Legacy Archiving How many lights do you leave on? September 14 th, 2015
|
|
|
- David Murphy
- 10 years ago
- Views:
Transcription
1 Legacy Archiving How many lights do you leave on? September 14 th,
2 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2
3 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory care centers, 3 outpa=ent surgery centers, 4 urgent care centers, over 95 physician prac=ces 1,300 physicians 11,000 employees 1,273 beds Primary Service Area Cone Health 3
4 Objectives 1) Outline the major business objec=ves for implemen=ng a data reten=on program 2) Describe the Legacy Archive Framework 3) Describe the specific ac=vi=es that have led to an improved applica=on porqolio. 4
5 Legacy Archiving I. Why? Outline the major business objectives for implementing a data retention program. 5
6 Legacy Archive Background Create a framework focused on legacy por9olio efforts to either decommission or archive legacy applica(ons that are no longer needed for opera(onal purposes. The house- wide EHR implementa(on typically drives this effort. Archive (retain to access) Legal data reten=on =me requirements exist for the data within the applica=on. Internal recommenda=ons require us to keep the data. Decommission (permanently destroy) Legal reten=on requirements have been met, the data is no longer needed. The data does not have legal requirements to retain. I. Why? 6
7 Objectives Reduce Costs Applica=on maintenance, hardware and resource costs over mul=ple applica=ons likely exist as opera=onal expenses that can be reduced. Efforts to con=nue keeping the lights on get expensive! Meet Legal Reten1on Requirements State and federal reten=on requirements are likely in place that could lead to fines if your organiza=on is non- compliant. Audits are also a key reason to ensure access to legacy data. Release of Informa=on (HIM) Minimize Security Risks Minimizing loca=ons of data as soon as it is no longer required for opera=onal purposes helps minimize the risk of security breaches. Hardwire Enterprise Process Implement data reten=on standards for enterprise processes to ensure steps to decommission are consistent throughout the organiza=on. I. Why? 7
8 Retention Requirements There are mul=ple sources that can be leveraged to generate standard policy and procedure. Per AHIMA, there is no single standardized record reten=on schedule that organiza=ons and providers must follow. Instead, a variety of reten=on requirements must be reviewed to create a compliant reten=on program. I. Why? 8
9 Retention Requirement Resources I. Why? 9
10 Retention Requirement Resources I. Why? Source: hcp:// 10
11 Legacy Archiving II. What? Describe the framework that leveraged. 11
12 Data Retention Governance Establish Project Governance and Ongoing Support Structure Descrip=on: Develop the management framework within which Data Reten=on and Legacy Applica=on related decisions are made and support is provided on an ongoing basis. This provides hospitals with a structured approach to conduct ini=al Legacy Applica=on remedia=on ac=vi=es as well as future data reten=on efforts. Benefits: Provides a logical and repeatable decision- making framework. Iden=fies who in the organiza=on is responsible for overall and day- to- day Data Reten=on decisions and ac=vi=es. Helps IT provide more consistent response and support related to Legacy Applica=ons. II. What? 12
13 Data Retention Governance Finance Opera=ons Informa=on Services HIM Risk Legal Purpose Group Decision Efforts Vendor Strategy Priori=za=on of applica=ons Ensure policy and standards are followed Legacy applica=on related decisions (Who owns the data?) Applica=on valida=on oversight Organiza=on & Regula=on Awareness II. What? 13
14 Governance & Support Establish Ongoing Governance and Support Structure Oversight Data Reten=on Steering CommiJee Project Management Communica=on Policy & Procedure Business Sponsor Data Reten=on Program Management Exis=ng Forums Legacy Applica=on Vendor Applica=on SME Valida=on Users Applica=on Users (Training) IT Security DBA Data Reten=on Vendor II. What? 14 App Support
15 Vendor Strategy & Approach Single Vendor Mul1ple Vendors Enterprise Portal for all legacy applica=ons ( one stop ) Limited training Loss of intellectual property over =me Ease of use/support Higher return on investment Lower Opera=onal Costs Disparate Solu=ons Technical Support Impacts Higher administra=ve costs II. What? 15
16 Cone Health Archiving Summary Cone s Experience MediQuant was selected as the archiving vendor One applica=on GE/IDX Centricity Business, Ac=ve A/R 7 month project dura=on Hosted remotely ~.25 FTE =me commitment for internal IT Analyst ~.5 FTE Program Management, strategy, applica=on porqolio, future archive planning II. What? 16
17 Cone GE/IDX Timeline Nov 2014 Dec 2014 Jan 2015 Feb 2015 March 2015 Sample Extract Provided Sample Extract Loaded Sample Extract Validated Staging Period (View Only) Final Extract Provided GE/IDX Centricity Business (Physician) BAR PA & GE Centricity (Hospital) HPA PA Final Extract Loaded Final Extract Validated Go- Live 17
18 IT Analyst Role IT Department Coordina1on Liaison between end users, vendor, PM, IT department, contractors Network & security teams, Ac=ve Directory Archiving Applica1on SME Assist with valida=on Determine end user roles and security Fulfill report requests for users User administra=on up front and on- going Interim end user support Transi=on to business unit resource aner stabiliza=on is complete II. What? 18
19 Legacy Archiving III. How? Describe the speci;ic activities that have led to an improved application portfolio. 19
20 Prioritization Drivers Business opera=onal needs and =ming impacts Return on Investment Vendor Maintenance & Contractual requirements Impacts (cancella=on/no=ce requirements) Vendor applica=on confidence level Sonware not supported factors, sonware stability Infrastructure Concerns III. How? 20
21 Examples of Data Sources Op=cal Drives Applica=ons that will require formal archiving Unsupported Applica=ons Paper Charts Data PorNolio Unsupported Servers e.g. Win Server 2003 III. How? 21
22 Legacy Portfolio Components A well documented legacy applica(on por9olio is vital to the success of the program. Data Element Examples Applica=on Site Current Maintenance Vendor Fees (Annual) Addi=onal Annual Costs (Hardware, Staffing) Vendor Contract Requirements (Cancela=on) Type of Data (PM, EMR, Images) Data Timeframe Data Popula=on Reten=on Requirements Accounts Receivable Status (if PM) Technical Considera=ons Opera=onal Considera=ons Contact(s) Applica=on Name Clinic A, geographic loca=on $XX,XXX $X,XXX Descrip=on/Example 90 day no=ce prior to annual renewal PM & EMR Feb 2007 through Fall 2011 e.g. Adult, Minor, Ob/Gyn 7 years (from 2011) $XX remaining balance ac=vely being collected Hardware is unstable, not connected to the network, storage space is limited, physically located in the clinic Clinic site will move into new building over the next 6 months, prefer not to move the system due to stability issues. Primary contact name for informa=on provided. III. How? 22
23 Vendor Storage Terminology Tier Examples Interac=ve/Dynamic: Ac=ve A/R and bad debt, pos=ng payments/adjustments/account and line items, claims update, field level edi=ng, Agency exports/imports Sta=c: Data records viewed on demand either on screen or through report genera=on Vault: Full implementa=on, Front End GUI developed Straight to Vault: No GUI, validate & vault III. How? 23
24 Some Lessons Learned Enterprise Governance is an absolute must- have. There are lots of decisions! Commence archiving projects ASAP, while SMEs are s=ll available. All stakeholders need to be at the table to define requirements. Gathering requirements from legacy applica=on end- users is cri=cal. There are a small number of healthcare specific archiving vendors in this space currently, more entering the market every month. No one vendor is going to have all of the skills necessary to convert all your disparate applica=ons, there will be some ramp- up on some applica=ons. Incumbent vendors may provide archiving services. Watch out for proprietary and encrypted databases. Keep watching your converted legacy applica=ons, you may be able to vault or turn them off at some point post- conversion. Strong Project Management is required. III. How? 24
25 Questions & Open Discussion Wendy Laposata Himforma=cs Tom Chase Cone Health 25
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
IT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
Case Study. The SACM Journey at the Ontario Government
Case Study The SACM Journey at the Ontario Government Agenda Today s Objec=ves The Need for SACM Our SACM Journey Scope and Governance Process Ac=vi=es Key Process Roles Training and Measurement Lessons
PROJECT PORTFOLIO SUITE
ServiceNow So1ware Development manages Scrum or waterfall development efforts and defines the tasks required for developing and maintaining so[ware throughout the lifecycle, from incep4on to deployment.
CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records
electronic Medical Records and Genomics CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records Brian Shirts, MD, PhD University of
Phone Systems Buyer s Guide
Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers
Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.
Business Analysis Standardization A Strategic Mandate John E. Parker CVO, Enfocus Solu7ons Inc. Agenda What is Business Analysis? Why Business Analysis is Important? Why Standardization of Business Analysis
Shannon Rykaceski Director of Opera4ons CCFHCC
Shannon Rykaceski Director of Opera4ons CCFHCC PRESENTER BIO Shannon Salicce Rykaceski Director of Opera4ons for the Catholic Chari4es Free Health Care Center (CCFHCC), located in PiCsburgh, PA. Prior
HIPAA Breaches, Security Risk Analysis, and Audits
HIPAA Breaches, Security Risk Analysis, and Audits Derrick Hill Senior Health IT Advisor Kentucky REC What cons?tutes PHI? HIPAA provides a list of 18 iden?fiers that cons?tute PHI. Any one of these iden?fiers
An Introduc+on to CloudPrime
TM An Introduc+on to CloudPrime Secure messaging pla/orm to protect pa2ent privacy and uphold HIPAA/HITECH regula2on Mari Tangredi, CloudPrime 1 CloudPrime Company Overview! Headquartered in San Francisco,
PES Has The Sustainable Solu2on For Chronic Care Management
PES Has The Sustainable Solu2on For Chronic Care Management Empowering pa2ents to lead the management of their chronic diseases through a proven and effec2ve model of collabora2on with clinicians and caregivers.
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework
Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework Steven Hunt Enterprise IT Governance Strategist NASA Ames Research Center Michael
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.
Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013
Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts October 3, 2013 Agenda 1. Introductions 2. Higher Ed Industry Trends 3. Technology Trends in Higher Ed
Syndromic Surveillance BioSense Onboarding in Arizona
Syndromic Surveillance BioSense Onboarding in Arizona Sara Imholte, Stanley Kotey, Manoj Shaw & Krystal Collier Electronic Disease Surveillance Program April 1, 2015 Introduc*ons Background Onboarding
Privileged Administra0on Best Prac0ces :: September 1, 2015
Privileged Administra0on Best Prac0ces :: September 1, 2015 Discussion Contents Privileged Access and Administra1on Best Prac1ces 1) Overview of Capabili0es Defini0on of Need 2) Preparing your PxM Program
Bank of America Security by Design. Derrick Barksdale Jason Gillam
Bank of America Security by Design Derrick Barksdale Jason Gillam Costs of Correcting Defects 2 Bank of America The Three P s Product Design and build security into our product People Cultivate a security
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves
Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves Alice Squires, [email protected] Tim Ferris, David Olwell, Nicole Hutchison, Rick Adcock, John BrackeL, Mary VanLeer, Tom
Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas
Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that
Exchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
Performance Management. Ch. 8 The Strategy Implementa9on Mechanism. Chiara Demar9ni UNIVERSITY OF PAVIA. mariachiara.demar9ni@unipv.
UNIVERSITY OF PAVIA! Performance Management Ch. 8 The Strategy Implementa9on Mechanism Chiara Demar9ni [email protected] Master in Interna+onal Business and Economics! Defini9on Strategy implementa9on
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies
Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step Arbela Technologies Why Upgrade? What to do? How to do it? Tools and templates Agenda Sure Step 2012 Ax2012 Upgrade specific steps Checklist
Managing Social Media as Official Records
Managing Social Media as Official Records Archives & Records: Ensuring Access COSA, NAGARA, SAA Joint Annual Mee?ng August 10-16, 2014 Washington, D.C. Geof Huth, Director of Government Records Services,
Project Por)olio Management
Project Por)olio Management Important markers for IT intensive businesses Rest assured with Infolob s project management methodologies What is Project Por)olio Management? Project Por)olio Management (PPM)
Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing
Saving Time and Money with Web Based Benefits Administra9on and Consolidated Billing Compliancy Group Webinar 11/11/14 NOTICE: Proprietary and Confiden)al. This material is proprietary to Benera)on, LLC.
Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
ICD- 10: Learning for a Successful Transi:on Part 2. Objec.ves for the Webinars. ICD- 10 Webinar Topics
ICD- 10: Learning for a Successful Transi:on Helene Fearon, PT, FAPTA Rhea Cohn, PT, DPT August 21, 2015 Practice Management Expertise for the Rehabilitation Professional DOCUMENTATION / CODING / BILLING
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term
MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT How to Drive Adop.on, Efficiency, and ROI for the Long Term What We Will Cover Today Presenta(on Agenda! Who We Are! Our History! Par7al
Range of Organiza7onal Approaches
Status of Design and Implementa7on Plan for UH System and Mānoa Organiza7onal Changes and Consolida7ons to Improve the Efficiency and Effec7veness of Support Services Presenta7on to UH Board of Regents
Private Cloud Website Solu2on
Private Cloud Website Solu2on Who We Are 2 HighPoint Solu1ons is a premier provider of specialized Management and IT services dedicated to the Life Sciences and Healthcare industries. Since 2000, our business
Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross
Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross Evolu&on of Interoperability As HIE evolves, the interoperability framework standards advance for reliable exchange and data integra=on across
Business Analysis Center of Excellence The Cornerstone of Business Transformation
February 20, 2013 Business Analysis Center of Excellence The Cornerstone of Business Transformation John E. Parker, CEO Enfocus Solutions Inc. www.enfocussolutions.com 0 John E. Parker (Introduc3on) President
Capitalize on your carbon management solu4on investment
Capitalize on your carbon management solu4on investment Best prac4ce guide for implemen4ng carbon management so9ware Carbon Disclosure Project +44 (0) 20 7970 5660 [email protected] www.cdproject.net
DTCC Data Quality Survey Industry Report
DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6
2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance
IBM Enterprise Content Management Solu5ons Informa(on Lifecycle Governance Mohan Natraj Content Collec(on & Archiving Informa(on Lifecycle Governance Enterprise Content Management 2011 IBM Corporation
Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management
Help for JD Edwards Our Help Framework Ticket qualifica/on Ticket crea/on Ticket Rou/ng Closures L1 issues Resolu/on KG SOPs Co- ordinate Ticket Assignment Follow up Customer - communica/on System updates
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners
Financial Opera,ons Track: ROI vs. ROCE (Return on Customer Experience) Speaker: Robert Lane, Strategic Sourcing Manager, Premier Health Partners INTEGRATION: Merging internal and external excellence into
Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010
Poten&al Impact of FDA Regula&on of EMRs October 27, 2010 Agenda The case for regula&ng Impact on manufacturers Impact on providers Recommenda&ons and best prac&ces 2 A Medical Device Is an instrument,
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework
Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework Don t screw with my chain, dude! Jon Boyens Computer Security Division IT Laboratory November
Selling Hosted MS Exchange 2010 & SharePoint
Selling Hosted MS Exchange 2010 & SharePoint Presenters: David Kidd, Senior Manager, Product Management Verio Tim Shields, President and Owner Shields Technologies Moderator: Janine Soika, Channel Market
Disrup've Innova'ons Track
Disrup've Innova'ons Track Product Disrup-ons: Medical Device Cybersecurity Presenter: Adam Brand, Associate Director, Pro-vi- V. 1.1 FACULTY DISCLOSURE The faculty reported the following financial relationships
Top 5 Ways to Improve Your Billing & Collec=ons
Top 5 Ways to Improve Your Billing & Collec=ons Presenters: Jillian Longpre Vice President Franco Rizzolo, DC CEO Brought to you by: Industry leading Educa1on Cer1fied Partner Program Please ask ques1ons
Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
Fixed Scope Offering (FSO) for Oracle SRM
Fixed Scope Offering (FSO) for Oracle SRM Agenda iapps Introduc.on Execu.ve Summary Business Objec.ves Solu.on Proposal Scope - Business Process Scope Applica.on Implementa.on Methodology Time Frames Team,
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models
Retail Pharmacy Clinical Services: Influence of ACOs & Healthcare Financing Models Tim Kosty, R.Ph., MBA President Pharmacy Healthcare Solu
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
VENDOR MANAGEMENT Presented By:
VENDOR MANAGEMENT EXAMINER EXPECTATIONS FOR ASSESSING & MANAGING 3RD PARTY RISK Presented By: Tom Hinkel, VP of Compliance Services Safe Systems, Inc. Agenda Blurred Lines: Defini/on of vendor Recent regulatory
Realm of Big Data Ini0a0ves
Realm of Big Data Ini0a0ves Kamlesh Mhashilkar Head - Analy0cs, Big Data and Informa0on Management (ABIM) Prac0ce TCS Digital Enterprise Copyright 2013 Tata Consultancy Services Limited 1 Realm of Big
Panorama Consulting Group. PERFECT Fit ERP Selection Framework
Panorama Consulting Group PERFECT Fit ERP Selection Framework 1 Goals of the meeting Meeting Goals and Agenda Help Panorama better understand the Client Address questions about Panorama s ERP selection
UAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
Cloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
So#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
Pu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
How To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
