4A Healthcare Data Security & Privacy
|
|
|
- Dominick Parsons
- 10 years ago
- Views:
Transcription
1 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits and tougher enforcement while law enforcement warns that health data is under attack. Meanwhile, there is no shortage of solutions promising to protect data and prevent breaches, but not enough resources or even time in the day to review all the options. Of course, cyber security is not just an IT problem. It is a risk management problem that requires an interdisciplinary team approach. And that s what inspired the mission for this event. Ben Goodman, 4A Security & Compliance V11
2 Chairs & Speakers Ben Goodman Lisa W. Clark CEO 4A Security & Compliance Partner, Head of Firm s mhealth Interdisciplinary Group Duane Morris LLP Samantha Billy Pamela E. Clarke Senior Professional Risk Broker Aon Risk Solutions Dir. Member Services & Policy HealthShare Exchange of Southeastern Pennsylvania Noelle P. Conners Patricia Q. Connolly Hospital Compliance Officer St. Christopher s Hospital for Children Dr. Tama Copeman Founder & CEO Alcyone*7 Alcyone*7 John M. Neclerio Partner Duane Morris LLP Executive Director Center for Corporate Governance Drexel University LeBow College of Barbara Holland Regional Manager Office for Civil Rights U.S. Department of Health & Human Services Winston Krone Managing Director KIVU Consulting Inc.
3 Speakers J. Mark Eggleston Josh Ladeau Vice President, CISO & Privacy Officer Health Partners Plans Practice Lead Privacy & Network Security Allied World Assurance Co. Colin Morgan Global Information Security Manager & Information Security Officer Johnson & Johnson Jay Orler Vice President Infrastructure & Security Lightbeam Health Solutions Dave Snyder Chief Information Security Leader, Director of Information Security & Risk Management Offices Independence Blue Cross Jaime L. Sheller Product Manager for the Breach Coach Cyber Portal & Privacy Ethics Consultant NetDiligence Ben Stone Adrian Talapan Supervisory Special Agent Federal Bureau of Investigation Haystack Informatics Co-Founder and CEO A CHOP & DreamIt Ventures Company Nikhil Thakur Steve Alderfer Regulatory Policy Advisor Food & Drug Administration Director, IT Security Audit 4A Security
4 Agenda Time Topic Speakers 07:30 Registration & Breakfast 08:45 Opening Remarks Ben Goodman 4A Security & Compliance 09:00 10:00 Health & Human Services: Office of Civil Rights Update HHS OCR has seen significant change and a great deal of activity since the HIPAA Omnibus Final Rule came into effect. This year, pre-audit screening surveys were sent out to 350 covered entities and 50 business associates as part of Phase 2 of the HIPAA Audit Program. This session will provide an update on recent activity and what s on the horizon, and will explain impacts to Covered Entities, Business Associates and other stakeholders. n their value? Big Data & Population Health: Security & Privacy Challenges & Solutions Big data and population health are critical to the success of the Federal Health IT Strategic Plan , and yet, there are major security and privacy challenges that are only beginning to be addressed. This panel will consider how big data is being used and some of the key security and privacy implications for population health as well as some of the solutions that address them. than their value? Barbara Holland Office of Civil Rights U.S. Department of Health & Human Services Lisa Clark, moderator Duane Morris Dave Snyder Independence Blue Cross Jay Orler Lightbeam Health Solutions Pamela Clarke HealthShare Exchange of Southeastern Pennsylvania HHS Office of National Coordinator for Health Information - Pending confirmation 11:00 Break 11:15 12:00 Law Enforcement Update: Cybercrime & Healthcare Ten months before Anthem disclosed it was breached, the FBI warned the healthcare industry that they were under heightened risk of being the target of cyber attacks. This update from law enforcement will cover the most important past and current cybercrime activity from the law enforcement perspective. Lunch Ben Stone Federal Bureau of Investigation
5 Agenda Time Topic Speakers 01:00 Mobile Health, Apps & HIT Innovation: Security & Privacy by Design With $7B invested in healthcare IT ventures last year, innovation in mobile health, healthcare apps & healthcare IT is burgeoning. Too often data security and privacy is an afterthought, as the FDA s Safety Communication concerning cybersecurity vulnerabilities in the Symbiq Infusion System illustrates. Speakers will discuss how they are innovating & protecting data at the same time. These are models for innovation & product development that every investor should insist upon. Winston Krone Kivu Consulting Dr. Tama Copeman Alcyone*7 Adrian Talapan Haystack Informatics Nikhil Thakur Food & Drug Administration 02:00 Security & Privacy Controls: Implementation in the Real World On paper, security plans can be compelling, but the reality of constrained resources and the human factor makes implementing and maintaining the required controls a challenge. This is especially true when you factor in company culture, human resource policy, training and issues of employment law. This panel discusses real world solutions that bridge the gap between security and privacy plans and how they are implemented in the real world. Ben Goodman, moderator 4A Security Noelle Conners St. Christopher s Hospital for Children Mark Eggleston Health Partners Plans Colin Morgan Johnson & Johnson Steve Alderfer 4A Security 03:00 Break 03:15 CIOs & Healthcare Cyber Risk Management: Another New Cyber Liability Insurance Frontier CIOs generally should expect to be sued in increasing numbers over cybersecurity issues, says an attorney quoted in a recent Wall Street Journal article. How do cyber liability insurance solutions respond? Do they fill in for D&O exclusions? This panel discussion between insurance carriers, attorneys and brokers will discuss these and other important new questions healthcare organizations and their CIO s should be asking. Josh Ladeau Allied World Assurance Company John Neclerio Duane Morris LLP Samantha Billy Aon Risk Solutions
6 Agenda Time Topic Speakers 04:00 Live Tabletop Exercise: Healthcare Data Security Incident Response t This final panel of the day will step through an Incident Response Tabletop Exercise, based on a healthcare data security / privacy incident scenario. The interactive exercise will engage the audience in the process and challenge the panel members as they run through the decision-making process as a security / privacy incident unfolds. Attendees will have the chance to ask questions as participants make decisions based on imperfect information and identify areas of concern for organizations dealing with protected healthcare information. Ben Goodman, moderator 4A Security & Compliance Lisa Clark Duane Morris Winston Krone Kivu Consulting Patricia Connolly LeBow College of Business Jamie L. Sheller NetDiligence Mark Eggleston Health Partners Plans 05:00 Adjourn 05:01 Reception 4A & HB wishes to thank the sponsors and hosts!
THE AMERICAN LAW INSTITUTE Continuing Legal Education
1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Mobile Technology, Health Care, and Data Security: Minimizing the Risks and Leveraging the Benefits June 26, 2014 Telephone Seminar/Audio Webcast
HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042
HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360
Put your Head in the Cloud at Phorum
Put your Head in the Cloud at Phorum There is no question that cloud computing and cloud strategies are at the forefront of many business leaders minds and budgets. CxOs have their heads in the clouds,
DOD Medical Device Cybersecurity Considerations
Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
THE SECURITY OF THINGS
THE SECURITY OF THINGS SECOT SECOT THURSDAY, SEPTEMBER 10, 2015 7:30 AM 4:30 PM CAMBRIDGE, MA Overview In its second year, The Security of Things Forum (SECoT 2015) is a high-impact day of learning, discussion
Cybersecurity and the AICPA Cybersecurity Attestation Project
Cybersecurity and the AICPA Cybersecurity Attestation Project Chris Halterman Executive Director EY Chair AICPA Trust Information Integrity Task Force 2 October 2015 Increasing awareness of cybersecurity
An Independent Member of Baker Tilly International
Healthcare Security and Compliance July 23, 2015 Presenters Kelley Miller, CISA, CISM - Principal [email protected] Barbie Thomas, MBA, CHC [email protected] 2 Agenda Introductions Cybersecurity
HIPAA Compliance: Efficient Tools to Follow the Rules
Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability
Adopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
Brief. The BakerHostetler Data Security Incident Response Report 2015
Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the
Cyber Liability Insurance:
Cyber Liability Insurance: Reg Harnish, CISSP, CISM, CISA Chief Security Strategist GreyCastle Security Steve Lobel Vice President Anchor Agency October 17, 2013 1,200 Introduction Cybercrime Today Major
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
Data Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495
How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity
Essential Conference Navigator
Essential Conference Navigator For Business Development and Marketing Professionals March 2015 10415 North College Avenue Indianapolis, Indiana 46280 USA +1.317.759.4686 www.lodestoneinsights.com 2 Table
Corporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey
OVERSIGHT & COMPLIANCE
REGISTER BY 9/13/13 AND SAVE $300 2nd Annual OVERSIGHT & COMPLIANCE Navigate State and Federal Requirements, Mitigate Fraud and Abuse Enforcement and Ensure Stakeholder Compliance NOVEMBER 13-14, 2013
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
A HEALTHCARE INDUSTRY EDI AND HIPAA COLLABORATIVE EVENT
A HEALTHCARE INDUSTRY EDI AND HIPAA COLLABORATIVE EVENT PacifiCare is gathering payers, governmental officials and vendors together for what promises to be an informative and educational day of discussion
Defining the Gap: The Cybersecurity Governance Study
Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining
States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent
SESSION ID: PNG-R04 States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent MODERATOR: Christopher Ipsen CIO Nevada Desert Research Institute PANELISTS: Tim Hastings Chief Information
Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire
Vendor Management Challenges and Solutions for HIPAA Compliance Jim Sandford Vice President, Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control
presents Energy Summit 2015 STOCKHOLM SEPTEMBER 23-24 SPONSORSHIP PROSPECT The conference is organized and arranged by: www.energysummit.
presents Energy Summit 2015 STOCKHOLM SEPTEMBER 23-24 SPONSORSHIP PROSPECT The conference is organized and arranged by: www.energysummit.nu SUMMARY SVD ENERGY SUMMIT 2015 STOCKHOLM SEPTEMBER 23-24 DELEGATE
Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
Arizona Physicians Group To Pay $100,000 To Settle HIPAA Charges
Cynthia Marcotte Stamer Board Certified Labor and Employment Law Texas Board of Legal Specialization Primary Telephone: (214) 452-8297 24-Hour Telephone (469) 767.8872 Addison Telephone (972) 588.1860
Tuesday, August 16, 2011 8:30 a.m. 6 p.m. The George Washington University 1957 E Street, NW Washington, D.C.
THE ROLE AND FUTURE OF HEALTH INFORMATION TECHNOLOGY IN AN ERA OF HEALTH CARE TRANSFORMATION Tuesday, August 16, 2011 8:30 a.m. 6 p.m. The George Washington University 1957 E Street, NW Washington, D.C.
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014
Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security
Privacy and Security Awareness, Education and Training Policy
Privacy and Security Awareness, Education and Training Policy Version Approval Date Owner 1.0 June 4, 2015 Pam Clarke 1. Purpose HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) is committed
Director and Officer Liability Trends and D&O Insurance Advanced Issues
Director and Officer Liability Trends and D&O Insurance Advanced Issues 2 0 0 7 N A TIONAL DIRECTORS INSTITUTE 2007 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome
CES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill
CES 2016 AGENDA January 2, 2016 2:00PM 5:00PM Bally s, Las Vegas 5:30PM 7:30PM Government Business Executive Forum Reception Ramsey Pub and Grill Caesar s Palace January 3, 2016 10:00AM 4:00PM 8:00AM 3:00PM
Conducting due diligence and managing cybersecurity in medical technology investments
Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries
Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol
Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol 1 Learning Objectives Understand Privacy and Security Requirements Understand the new OCR audit protocol Learn how to prepare
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
InfoGard Healthcare Services. 2015 InfoGard Laboratories Inc.
InfoGard Healthcare Services 10 Steps To Protect My Covered Entity From Breach Your Presenters Alan Martin Account Manger Marvin Byrd Security Engineer Test and Certification Laboratory Healthcare Payment
The Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
Law Firm Cyber Security & Compliance Risks
ALA WEBINAR Law Firm Cyber Security & Compliance Risks James Harrison CEO, INVISUS Breach Risks & Trends 27.5% increase in breaches in 2014 (ITRC) Over 500 million personal records lost or stolen in 2014
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
2015 Shriners Hospitals for Children Annual Healthcare IT Symposium
2015 Shriners Hospitals for Children Annual Healthcare IT Symposium "Leveraging Mobile Applications and Technology in Healthcare" October 20, 2015 Mandalay Bay Resort & Casino - Las Vegas, NV Shriners
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES
White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate
CYBER RISK INTERNATIONAL COMPANY PROFILE
CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.
IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society
EARLY BIRD DISCOUNT Register by September 30, 2014 2014 The Illinois CPA Society Tuesday, October 21, 2014 Rosemont, IL IRS/Tax Practitioners Symposium Interact with experts, hear the latest updates and
AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA
AHLA B. HIPAA Compliance Audits Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA Anna C. Watterson Davis Wright Tremaine LLP Washington, DC Fraud
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User
Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda
Driving change through health care innovation
Driving change through health care innovation We re transforming health care in the Philadelphia region and the nation. As health care reform swiftly moves forward, one thing is certain: We are facing
JAMIE L. SHELLER SHELLER, P.C. 1528 Walnut Street, Fourth Floor Philadelphia, PA 19102 (215) 790-7300
JAMIE L. SHELLER SHELLER, P.C. 1528 Walnut Street, Fourth Floor Philadelphia, PA 19102 (215) 790-7300 EDUCATION: Villanova University School of Law Villanova, PA J.D., May 1989 Contributing writer to The
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
Partnership prospectus
Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office
Introducing our Chair for the Forum...
HEALTHCARE STRATEGY FORUM Introducing our Chair for the Forum... EMPOWER AUTOMATE INNOVATE CARDEN PARK COUNTRY HOTEL, CHESHIRE 11th & 12th OCTOBER 2016 Patricia Miller Dorset County Hospital NHS SPEAKERS
How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment
4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,
8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice
Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone
CYBERSECURITY IN HEALTHCARE: A TIME TO ACT
share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
