4A Healthcare Data Security & Privacy

Size: px
Start display at page:

Download "4A Healthcare Data Security & Privacy"

Transcription

1 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits and tougher enforcement while law enforcement warns that health data is under attack. Meanwhile, there is no shortage of solutions promising to protect data and prevent breaches, but not enough resources or even time in the day to review all the options. Of course, cyber security is not just an IT problem. It is a risk management problem that requires an interdisciplinary team approach. And that s what inspired the mission for this event. Ben Goodman, 4A Security & Compliance V11

2 Chairs & Speakers Ben Goodman Lisa W. Clark CEO 4A Security & Compliance Partner, Head of Firm s mhealth Interdisciplinary Group Duane Morris LLP Samantha Billy Pamela E. Clarke Senior Professional Risk Broker Aon Risk Solutions Dir. Member Services & Policy HealthShare Exchange of Southeastern Pennsylvania Noelle P. Conners Patricia Q. Connolly Hospital Compliance Officer St. Christopher s Hospital for Children Dr. Tama Copeman Founder & CEO Alcyone*7 Alcyone*7 John M. Neclerio Partner Duane Morris LLP Executive Director Center for Corporate Governance Drexel University LeBow College of Barbara Holland Regional Manager Office for Civil Rights U.S. Department of Health & Human Services Winston Krone Managing Director KIVU Consulting Inc.

3 Speakers J. Mark Eggleston Josh Ladeau Vice President, CISO & Privacy Officer Health Partners Plans Practice Lead Privacy & Network Security Allied World Assurance Co. Colin Morgan Global Information Security Manager & Information Security Officer Johnson & Johnson Jay Orler Vice President Infrastructure & Security Lightbeam Health Solutions Dave Snyder Chief Information Security Leader, Director of Information Security & Risk Management Offices Independence Blue Cross Jaime L. Sheller Product Manager for the Breach Coach Cyber Portal & Privacy Ethics Consultant NetDiligence Ben Stone Adrian Talapan Supervisory Special Agent Federal Bureau of Investigation Haystack Informatics Co-Founder and CEO A CHOP & DreamIt Ventures Company Nikhil Thakur Steve Alderfer Regulatory Policy Advisor Food & Drug Administration Director, IT Security Audit 4A Security

4 Agenda Time Topic Speakers 07:30 Registration & Breakfast 08:45 Opening Remarks Ben Goodman 4A Security & Compliance 09:00 10:00 Health & Human Services: Office of Civil Rights Update HHS OCR has seen significant change and a great deal of activity since the HIPAA Omnibus Final Rule came into effect. This year, pre-audit screening surveys were sent out to 350 covered entities and 50 business associates as part of Phase 2 of the HIPAA Audit Program. This session will provide an update on recent activity and what s on the horizon, and will explain impacts to Covered Entities, Business Associates and other stakeholders. n their value? Big Data & Population Health: Security & Privacy Challenges & Solutions Big data and population health are critical to the success of the Federal Health IT Strategic Plan , and yet, there are major security and privacy challenges that are only beginning to be addressed. This panel will consider how big data is being used and some of the key security and privacy implications for population health as well as some of the solutions that address them. than their value? Barbara Holland Office of Civil Rights U.S. Department of Health & Human Services Lisa Clark, moderator Duane Morris Dave Snyder Independence Blue Cross Jay Orler Lightbeam Health Solutions Pamela Clarke HealthShare Exchange of Southeastern Pennsylvania HHS Office of National Coordinator for Health Information - Pending confirmation 11:00 Break 11:15 12:00 Law Enforcement Update: Cybercrime & Healthcare Ten months before Anthem disclosed it was breached, the FBI warned the healthcare industry that they were under heightened risk of being the target of cyber attacks. This update from law enforcement will cover the most important past and current cybercrime activity from the law enforcement perspective. Lunch Ben Stone Federal Bureau of Investigation

5 Agenda Time Topic Speakers 01:00 Mobile Health, Apps & HIT Innovation: Security & Privacy by Design With $7B invested in healthcare IT ventures last year, innovation in mobile health, healthcare apps & healthcare IT is burgeoning. Too often data security and privacy is an afterthought, as the FDA s Safety Communication concerning cybersecurity vulnerabilities in the Symbiq Infusion System illustrates. Speakers will discuss how they are innovating & protecting data at the same time. These are models for innovation & product development that every investor should insist upon. Winston Krone Kivu Consulting Dr. Tama Copeman Alcyone*7 Adrian Talapan Haystack Informatics Nikhil Thakur Food & Drug Administration 02:00 Security & Privacy Controls: Implementation in the Real World On paper, security plans can be compelling, but the reality of constrained resources and the human factor makes implementing and maintaining the required controls a challenge. This is especially true when you factor in company culture, human resource policy, training and issues of employment law. This panel discusses real world solutions that bridge the gap between security and privacy plans and how they are implemented in the real world. Ben Goodman, moderator 4A Security Noelle Conners St. Christopher s Hospital for Children Mark Eggleston Health Partners Plans Colin Morgan Johnson & Johnson Steve Alderfer 4A Security 03:00 Break 03:15 CIOs & Healthcare Cyber Risk Management: Another New Cyber Liability Insurance Frontier CIOs generally should expect to be sued in increasing numbers over cybersecurity issues, says an attorney quoted in a recent Wall Street Journal article. How do cyber liability insurance solutions respond? Do they fill in for D&O exclusions? This panel discussion between insurance carriers, attorneys and brokers will discuss these and other important new questions healthcare organizations and their CIO s should be asking. Josh Ladeau Allied World Assurance Company John Neclerio Duane Morris LLP Samantha Billy Aon Risk Solutions

6 Agenda Time Topic Speakers 04:00 Live Tabletop Exercise: Healthcare Data Security Incident Response t This final panel of the day will step through an Incident Response Tabletop Exercise, based on a healthcare data security / privacy incident scenario. The interactive exercise will engage the audience in the process and challenge the panel members as they run through the decision-making process as a security / privacy incident unfolds. Attendees will have the chance to ask questions as participants make decisions based on imperfect information and identify areas of concern for organizations dealing with protected healthcare information. Ben Goodman, moderator 4A Security & Compliance Lisa Clark Duane Morris Winston Krone Kivu Consulting Patricia Connolly LeBow College of Business Jamie L. Sheller NetDiligence Mark Eggleston Health Partners Plans 05:00 Adjourn 05:01 Reception 4A & HB wishes to thank the sponsors and hosts!

THE AMERICAN LAW INSTITUTE Continuing Legal Education

THE AMERICAN LAW INSTITUTE Continuing Legal Education 1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Mobile Technology, Health Care, and Data Security: Minimizing the Risks and Leveraging the Benefits June 26, 2014 Telephone Seminar/Audio Webcast

More information

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360

More information

Put your Head in the Cloud at Phorum

Put your Head in the Cloud at Phorum Put your Head in the Cloud at Phorum There is no question that cloud computing and cloud strategies are at the forefront of many business leaders minds and budgets. CxOs have their heads in the clouds,

More information

DOD Medical Device Cybersecurity Considerations

DOD Medical Device Cybersecurity Considerations Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1 DHA Vision A joint,

More information

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014 Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to

More information

THE SECURITY OF THINGS

THE SECURITY OF THINGS THE SECURITY OF THINGS SECOT SECOT THURSDAY, SEPTEMBER 10, 2015 7:30 AM 4:30 PM CAMBRIDGE, MA Overview In its second year, The Security of Things Forum (SECoT 2015) is a high-impact day of learning, discussion

More information

Cybersecurity and the AICPA Cybersecurity Attestation Project

Cybersecurity and the AICPA Cybersecurity Attestation Project Cybersecurity and the AICPA Cybersecurity Attestation Project Chris Halterman Executive Director EY Chair AICPA Trust Information Integrity Task Force 2 October 2015 Increasing awareness of cybersecurity

More information

An Independent Member of Baker Tilly International

An Independent Member of Baker Tilly International Healthcare Security and Compliance July 23, 2015 Presenters Kelley Miller, CISA, CISM - Principal [email protected] Barbie Thomas, MBA, CHC [email protected] 2 Agenda Introductions Cybersecurity

More information

HIPAA Compliance: Efficient Tools to Follow the Rules

HIPAA Compliance: Efficient Tools to Follow the Rules Bank of America Merrill Lynch White Paper HIPAA Compliance: Efficient Tools to Follow the Rules Executive summary Contents The stakes have never been higher for compliance with the Health Insurance Portability

More information

Adopting a Cybersecurity Framework for Governance and Risk Management

Adopting a Cybersecurity Framework for Governance and Risk Management The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance

More information

Brief. The BakerHostetler Data Security Incident Response Report 2015

Brief. The BakerHostetler Data Security Incident Response Report 2015 Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the

More information

Cyber Liability Insurance:

Cyber Liability Insurance: Cyber Liability Insurance: Reg Harnish, CISSP, CISM, CISA Chief Security Strategist GreyCastle Security Steve Lobel Vice President Anchor Agency October 17, 2013 1,200 Introduction Cybercrime Today Major

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA

More information

Data Breach Response Planning: Laying the Right Foundation

Data Breach Response Planning: Laying the Right Foundation Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA

More information

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber

More information

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner [email protected] 202.669.0495

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner ross.buntrock@agg.com 202.669.0495 How Cybersecurity Initiatives May Impact Operators Ross A. Buntrock, Partner [email protected] 202.669.0495 Agenda! Rise in Data Breaches! Effects of Increase in Cybersecurity Threats! Cybersecurity

More information

Essential Conference Navigator

Essential Conference Navigator Essential Conference Navigator For Business Development and Marketing Professionals March 2015 10415 North College Avenue Indianapolis, Indiana 46280 USA +1.317.759.4686 www.lodestoneinsights.com 2 Table

More information

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Corporate Perspectives On Cybersecurity: A Survey Of Execs Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 [email protected] Corporate Perspectives On Cybersecurity: A Survey

More information

OVERSIGHT & COMPLIANCE

OVERSIGHT & COMPLIANCE REGISTER BY 9/13/13 AND SAVE $300 2nd Annual OVERSIGHT & COMPLIANCE Navigate State and Federal Requirements, Mitigate Fraud and Abuse Enforcement and Ensure Stakeholder Compliance NOVEMBER 13-14, 2013

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

A HEALTHCARE INDUSTRY EDI AND HIPAA COLLABORATIVE EVENT

A HEALTHCARE INDUSTRY EDI AND HIPAA COLLABORATIVE EVENT A HEALTHCARE INDUSTRY EDI AND HIPAA COLLABORATIVE EVENT PacifiCare is gathering payers, governmental officials and vendors together for what promises to be an informative and educational day of discussion

More information

Defining the Gap: The Cybersecurity Governance Study

Defining the Gap: The Cybersecurity Governance Study Defining the Gap: The Cybersecurity Governance Study Sponsored by Fidelis Cybersecurity Independently conducted by Ponemon Institute LLC Publication Date: June 2015 Ponemon Institute Research Report Defining

More information

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent

States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent SESSION ID: PNG-R04 States at Risk: Cyber Threat Sophistication, Inadequate Budget and Talent MODERATOR: Christopher Ipsen CIO Nevada Desert Research Institute PANELISTS: Tim Hastings Chief Information

More information

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire Vendor Management Challenges and Solutions for HIPAA Compliance Jim Sandford Vice President, Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control

More information

presents Energy Summit 2015 STOCKHOLM SEPTEMBER 23-24 SPONSORSHIP PROSPECT The conference is organized and arranged by: www.energysummit.

presents Energy Summit 2015 STOCKHOLM SEPTEMBER 23-24 SPONSORSHIP PROSPECT The conference is organized and arranged by: www.energysummit. presents Energy Summit 2015 STOCKHOLM SEPTEMBER 23-24 SPONSORSHIP PROSPECT The conference is organized and arranged by: www.energysummit.nu SUMMARY SVD ENERGY SUMMIT 2015 STOCKHOLM SEPTEMBER 23-24 DELEGATE

More information

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

Arizona Physicians Group To Pay $100,000 To Settle HIPAA Charges

Arizona Physicians Group To Pay $100,000 To Settle HIPAA Charges Cynthia Marcotte Stamer Board Certified Labor and Employment Law Texas Board of Legal Specialization Primary Telephone: (214) 452-8297 24-Hour Telephone (469) 767.8872 Addison Telephone (972) 588.1860

More information

Tuesday, August 16, 2011 8:30 a.m. 6 p.m. The George Washington University 1957 E Street, NW Washington, D.C.

Tuesday, August 16, 2011 8:30 a.m. 6 p.m. The George Washington University 1957 E Street, NW Washington, D.C. THE ROLE AND FUTURE OF HEALTH INFORMATION TECHNOLOGY IN AN ERA OF HEALTH CARE TRANSFORMATION Tuesday, August 16, 2011 8:30 a.m. 6 p.m. The George Washington University 1957 E Street, NW Washington, D.C.

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014

Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Cybersecurity in the Utilities Sector Best Practices and Implementation 2014 Canadian Utilities IT & Telecom Conference September 24, 2014 Victoria Yan Pillitteri Advisor for Information Systems Security

More information

Privacy and Security Awareness, Education and Training Policy

Privacy and Security Awareness, Education and Training Policy Privacy and Security Awareness, Education and Training Policy Version Approval Date Owner 1.0 June 4, 2015 Pam Clarke 1. Purpose HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) is committed

More information

Director and Officer Liability Trends and D&O Insurance Advanced Issues

Director and Officer Liability Trends and D&O Insurance Advanced Issues Director and Officer Liability Trends and D&O Insurance Advanced Issues 2 0 0 7 N A TIONAL DIRECTORS INSTITUTE 2007 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome

More information

CES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill

CES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill CES 2016 AGENDA January 2, 2016 2:00PM 5:00PM Bally s, Las Vegas 5:30PM 7:30PM Government Business Executive Forum Reception Ramsey Pub and Grill Caesar s Palace January 3, 2016 10:00AM 4:00PM 8:00AM 3:00PM

More information

Conducting due diligence and managing cybersecurity in medical technology investments

Conducting due diligence and managing cybersecurity in medical technology investments Conducting due diligence and managing cybersecurity in medical technology investments 2015 McDermott Will & Emery LLP. McDermott operates its practice through separate legal entities in each of the countries

More information

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol 1 Learning Objectives Understand Privacy and Security Requirements Understand the new OCR audit protocol Learn how to prepare

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

InfoGard Healthcare Services. 2015 InfoGard Laboratories Inc.

InfoGard Healthcare Services. 2015 InfoGard Laboratories Inc. InfoGard Healthcare Services 10 Steps To Protect My Covered Entity From Breach Your Presenters Alan Martin Account Manger Marvin Byrd Security Engineer Test and Certification Laboratory Healthcare Payment

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

Law Firm Cyber Security & Compliance Risks

Law Firm Cyber Security & Compliance Risks ALA WEBINAR Law Firm Cyber Security & Compliance Risks James Harrison CEO, INVISUS Breach Risks & Trends 27.5% increase in breaches in 2014 (ITRC) Over 500 million personal records lost or stolen in 2014

More information

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator

More information

2015 Shriners Hospitals for Children Annual Healthcare IT Symposium

2015 Shriners Hospitals for Children Annual Healthcare IT Symposium 2015 Shriners Hospitals for Children Annual Healthcare IT Symposium "Leveraging Mobile Applications and Technology in Healthcare" October 20, 2015 Mandalay Bay Resort & Casino - Las Vegas, NV Shriners

More information

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES CONTENTS Introduction 3 Brief Overview of HIPPA Final Omnibus Rule 3 Changes to the Definition of Business Associate

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society

IRS/Tax Practitioners Symposium. 2014 The Illinois CPA Society EARLY BIRD DISCOUNT Register by September 30, 2014 2014 The Illinois CPA Society Tuesday, October 21, 2014 Rosemont, IL IRS/Tax Practitioners Symposium Interact with experts, hear the latest updates and

More information

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA AHLA B. HIPAA Compliance Audits Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA Anna C. Watterson Davis Wright Tremaine LLP Washington, DC Fraud

More information

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User Valarie Burks Deputy Chief Information Officer, IT Security Division National Aeronautics and Space Administration (NASA) Agenda

More information

Driving change through health care innovation

Driving change through health care innovation Driving change through health care innovation We re transforming health care in the Philadelphia region and the nation. As health care reform swiftly moves forward, one thing is certain: We are facing

More information

JAMIE L. SHELLER SHELLER, P.C. 1528 Walnut Street, Fourth Floor Philadelphia, PA 19102 (215) 790-7300

JAMIE L. SHELLER SHELLER, P.C. 1528 Walnut Street, Fourth Floor Philadelphia, PA 19102 (215) 790-7300 JAMIE L. SHELLER SHELLER, P.C. 1528 Walnut Street, Fourth Floor Philadelphia, PA 19102 (215) 790-7300 EDUCATION: Villanova University School of Law Villanova, PA J.D., May 1989 Contributing writer to The

More information

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope

IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]

More information

Partnership prospectus

Partnership prospectus Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office

More information

Introducing our Chair for the Forum...

Introducing our Chair for the Forum... HEALTHCARE STRATEGY FORUM Introducing our Chair for the Forum... EMPOWER AUTOMATE INNOVATE CARDEN PARK COUNTRY HOTEL, CHESHIRE 11th & 12th OCTOBER 2016 Patricia Miller Dorset County Hospital NHS SPEAKERS

More information

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment 4547 The Case For HIPAA Risk Assessment Leader s Guide IMPORTANT INFORMATION FOR EDUCATION COORDINATORS & PROGRAM FACILITATORS PLEASE NOTE: In order for this program to meet Florida course requirements,

More information

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone

More information

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT share: TM CYBERSECURITY IN HEALTHCARE: A TIME TO ACT Why healthcare is especially vulnerable to cyberattacks, and how it can protect data and mitigate risk At a time of well-publicized incidents of cybersecurity

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information