PaDent Privacy Monitoring with Splunk
|
|
- Kory Arnold
- 8 years ago
- Views:
Transcription
1 Copyright 2015 Splunk Inc. PaDent Privacy Monitoring with Splunk Davin Studer Systems Analyst, The Vancouver Clinic
2 Disclaimer During the course of this presentadon, we may make forward looking statements regarding future events or the expected performance of the company. We caudon you that such statements reflect our current expectadons and esdmates based on factors currently known to us and that actual events or results could differ materially. For important factors that may cause actual results to differ from those contained in our forward- looking statements, please review our filings with the SEC. The forward- looking statements made in the this presentadon are being made as of the Dme and date of its live presentadon. If reviewed aqer its live presentadon, this presentadon may not contain current or accurate informadon. We do not assume any obligadon to update any forward looking statements we may make. In addidon, any informadon about our roadmap outlines our general product direcdon and is subject to change at any Dme without nodce. It is for informadonal purposes only and shall not, be incorporated into any contract or other commitment. Splunk undertakes no obligadon either to develop the features or funcdonality described or to include any such feature or funcdonality in a future release. 2
3 The Vancouver Clinic Serving Southwest Washington since 1939 Locally owned and governed Comprehensive and high quality padent care My role as a Systems Analyst IntegraDon of medical systems Improvement of business processes IntroducDon 3
4 Agenda Who should be interested in padent privacy monitoring? Why is padent privacy monitoring Important? What are some of the opdons? How has The Vancouver Clinic approached privacy monitoring? Takeaways 4
5 Who should be interested in padent privacy monitoring? 5
6 Everyone! HIPAA (Health Insurance Portability and Accountability Act) HITECH Act (Health InformaDon Technology for Economic and Clinical Health) Other state/federal reguladons Risk of idendty theq Exposure of sensidve personal data 6
7 Why is padent privacy monitoring important? 7
8 Because the Consequences Are Very Costly 8
9 What are some of the opdons? 9
10 The Bad, The Worse and the Ugly Third- party vendors TradiDonal repordng tools Canned applicadon reports % of charts resembling Pac- Man % of charts not resembling Pac- Man Expensive Requires a dedicated report wridng team You sdll do 80-90% of Steep learning curve the work Expensive plaforms At the mercy of the vendor s Dme table 10 Siloed reports per applicadon Reports you want may not exist or can t be run Limited repordng capabilides
11 or the Good! One interface to search them all Easy to get the data in Searches can be created quickly VersaDle 11
12 The Vancouver Clinic s approach to privacy monitoring 12
13 Timeline of Events 2010 Splunk for IT monitoring Jan Apr 2013 Evaluated privacy monitoring vendors May 2013 Switched to Splunk Server & workstadon logs Network infrastructure ApplicaDon logs Steep upfront and on- going costs Many billed as turn- key soludons, but were not Timelines to compledon were too high We would sdll be doing 80-90% of the work! 13 Data in Splunk within two weeks MulDple reports with real data Ability to produce reports that many vendors could not provide
14 Process Overview EMR Report Reviewer(s) Daily ETL Process ReporDng DB Rolling 30 days Access Logs Geocoded Addresses HR System AcDve Directory Dashboards and Reports SQL scripts 14
15 ImplementaDon HR System Employee ID Join HRIS_AD EMPLOYEE_ID USER_NAME FIRST_NAME LAST_NAME BIRTH_DATE GENDER ADDRESS CITY STATE ZIP_CODE AcDve Directory EMR_USER EMR_USER_ID NAME USER_NAME EMR_ACCESS_LOG EMR_USER_ID PATIENT_ID ADDRESS_GEOCODE ADDRESS CITY STATE ZIP_CODE LATITUDE LONGITUDE EMR_PATIENT PATIENT_ID FIRST_NAME LAST_NAME BIRTH_DATE GENDER ADDRESS CITY STATE ZIP_CODE Daily Geocoding Process 15
16 Reports Employee viewing: VIP Self Neighbor - Offline geocoded all employee and padent addresses - htp:// PaDent at same address Employee - Employee viewing manager - Manager viewing direct report - Employee viewing co- worker 16
17 Snapshot View of All Reports 17
18 Deep Dive InvesDgaDon 18
19 Lessons Learned Key/Value data is much easier to index (ex. key1= value key2= value ) If your data is in a database by all means use DB Connect Work closely with the compliance team to determine the requirements You must start with security in mind as there is PHI involved 19
20 Takeaways Splunk helps us fulfill HIPAA and HITECH requirements for privacy monitoring Saved over $50K + $12K yearly Easy to implement Flexibility to add reports and data sources 20
21 Contact Info: Davin Studer 21
22 QuesDons? 22
23 THANK YOU
Predict, Alert, Manage, and OpDmize an Ecosystem with Splunk
Copyright 2015 Splunk Inc. Predict, Alert, Manage, and OpDmize an Ecosystem with Splunk Tom Twait & Chris Hogan Cerner EDI Manager, Sr. EDI SoluDon Architect Disclaimer During the course of this presentadon,
More informationSplunk Dashboard Framework What s New Nicholas Filippi Product Management, Splunk
Copyright 2014 Splunk Inc. Splunk Dashboard Framework What s New Nicholas Filippi Product Management, Splunk Mathew ElDng Lead Engineer, Splunk Disclaimer During the course of this presentadon, we may
More information1 2 3 4 5 It s more than a buzz word there are people making lots of money and highly sought a?er by businesses BI allows companies to track employees how long they ve been with the company, when are they
More informationAll Data is Security Relevant
Copyright 2015 Splunk Inc. All Data is Security Relevant Ryan Kovar Senior Security Strategist Minister of the OODALoopers Safe Harbor Statement During the course of this presentadon, we may make forward
More informationXtreemStore A SCALABLE STORAGE MANAGEMENT SOFTWARE WITHOUT LIMITS YOUR DATA. YOUR CONTROL
XtreemStore A SCALABLE STORAGE MANAGEMENT SOFTWARE WITHOUT LIMITS YOUR DATA. YOUR CONTROL Archive Manager - the Basis for XtreemStore DMS Email / Files ScienDfic Others PACS VIDEO PrePress CAD/CAM NFS
More informationMIS 5121:Enterprise Resource Planning Systems Week 2: Business Process System Components, Asser5ons, Procure to Pay
MIS 5121:Enterprise Resource Planning Systems Week 2: Business Process System Components, Asser5ons, Procure to Pay Edward Beaver Edward.Beaver@temple.edu ff IntroducDon: New Students Please Prepare a
More informationHIPAA/HITECH: Conditional Access Management for Business Performance. Mark Seward, Director Security and Compliance Solutions Marketing
HIPAA/HITECH: Conditional Access Management for Business Performance Mark Seward, Director Security and Compliance Solutions Marketing Agenda HIPAA compliance problems (a review for most) EHR access issues
More informationEffec%ve Commercial Lines Underwri%ng using Big Data and Risk Analy%cs
Effec%ve Commercial Lines Underwri%ng using Big Data and Risk Analy%cs Lakshan De Silva Lakshan.desilva@intellectdesign.com April 2015 " A quality first quarter earnings announcement could push shares
More informationPlanning Successful AnalyBcs Projects
Copyright 2014 Splunk Inc. Planning Successful AnalyBcs Projects Mackenzie Kosut Director of Technical OperaBons, Oscar Health Pete Sicilia Director Technical Services, Splunk Disclaimer During the course
More informationTopics in Database Version Control. Dominic Delmolino
Topics in Database Version Control Dominic Delmolino Dominic Delmolino! Oracle database technologist / engineer since 1990! Former! Current! Social! Author! Member of Oracle s System Performance Group!
More informationReal World Big Data Architecture - Splunk, Hadoop, RDBMS
Copyright 2015 Splunk Inc. Real World Big Data Architecture - Splunk, Hadoop, RDBMS Raanan Dagan, Big Data Specialist, Splunk Disclaimer During the course of this presentagon, we may make forward looking
More informationSplunk Operational Visibility
Copyright 2015 Splunk Inc. Splunk Operational Visibility Matthias Maier Sales Engineer, CISSP Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding
More informationHIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates scates@vormetric.com
HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates scates@vormetric.com Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide
More informationEcommerce lecture 3. Selling on the web
Ecommerce lecture 3 Selling on the web Case: Progressive h:ps://www.progressive.com/ First to sell car insuranace online for those with poor insurance record. high premiums, low sales force profitable
More informationLeveraging Machine Data to Deliver New Insights for Business Analytics
Copyright 2015 Splunk Inc. Leveraging Machine Data to Deliver New Insights for Business Analytics Rahul Deshmukh Director, Solutions Marketing Jason Fedota Regional Sales Manager Safe Harbor Statement
More informationCrowdsourcing the Matrix: Improving the Service Desk Experience and ITIL/ SDLC Processes
Copyright 2014 Splunk Inc. Crowdsourcing the Matrix: Improving the Service Desk Experience and ITIL/ SDLC Processes Ian Thomas Problem Management Analyst, Paychex Enterprise Support Disclaimer During the
More informationDeploying the Splunk App for Microso> Exchange
Copyright 2014 Splunk Inc. Deploying the Splunk App for Microso> Exchange Jeff Bernt SDET Disclaimer During the course of this presentahon, we may make forward- looking statements regarding future events
More informationWho is looking at your electronic health record?
Who is looking at your electronic health record? A practical guide to building an audit plan. April 22, 2013 Sandy Gilmore Audit Plan April 2013 2 1 Audit Plan April 2013 3 Who is looking at your EHR Objectives
More informationGrid CompuAng AnalyAcs with Splunk Finnbar Cunningham
Copyright 2014 Splunk Inc. Grid CompuAng AnalyAcs with Splunk Finnbar Cunningham Head of Grid CompuAng OperaAons & Support Credit Suisse Disclaimer During the course of this presentaaon, we may make forward-
More informationCopyright 2014 Splunk Inc.
Copyright 2014 Splunk Inc. Extend Splunk by Visualizing Data using Tableau and the ODBC driver Sharad Kylasam Sr. Product Manager, Splunk Ashley Jaschke Product Manager, Tableau Joe Specht Sr. Director
More informationEnd- to- End Monitoring Unified Performance Dashboard (UPD)
Calvin Smith Project Solution Architect Rich Galloway Systems Integration Engineer Michael Rodriguez Splunk Analytics Engineer Karen Wilson Program Manager Northrop Grumman Information Systems (NGIS) Copyright
More informationSplunk Company Overview
Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected
More informationFrom the Datacenter to the Dean s office
Copyright 2013 Splunk Inc. From the Datacenter to the Dean s office Mark Runals Sr Security Engineer, The Ohio State University #splunkconf About Me! Started at OSU July 12 = 14 months using Splunk! Splunk
More information@shawsql. www.dbaexperience.wordpress.com
@shawsql www.dbaexperience.wordpress.com Environment how d we get here? What to do first? Effective solutions? Team Dynamics Discuss any other issues DBA s Tend to Talk in Terms of Size per Database We
More informationRemote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act
Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act Are your authentication, access, and audit paradigms up to date? Table of Contents Synopsis...1
More informationIndividualized service planning software. Ben Weinlick, MA bweinlick@gmail.com 780-918-5608
Individualized service planning software Ben Weinlick, MA bweinlick@gmail.com 780-918-5608 Apps that help people should attempt to solve real challenges people face and not just be something frilly Let
More informationView the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013
View the Replay on YouTube Sustainable HIPAA Compliance: Enhancing Your Epic Reporting FairWarning Executive Webinar Series October 17, 2013 Today s Panel Chris Arnold FairWarning VP of Product Management
More informationSplunk Apps for Monitoring Microso< Based Infrastructure
Copyright 2013 Splunk Inc. Splunk Apps for Monitoring Microso< Based Infrastructure Sharad Kylasam Sr. Product Manager Mike Papale So
More informationThe join operation allows you to combine related rows of data found in two tables into a single result set.
(Web) Application Development With Ian Week 3 SQL with Multiple Tables Join The join operation allows you to combine related rows of data found in two tables into a single result set. It works similarly
More informationSSRS Reporting Using Report Builder 3.0. By Laura Rogers Senior SharePoint Consultant Rackspace Hosting
SSRS Reporting Using Report Builder 3.0 By Laura Rogers Senior SharePoint Consultant Rackspace Hosting About Me Laura Rogers, Microsoft MVP I live in Birmingham, Alabama Company: Rackspace Hosting Author
More informationWelcome to this online, self- guided powerpoint training. Please read these supplemental notes for each slide. A:er you have completed the training,
Welcome to this online, self- guided powerpoint training. Please read these supplemental notes for each slide. A:er you have completed the training, download the knowledge check from BlackBoard, complete
More informationExcel 2003, MS Access 2003, FileMaker Pro 8. Which One Should I Use?
Excel, MS Access, Pro 8 Which One Should I Use? This document is intended to show a comparison of Excel, Access, and along with general guidelines to help you decide when to use one versus the other. Excel
More informationHunk & Elas=c MapReduce: Big Data Analy=cs on AWS
Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements
More informationREMOTE ACCESS TO A HEALTHCARE FACILITY AND THE IT PROFESSIONAL S OBLIGATIONS UNDER HIPAA AND THE HITECH ACT
REMOTE ACCESS TO A HEALTHCARE FACILITY AND THE IT PROFESSIONAL S OBLIGATIONS UNDER HIPAA AND THE HITECH ACT ARE YOUR AUTHENTICATION, ACCESS, AND AUDIT PARADIGMS UP TO DATE? BY KERRY ARMSTRONG, PRIVACY,
More informationOperational Intelligence and Learning Analytics
Copyright 2015 Splunk Inc. Operational Intelligence and Learning Analytics David Jones Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future
More informationAccelera'ng Your Solu'on Development with Splunk Reference Apps
Copyright 2015 Splunk Inc. Accelera'ng Your Solu'on Development with Splunk Reference Apps Grigori Melnik Principal Product Manager Developer PlaAorm, Splunk @gmelnik Disclaimer During the course of this
More informationHow to Leverage Splunk s Security Intelligence PlaKorm for Security OperaNons Environments
Copyright 2013 Splunk Inc. How to Leverage Splunk s Security Intelligence PlaKorm for Security OperaNons Environments Enoch Long Prin Sec Strategist/Client Architect, Splunk(Fed) #splunkconf Legal NoNces
More informationMore Comprehensive Digital Intelligence - CorrelaFng Client and Server- side Data
Copyright 2013 Splunk Inc. More Comprehensive Digital Intelligence - CorrelaFng Client and Server- side Data Allan, Mike, Rahul, Sondra #splunkconf About Us! Allan Tomkinson Senior Developer @Lincoln Financial
More informationEnergy Storage - Shaping the Future of California s Electric Power System Prepared for DistribuTECH 2011. February 2, 2011
Energy Storage - Shaping the Future of California s Electric Power System Prepared for DistribuTECH 2011 February 2, 2011 Outline of Today s Discussion 1. Overview of Strategen and CESA 2. Energy Storage
More informationWorkshop Internet of Things. LAAS CNRS October 21, 2008
Workshop Internet of Things LAAS CNRS October 21, 2008 Internet Of Things (IOT) Definitions: Things having identities and virtual personalities operating in smart spaces using intelligent interfaces to
More informationDEPLOYMENT ROADMAP March 2015
DEPLOYMENT ROADMAP March 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
More informationArchitec;ng Splunk for High Availability and Disaster Recovery
Copyright 2014 Splunk Inc. Architec;ng Splunk for High Availability and Disaster Recovery Dritan Bi;ncka BD Solu;on Architecture Disclaimer During the course of this presenta;on, we may make forward- looking
More informationand what s upcoming Headline Goes Here
Apache HBase Where we ve been DO NOT USE PUBLICLY and what s upcoming PRIOR TO 10/23/12 Headline Goes Here Jonathan Hsieh @jmhsieh Speaker Name or Subhead Goes Here SoMware Engineer at Cloudera HBase PMC
More informationAchieving HIPAA Compliance with Identity and Access Management
Achieving HIPAA Compliance with Identity and Access Management A Healthcare Case Study Stephen A. Whicker Manager Security Compliance HIPAA Security Officer AHIS/St. Vincent Health DISCLAIMER: The views
More informationManaging Privacy and Security Challenges of Patient EHR Portals
Managing Privacy and Security Challenges of Patient EHR Portals Jacki Monson, JD, CHC Adam H. Greene, JD, MPH DISCLAIMER: The views and opinions expressed in this presentation are those of the author and
More informationRESCO MOBILE CRM QUICK GUIDE. for MS Dynamics CRM. ios (ipad & iphone) Android phones & tablets
RESCO MOBILE CRM for MS Dynamics CRM QUICK GUIDE ios (ipad & iphone) Android phones & tablets Windows Phone 7 & 8, Windows XP/Vista/7/8.1 and RT/Surface, Windows Mobile Synchronize Synchronize your mobile
More informationDatabase Migration : An In Depth look!!
Database Migration : An In Depth look!! By Anil Mahadev anilm001@gmail.com As most of you are aware of the fact that just like operating System migrations are taking place, databases are no different.
More informationSELF SERVICE RESET PASSWORD MANAGEMENT DATABASE REPLICATION GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT DATABASE REPLICATION GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in
More informationBest Practices in Healthcare IT Disaster Recovery Planning
BUSINESS WHITE PAPER Best Practices in Healthcare IT Disaster Recovery Planning Assessing your options for leveraging the cloud to enhance compliance, improve recovery objectives, and reduce capital expenditures
More informationHIPAA/HITECH Compliance Using VMware vcloud Air
Last Updated: September 23, 2014 White paper Introduction This paper is intended for security, privacy, and compliance officers whose organizations must comply with the Privacy and Security Rules of the
More informationWe re providing a soludon to a group of borrowers who have been disenfranchised by other lenders AUG
Who are Magellan Homeloans? Ignoring sub- prime borrowers won t make the problem go away. They need help to get back into mainstream finance We re targedng borrowers with a significant adverse credit history,
More informationSelf Service Business Intelligence - how to bring Oracle and DB2 z/os data together
Self Service Business Intelligence - how to bring Oracle and DB2 z/os data together During my work as presales consultant I found in a lot of big companies this typical data environment: legacy applications,
More informationDeployment Best PracHces for Splunk Apps Monitoring MicrosoK- based Infrastructure
Copyright 2013 Splunk Inc. Deployment Best PracHces for Splunk Apps Monitoring MicrosoK- based Infrastructure Sharad Kylasam Sr. Product Manager Jeff Bernt - SDET #splunkconf Legal NoHces During the course
More informationBI/Analytics for NoSQL: Review of Architectures
BI/Analytics for NoSQL: Review of Architectures What we'll answer in 50 minutes Who is this guy? How do I enable AdHoc, self service reporting on NoSQL? How do I improve the performance of dashboards on
More informationOracle Database 10g Express
Oracle Database 10g Express This tutorial prepares the Oracle Database 10g Express Edition Developer to perform common development and administrative tasks of Oracle Database 10g Express Edition. Objectives
More informationMIPRO s Business Intelligence Manifesto: Six Requirements for an Effective BI Deployment
MIPRO s Business Intelligence Manifesto: Six Requirements for an Effective BI Deployment Contents Executive Summary Requirement #1: Execute Dashboards Effectively Requirement #2: Understand the BI Maturity
More informationCyber, Security and Privacy Questionnaire
Cyber, Security and Privacy Questionnaire www.fbinsure.com Please note: This is an electronic application. When completed please save and email to: Ed McGuire emcguire@fbinsure.com Cyber, Security & Privacy
More informationSustainable Compliance: A System for Ongoing Audit Readiness
View the Replay on YouTube Sustainable Compliance: A System for Ongoing Audit Readiness FairWarning Executive Webinar Series November 14, 2013 Agenda Sustainable Compliance at St. Charles Health System
More informationQuick Service Data for Quick Service Restaurants
Copyright 2015 Splunk Inc. Quick Service Data for Quick Service Restaurants Brandon Burk, Juan Gomez Sonic Drive- In Disclaimer During the course of this presentahon, we may make forward looking statements
More informationPartner Experience Management, a Sustainable Way to Manage the Channel
Partner Experience Management, a Sustainable Way to Manage the Channel August 2010 ABSTRACT Partner management is more than just registering deals and passing leads. In today s highly competitive markets,
More informationSplunk for.net Developers
Copyright 2014 Splunk Inc. Splunk for.net Developers Glenn Block Senior Product Manager, Splunk Disclaimer During the course of this presentahon, we may make forward- looking statements regarding future
More informationWhat to Expect when On-Boarding to ILHIE Master Patient Index (MPI) Presentation By : Alexander Danel
What to Expect when On-Boarding to ILHIE Master Patient Index (MPI) Presentation By : Alexander Danel What Constitutes Demographics? MPI contains patient demographics. Patient information related to identification,
More informationVulnerability Management with the Splunk App for Enterprise Security
Copyright 2014 Splunk Inc. Vulnerability Management with the Splunk App for Enterprise Security Randal T. Rioux Principal Security Strategist and Minister of Offense Splunk Inc. Disclaimer During the course
More informationData Use and the Liquid Grids Model
Data Use Policy Revision 1.1 03/09/2014 Ramos M. Mays, Chief Technology Officer Table of Contents 1. Information Sources... 3 2. Information we receive... 3 3. How we use information... 4 4. How long we
More informationImplementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind
Page1 Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind The use of electronic medical records (EMRs) to maintain patient information is encouraged today and
More informationUser Replicator USER S GUIDE
User Replicator USER S GUIDE Contents 1. Introduction... 2 1.1. User Replicator requirements... 2 2. Creating users in Learning Center from the Active Directory... 3 2.1. Process File... 3 2.2 Users Mappings...
More informationFörsäkringskassan. (Swedish Social Security Agency) Computer Analyses to Identify Frauds 2013 Page 1
Försäkringskassan (Swedish Social Security Agency) Computer Analyses to Identify Frauds 2013 Page 1 Håkan Hagberg Internal investigations Computer analyses Identify frauds against Försäkringskassan Computer
More informationSmartphones. Mobile Health Apps 10/31/11. Embedded and pervasive compudng plaeorm Embedded CompuDng PlaEorm
10/31/11 Mobile Health Apps Computer Science and Engineering - University of Notre Dame Smartphones Embedded and pervasive compudng plaeorm Embedded CompuDng PlaEorm Does not run general- purpose programs
More informationLeveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance
ADVANCED INTERNET TECHNOLOGIES, INC. https://www.ait.com Leveraging Dedicated Servers and Dedicated Private Cloud for HIPAA Security and Compliance Table of Contents Introduction... 2 Encryption and Protection
More informationBusiness Analyst Position
ORIGINAL PROPOSAL TO STATE OF WISCONSIN DEPARTMENT EMPLOYEE TRUST FUNDS Business Analyst Position As part of Request for Bid # ETA0017 Project Management and Associated Services for the WISCONSIN RETIREMENT
More informationGain Control of Space with Quest Capacity Manager for SQL Server. written by Thomas LaRock
Gain Control of Space with Quest Capacity Manager for SQL Server written by Thomas LaRock Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains proprietary information, which is
More informationPatching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise
Copyright 2013 Splunk Inc. Patching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise Marquis Montgomery, CISSP, SSCP, GSEC Senior Security Architect, CedarCrestone #splunkconf
More informationJoseph Mertz, Ph.D Teaching Professor H. John III Heinz College Dietrich College IS Program
Joseph Mertz, Ph.D Teaching Professor H. John III Heinz College Dietrich College IS Program Mobile Desktop Tablet Social Interac6ve Real Time Big data Share func6onality (e.g. maps) Interact with the physical
More informationSecurity and Privacy of Electronic Medical Records
White Paper Security and Privacy of Electronic Medical Records McAfee SIEM and FairWarning team up to deliver a unified solution Table of Contents Executive Overview 3 Healthcare Privacy and Security Drivers
More informationCentralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,
More informationCORPORATE END USER LICENSE AGREEMENT FOR GALAXKEY SOFTWARE
CORPORATE END USER LICENSE AGREEMENT FOR GALAXKEY SOFTWARE PLEASE READ THIS END USER LICENSE AGREEMENT ( EULA ) CAREFULLY. THIS EULA IS AN AGREEMENT BETWEEN YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY)
More informationSplunk Cloud as a SIEM for Cybersecurity CollaboraFon
Copyright 2015 Splunk Inc. Splunk Cloud as a SIEM for Cybersecurity CollaboraFon Timothy Lee CISO, City of Los Angeles Disclaimer During the course of this presentafon, we may make forward looking statements
More informationGenesee Health System RFI-Business Intelligence & Analytics with Dashboard Reporting Questions and Answers
Genesee Health System RFI-Business Intelligence & Analytics with Dashboard Reporting Questions and Answers 1. Is there any other information required other than that listed in Section II? Respondents must
More informationDecoding the Big Data Deluge a Virtual Approach. Dan Luongo, Global Lead, Field Solution Engineering Data Virtualization Business Unit, Cisco
Decoding the Big Data Deluge a Virtual Approach Dan Luongo, Global Lead, Field Solution Engineering Data Virtualization Business Unit, Cisco High-volume, velocity and variety information assets that demand
More informationEstablishing A Multi-Factor Authentication Solution. Report to the Joint Legislative Oversight Committee on Information Technology
Establishing A Multi-Factor Authentication Solution Report to the Joint Legislative Oversight Committee on Information Technology Keith Werner State Chief Information Officer Department of Information
More informationWell-Documented Controls Reduce Risk and Support Compliance Initiatives
White Paper Risks Associated with Missing Documentation for Health Care Providers Well-Documented Controls Reduce Risk and Support Compliance Initiatives www.solutionary.com (866) 333-2133 Many Health
More informationHow To Fix A Powerline From Disaster To Powerline
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir 1 Why This Topic? Case study on large Perforce installation Something for smaller sites to ponder as they grow Stress
More informationGalaxy Software Addendum
Galaxy Software Addendum for Importing Users from Active Directory Includes Encryption of Connection Strings Page 1 of 9 System Galaxy Version 10.3 How to Guide For Importing users from Active Directory
More informationENTERPRISE BI AND DATA DISCOVERY, FINALLY
Enterprise-caliber Cloud BI ENTERPRISE BI AND DATA DISCOVERY, FINALLY Southard Jones, Vice President, Product Strategy 1 AGENDA Market Trends Cloud BI Market Surveys Visualization, Data Discovery, & Self-Service
More informationUsing Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use
Copyright 2014 Splunk Inc. Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use Ant Lefebvre ant@midhosp.org Senior Systems Engineer Middlesex Hospital About Middlesex Hospital Complete range
More informationCMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM
CMS AND ONC FINAL REGULATIONS DEFINE MEANINGFUL USE AND SET STANDARDS FOR ELECTRONIC HEALTH RECORD INCENTIVE PROGRAM The Centers for Medicare & Medicaid Services (CMS) and the Office of the National Coordinator
More informationBi-Directional Interface between EMR and Quest Diagnostics Microsoft.NET with SQL Server Reporting Services solution for Healthcare Company
Bi-Directional Interface between EMR and Quest Diagnostics Microsoft.NET with SQL Server Reporting Services solution for Healthcare Company Executive Summary One of our EMR clients approached us to setup
More informationSalesforce Integration Guide
Salesforce Integration Guide Salesforce Integration Guide Document Publication Date: October 14, 2011 Copyright 2009-2011 BroadVision, Inc., 1600 Seaport Boulevard, Suite 550, North Building, Redwood City,
More informationUnified Data Models. Chief Technologist, Data Centre TransformaDon, Systems, February 2015
Unified Data Models Michael Coleman Chief Technologist, Data Centre TransformaDon, Systems, Asia Pacific February 2015 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Predictions 2015 in
More informationActive Directory Authentication Integration
Active Directory Authentication Integration This document provides a detailed explanation of how to integrate Active Directory into the ipconfigure Installation of a Windows 2003 Server for network security.
More informationCopyright 2013 Splunk Inc. Introducing Splunk 6
Copyright 2013 Splunk Inc. Introducing Splunk 6 Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected performance
More informationProposal Wri?ng I. Wendy Huntoon Execu?ve Director, KINBER huntoon@kinber.org. Broadening the Reach Workshop, Raleigh, NC 09/04/14 09/05/14
Proposal Wri?ng I Wendy Huntoon Execu?ve Director, KINBER huntoon@kinber.org Broadening the Reach Workshop, Raleigh, NC 09/04/14 09/05/14 Overview Summary of the Campus Cyberberinfrastructure SolicitaDon
More informationData Warehousing and. Business Intelligence Tools for IR: How do we get there?
Data Warehousing and Business Intelligence Tools for IR: How do we get there? Marilyn H. Blaustein Alan H. McArdle Banu Solak Northeast Association for Institutional Research November 10, 2009 Session
More informationPatient Privacy and HIPAA/HITECH
Patient Privacy and HIPAA/HITECH What is HIPAA? Health Insurance Portability and Accountability Act of 1996 Implemented in 2003 Title II Administrative Simplification It s a federal law HIPAA is mandatory,
More informationMaking the Most of the New Splunk Scheduler
Copyright 2015 Splunk Inc. Making the Most of the New Splunk Scheduler Paul J. Lucas Sr. So=ware Engineer, Splunk Disclaimer During the course of this presentahon, we may make forward looking statements
More informationThe manual contains complete instructions on 'converting' your data to version 4.21.
1 of 7 2/15/2012 10:02 AM Upgrading Authentication Pre-Installation Steps: SQL Server Installation Oracle Installation Upgrading You can only convert data from versions 3.60, 4.00, 4.01, 4.10 or 4.20 to
More informationYou don t know what you don t know!
ObserveIT: User Activity Monitoring You don t know what you don t know! Copyright 2011 ObserveIT. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their
More informationDriving Immediate Value from a Phased MDM Program
September 25 28, 2011 Dallas, TX Driving Immediate Value from a Phased MDM Program Balaji Krishnamoorthy, Horizon BCBS NJ John Bair, Ajilitee Tuesday, September 27 10:45-11:30 am 1 Biographies Balaji Krishnamoorthy
More informationBest Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software
Best Practices for Monitoring Databases on VMware Dean Richards Senior DBA, Confio Software 1 Who Am I? 20+ Years in Oracle & SQL Server DBA and Developer Worked for Oracle Consulting Specialize in Performance
More informationSplunk Enterprise in the Cloud Vision and Roadmap
Copyright 2013 Splunk Inc. Splunk Enterprise in the Cloud Vision and Roadmap Alex Munk PM Cloud #splunkconf Ledio Ago Director of Engineering Cloud Legal NoJces During the course of this presentajon, we
More information