of an HIM Professional to help IT staff with Security, Kansas Health Information Management Association (KHIMA) Spring Meeting, Wichita, KS, April 13, 2016 Cybersecurity, Kansas Health Information Management Association (KHIMA) Spring Meeting, Wichita, KS, April 13, 2016 From the Front Lines: Healthcare Information Security Trends, Risks, and Best Practices, Cleveland Marshall College of Law: Journal of Law and Health Symposium, Cleveland, OH, April 9, 2016 Cyber Security and Privacy Protection Conference, Moderator Healthcare Perspectives Panel, Cleveland, OH, April 8, 2016 CISO for an Hour, Central Ohio Information Security Summit, Columbus, OH, March 30, 2016 PHI Protection Network, Keith Fricke -Keynote Speaker & Panel Member, Philadelphia, PA, March 17-18, 2016 Overview of Healthcare and Public Health Sector, Cleveland InfraGard Quarterly Chapter Meeting, Cleveland, OH, March 4, 2016 Cybersecurity: Time to Improve Your Posture, HIMSS- Preconference symposium, Las Vegas, NV, February 29, 2016 PAST PRESENTATIONS 2015 HIPAA Compliant What does that mean?, HIMSS Privacy & Security Forum, Boston, MA, December 1, 2015 Securing Mobile Devices and Business Data In the wild, ISACA KC Chapter, Leawood, KS, November 12, 2015

HIPAA Compliant Really? Are you sure?, AHIMA 2015 Privacy and Security Institute, New Orleans, LA, September 26 & 27, 2015 What Is (or should be) Keeping You Up at Night? Hot Topics in Privacy and Security, Health Care Compliance Association, Kansas City, MO, September 25, 2015 (co-presenter) Disaster Recovery and Information Security Evaluation, Central Ohio Business Resumption Association, Columbus, OH, September 17, 2015 Information Security Awareness Topics, NOHIMA Spring Conference, Cleveland, OH, May 8, 2015 What does HIPAA Compliant mean?, HIMSS15 Annual Conference, Chicago, IL, April 15, 2015 (co-presented educational session #137) Privacy and Security Workshop Navigating the Practical and Legal Aspects of HIPAA, HIMSS15 Annual Conference, Chicago, IL, April 12, 2015 (all-day workshop) Data at Rest Securing Vital Records, Spring Seminar, Kansas Capital Chapter of ARMA, Topeka, KS, April 8, 2015 How a Mock Audit can identify gaps in preparedness, American Health Information Management Association (AHIMA) webinar, February 12, 2015 PAST PRESENTATIONS 2014 Risk Analysis Risk for HIPAA and Meaningful Use, Monthly Education Meeting, Greater Kansas City Medical Managers Association (GKCMMA) Overland Park, KS, September 17, 2014 (Keynote) The BYOD Tight Rope: Balance User Demands and Your Organization s Risk Tolerance, 4th Annual HIMSS Privacy & Security Forum, Boston, MA, September 8, 2014 (Panel moderator) Information Security Risk Analysis, 2014 Audit Symposium, Federal Reserve Bank of Kansas City, Kansas City, MO, August 27, 2014 Effectively Completing and Documenting a Risk Analysis, HIPAA Collaborative of Wisconsin (HIPAA COW) 2014 Spring Conference, Stevens Point, WI, April 11, 2014 (Breakout Session) Are You Ready for an OCR Audit?, HIPAA Collaborative of Wisconsin (HIPAA COW) 2014 Spring Conference, Stevens Point, WI, April 11, 2014 (Keynote Session) An Update on Information Security: What You Need to Know, Health Information Technology and Meaningful Use Workshop, Kansas Hospital Association, Wichita, KS, January 23, 2014

PAST PRESENTATIONS 2013 Information Security Risk Analysis, ISSA and ISACA Joint chapter meeting, Overland Park, KS, December 12, 2013 Will you pass or fail an OCR security audit?, PDS 2013 Technology Conference, Milwaukee, WI, September 26, 2013 Managing Mobile Device Security, American Health Information Management Association (AHIMA) webinar, May 16, 2013 Impact of the Omnibus Rule on HIPAA and HITECH Compliance, MoHIMA Spring Workshop, Blue Springs, MO, April 18, 2013 Risk Analysis Nine Steps to Follow, SecureWorld Conference, Kansas City, MO, April 17, 2013 Impact of the Omnibus Rule on HIPAA and HITECH Compliance, KHIMA Spring Workshop, Junction City, KS, April 12, 2013 (Keynote speaker) Continuous HIPAA Readiness, Missouri Hospital Association, Blue Springs, MO and St. Louis, MO, March 26 and 28, 2013 (two - all day workshops) Does Your Information Security Program Measure Up?, HIMSS13 Annual Conference, New Orleans, LA, March 5, 2013 (co-presented educational session #74) Privacy and Security Workshop Preparing for an OCR Audit, HIMSS13 Annual Conference, New Orleans, LA, March 3, 2013 (all-day workshop) Information Security: Audits, Risks and Meaningful Use, Kansas Hospital Association webinar/podcast, February 13, 2013 PAST PRESENTATIONS 2012 Advanced Mobile Device Management, American Health Information Management Association (AHIMA), Privacy & Security Institute, September 29, 2012 Risk Analysis Workshop, Workshop, Kansas Hospital Association, Salina, KS, September 11, 2012 Risk Analysis, Hawaii Primary Care Association (HPCA) Annual Conference, Honolulu, Hawaii August 23, 2012 Health Information Technology (HIT) Security, HPCA Annual Conference, Honolulu, Hawaii August 23, 2012 Risk Analysis Workshop, Health Information Security Conference, Kansas Hospital Association, Wichita, KS, April 27, 2012 Privacy and Security Workshop: Seven Indicators for Determining Whether Your Information Security Program is Real or Fantasy, HIMSS Annual Conference, Las Vegas, NV, February 20, 2012 (all-day workshop)

Risk Analysis Workshop, Alabama Regional Extension Center (ALREC), Huntsville, AL, January 11, 2012 and Birmingham, AL January 12, 2012 PAST PRESENTATIONS 2011 Risk Analysis Workshop, Alabama Regional Extension Center (ALREC), Mobile, AL, December 8, 2011 Breach Analysis Case Study Determining Root Cause, Response & Prevention Techniques, Kansas Health Information Management Association, Manhattan, KS, September 20, 2011 Disaster Recover Maintaining High Availability & Resiliency in Healthcare, Kansas Health Information Management Association, Manhattan, KS, September 20, 2011 PCI: What Healthcare Organizations Need to Know, Information Security Media Group Webinar, May 16, 2011 Risk Analysis Workshop, Health Information Security Conference, Kansas Hospital Association, Wichita, KS, May 5, 2011 Privacy and Security Workshop, Life in the Fast Lane Privacy and Security in the Age of the Electronic Health Record, HIMSS Annual Conference, Orlando, FL, February 20, 2011 (all-day workshop) HITECH Tips: Using EHR Security Functions for Protecting Patient Information, Information Security Media Group Webinar, January 17, 2011 PAST PRESENTATIONS 2010 Writing Proper Policies and Procedures, Kansas Chapter of HIMSS Conference, Salina, KS, October 8, 2010 Five Things a Privacy Officer Needs to Know About Security for HITECH, Missouri/Kansas Health Information Management Associations Conference, Kansas City, MO, September 17, 2010 HIPAA Modifications and HITECH Rules: A Guide to the Security Essentials, Information Security Media Group Webinar, August 2010 HITECH Update: Privacy and Security Enforcement, Part 1, American Health Information Management Association (AHIMA) Webinar, June 23, 2010 Auditing for Privacy and Security Compliance, American Health Information Management Association (AHIMA) webinar, August 26, 2010 ARRA Privacy and Security Workshop, HIMSS Annual Conference, Atlanta, GA, February 28, 2010 (all-day workshop)

PAST PRESENTATIONS 2009 ARRA Changes to Healthcare Privacy and Security, KHIMA Conference, Wichita, KS, September 17, 2009 (Keynote presentation) Staying out of the headlines and what to do, just in case..., KHIMA Conference, Wichita, KS, September 17, 2009 Auditing for Privacy and Security Compliance, American Health Information Management Association (AHIMA) webinar, June 23, 2009 The Years in Review, DOE Cyber Security Conference, Henderson, NV, May 14, 2009 (closing keynote) Presentation Skills for Information Security Professionals, DOE Cyber Security Conference, Henderson, NV, May 13, 2009 Information Security: The Next Level, HIMSS Annual Conference, Chicago, IL, April 4, 2009 (allday workshop) Disaster Recovery Costs and Impacts on Healthcare Operations, HIPAA COW, Green Bay, WI, April 3, 2009 Security and Privacy Requirements Beyond HIPAA, HIPAA COW, Green Bay, WI, April 3, 2009 (Keynote presentation) Presentation Skills for Information Security Professionals, InfoSec World Annual Conference hosted by MIS Training Institute, Orlando, FL, March 9, 2009 Making Information Security A Business Process, InfoSec World Annual Conference hosted by MIS Training Institute, Orlando, FL, March 9, 2009 Aligning the Generations, CISO Executive Summit hosted by MIS Training Institute, Orlando, FL, March 8, 2009 (panel discussion)