(Subject to Change) 10:00-10:45 AM BYOD and MDM: Reducing Risk on the Mobile Perimeter Moderator Chris Crowley Ethical Hacker SANS Institute

Size: px
Start display at page:

Download "(Subject to Change) 10:00-10:45 AM BYOD and MDM: Reducing Risk on the Mobile Perimeter Moderator Chris Crowley Ethical Hacker SANS Institute"

Transcription

1 (Subject to Change) 8:30-9:00 AM Badge Pickup & Check-In 9:00-9:45 AM KEYNOTE: Enabling Mobile Healthcare: Privacy & Security in an Era of Accelerating Change Speaker Karl West Intermountain Healthcare 9:45 10:00 AM TBD 10:00-10:45 AM BYOD and MDM: Reducing Risk on the Mobile Perimeter Moderator Chris Crowley Ethical Hacker SANS Institute Anahi Santiago Director Information Security and Support Services Einstein Healthcare Network Lee Kim Director, Privacy & Security HIMSS Stephen Cobb Senior Security Researcher ESET North America John Donohue Associate CIO of Technology & Infrastructure Penn Medicine Adam Kehler Privacy & Security Expert Regional Extension Center for Pennsylvania East and West 10:45-11:00 AM Break 11:00-11:45 AM Medical Device Security: How to Crack a Very Tough Nut Moderator Dale Nordenberg Co-founder & Executive Director Medical Device Innovation, Safety and Security Consortium Chad Wilson Director, IT Security Children's National Medical Center Darren Lacey Johns Hopkins University and Johns Hopkins Medicine Page: 1

2 Axel Wirth Healthcare Solutions Architect Symantec Corporation Kevin Fu Associate Professor, Computer Science & Engineering University of Michigan 11:45-12:15 AM Best Practices from NIST: Use Military Might to Secure Mobile Apps Speaker Jeff Voas Computer Scientist National Institute of Standards and Technology 12:15-1:15 PM mhealth Updates, Advice & Best Practices from the FDA, OCR and ONC Moderator Tom Sullivan Executive Editor HIMSS Media Kathryn Marchesini Acting Chief Privacy Officer Office of the National Coordinator for Health IT Suzanne Schwartz Director Emergency Preparedness/Operations & Medical Countermeasures Center for Devices & Radiological Health US Food and Drug Administration Iliana Peters Senior Advisor for HIPAA Compliance and Enforcement Office for Civil Rights 1:15-2:00 PM Networking Luncheon 2:00 2:45 PM Risky Business: Mitigating mhealth Workarounds with "Usable" Security Moderator Sal Volpe Physician Solo Physician Practioner Thompson Boyd Physician Liaison Hahnemann University Hospital David Houlding Senior Security & Privacy Researcher Intel Mark Parkulo Vice-Chair, Meaningful Use Coordinating Group Mayo Clinic Glenn Fala Senior Director of Software Development Penn Medicine Page: 2

3 2:45-3:15 PM The Brave New World of Patient-Generate Data and What it Means for Healthcare Privacy & Security Speaker Robert Havasy Vice President Personal Connected Health Alliance 3:15-3:30 PM Break 3:30-4:15 PM KEYNOTE: Realizing the Vision of a Secure & Connected Mobile World Speaker James Doggett SVP, Chief Security Officer and Chief Technology Risk Officer Kaiser Permanente 4:15-4:45 PM Research Central: Developing a Secure mhealth Platform for Wearables Speaker David Kotz Champion International Professor Department of Computer Science - Dartmouth College 4:45-5:30 PM Wrap-up with the Mobile Privacy & Security Genius Bar Moderator Kevin Johnson Founder Secure Ideas Mark Parkulo Vice-Chair, Meaningful Use Coordinating Group Mayo Clinic John Donohue Associate Chief Information Officer of Technology & Infrastructure Penn Medicine Darren Lacey Johns Hopkins University and Johns Hopkins Medicine Karl West Intermountain Healthcare 5:30-6:30 PM Networking Reception Page: 3

4 Enabling Mobile Healthcare: Privacy & Security in an Era of Accelerating Change The mobile tsunami is upon us. Whether it is a new app, smart phone operating system, or medical device, advances in mobile technology seem to be accelerating at warp speed. Without a doubt, mhealth presents unique opportunities for increasing clinician productivity and engaging patients - from devices at the bedside to health data tracking in the home. However, it also presents often-daunting privacy and security challenges. Nobody knows that better than Karl West, CISO of Intermountain Healthcare, which operates 22 hospitals in Utah and one in Idaho. Intermountain has a long history of securely adopting, developing, and implementing new technologies, including an aggressive but prudent adoption of mhealth. In his keynote presentation, from his seat at one of the most innovative healthcare organization in the world, West will address the forces fueling the mhealth revolution, discuss Intermountain s mobile initiatives, and then explain what he considers the best and most practical way to mitigate the related risks. BYOD and MDM: Managing Risk on the Mobile Perimeter With four out of every five physicians using smartphones and/or tablets, it is safe to say that BYOD is here to stay. However, what must healthcare organizations do to make sure this does not lead to security breaches? How can they protect every device while ensuring that staff workflows are not compromised? When it comes to answering these questions, top healthcare security professionals say that it all starts mobile device management (MDM). The threshold question is: Do you have MDM, and what is your strategy for MDM, says Darren Lacey, CISO for Johns Hopkins University and Johns Hopkins Medicine. This is the most important issue facing us. What are we doing with MDM? What are we doing to enforce policy? How much security do we expect out of it? And what will it look like in the future. Following an overview of the proliferation of personal mobile devices and the primary security threats, this session will discuss these key MDM questions directly, as well policies and procedures for specific use cases such as texting and image transfer. Medical Device Security: How to Crack a Very Tough Nut As more data from medical devices is fed into EHRs on a provider s network, finding ways to secure and protect the devices from viruses and other cyber threats has become a vital part of any comprehensive security program. Securing medical devices, however, is a tough nut to crack for a number of reasons. Many are not managed by the IT department; clinicians are often resistant to new security safeguards that may impact their workflow; medical device vendors are often unresponsive to requests for security upgrades; and some of the upgrades can be prohibitively expensive. In this session, moderator Dale Nordenberg, executive director of the Medical Device Innovation, Safety, and Security Consortium (MDISS), identifies drivers for an increased regulatory focus on medical device security and the potential dangers these devices pose, if not equipped with adequate security safeguards, to patient safety. Then leading healthcare security discuss, among other things: 1. New FDA guidelines that require vendors to address risks more quickly 2. Practices for assessing and mitigating medical device risks 3. Processes for approving requests for new medical devices 4. Responding to infected devices 5. Educating clinicians and administrators to the security risks medical devices pose Best Practices from NIST: Use Military Might to Secure Mobile Apps Here is a scary fact: An estimated 80% of physicians use mobile apps as part of their medical practices, and many of these apps were not designed for healthcare and lack essential privacy and security safeguards, creating an ideal situation for a breach. That is where the National Institute of Standards and Technology (NIST) come in. Page: 4

5 The organization was recently honored for contributing its expertise in cyber security and software performance evaluation as part of a program to help the U.S. military evaluate mobile apps more effectively for use in the battlefield. NIST has since taken that research and created a guide to help healthcare organizations (and others) leverage the benefits of mobile apps while managing their risks. In this session, NIST computer scientist Jeff Voas explains that process. He will cover mobile app testing requirements, such as security, functionality, performance and reliability; and mobile app vetting tools and techniques. He ll also review software assurance issues, describe undesirable characteristics that vetting may reveal, and provide examples of security weakness issues affecting apps. mhealth Updates, Advice, and Best Practices from the OCR and ONC In this session, top privacy and security officials from the Office for Civil Rights and the Office of the National Coordinator for Health IT will discuss best practices for securing mobile devices as well as areas where they see providers falling short. Panelists will also address HIPAA enforcement, rules, regulations and other mhealth issues critical to attendees, who will have ample opportunity to ask questions. Risky Business: Mitigating mhealth Workarounds with Usable Security According to a recent survey, 21% of 674 healthcare employees said they practice workarounds every day, and 30% said they sometimes use workarounds to perform their jobs. No doubt this is risky business and exacerbated by healthcare workers using powerful collaboration apps, social media, texting, and other powerful mhealth personal communication devices. In this session, our panelists will discuss approaches to mitigating workarounds by digging deeper into: How physicians and other healthcare employees are using mhealth tools to accomplish tasks Security safeguards they like and dislike and why Common workarounds Best practices to prevent workarounds (training, technology, and administrative controls) The need to create usable privacy and security policies and procedures that make workarounds unnecessary. The Brave New World of Patient-Generate Data and What it Means for Healthcare Privacy & Security The Center for Connected Health at Partners Healthcare is renowned for its work in developing innovative and effective solutions, including mhealth, for delivering quality patient care outside traditional settings. Recently, the center has been investigating how healthcare professionals can prepare for the tidal wave of patient-generated data weight loss, blood pressure, etc. that is just starting to hit their shores, and, specifically, what they must do to secure this vector. Although HIPAA does not technically apply until a healthcare provider receives data, patients expect that the data they share from consumer devices will be as secure as anything their healthcare provider might give them. We are entering a brave new world, and there s a lot of concern about data getting into the wrong hands, says Robert Havasy, technology and strategy expert at the Center for Connected Health. In this session, Havasy discusses how the explosion in patient-generated data will transform healthcare. He will also give an overview of the support systems that need to be in place for privacy and security and broader enterprise integration. Manage Risk and Take Hold of the Future What is that reverberation you hear? It is the pace of change echoing throughout the healthcare industry thanks to non-stop advances in technology. That pace is dramatically changing our risk landscape, and healthcare privacy and security initiatives must evolve constantly to address new and growing threats. In his highly engaging style, James Doggett, senior vice president and chief technology risk officer for Kaiser Permanente, will call on more than 20 years of information security experience to discuss the state of the health IT industry, with a special emphasis how to protect your organization's technology assets and data and the role risk management will play in defining the future of healthcare. Change is constant in healthcare and the related privacy and security threats can cause concern. Fortunately, as Jim will explain, there are ways to mitigate changes and the risks they represent so that you do not get steamrolled by the future. Page: 5

6 Research Central: Developing a Secure mhealth Platform for Wearables Many of the most compelling mhealth applications are designed to enable long-term health monitoring for, among other things, outpatients with chronic medical conditions and for physicians seeking to quantify and detect behavioral aberrations for early diagnosis. But while mhealth devices and applications are proliferating, many challenges remain to provide the necessary usability, manageability, interoperability, availability, security, and privacy. In this session, Dartmouth College computer science professor David Kotz reviews the progress of a project intended to engineer the tools for secure wearable mhealth. Importantly, for healthcare security professionals tasked to secure this growing proliferation of wearables, Kotz will discuss the keys to creating an mhealth platform that is secure, provides high availability, and allows for the deployment of multiple third-party applications that share resources in a body-area network. Wrap-up with the Mobile Privacy & Security Genius Bar The Mobile Privacy & Security Genius Bar is a takeoff on the name for the in-store tech support provided in retail Apple Stores. After a full day of mobile security presentations, this is an opportunity to tie up loose ends, for attendees and speakers to address unanswered questions, and share final thoughts and ideas on mobile privacy and security. Page: 6

Essential Conference Navigator

Essential Conference Navigator Essential Conference Navigator For Business Development and Marketing Professionals March 2015 10415 North College Avenue Indianapolis, Indiana 46280 USA +1.317.759.4686 www.lodestoneinsights.com 2 Table

More information

Advances, Opportunities and Innovative Solutions for Consumer and Clinical Wireless Medical Devices

Advances, Opportunities and Innovative Solutions for Consumer and Clinical Wireless Medical Devices BIOMEDevice San Jose Conference: Wireless Medical Device December 2-3, 2015 San Jose Convention Center Advances, Opportunities and Innovative Solutions for Consumer and Clinical Wireless Medical Devices

More information

Workarounds in Healthcare, a Risky Trend. Produced by. media

Workarounds in Healthcare, a Risky Trend. Produced by. media Workarounds in Healthcare, a Risky Trend. Produced by media When healthcare workers bring their own laptop computers, tablets and smartphone devices to work, and use them to perform workarounds a way to

More information

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from

A 5-STEP PLAN TO PREPARE FOR HEALTHCARE. A Complimentary White Paper from A 5-STEP PLAN TO PREPARE FOR BYOD IN HEALTHCARE A Complimentary White Paper from A 5-step plan to prepare for BYOD in health care A Complimentary White Paper from Healthcare Business & Technology Nearly

More information

SANS Healthcare Cyber Security Summit 2013. Agenda. All Summit Sessions will be held in CA Thayer Ballroom (unless noted).

SANS Healthcare Cyber Security Summit 2013. Agenda. All Summit Sessions will be held in CA Thayer Ballroom (unless noted). Program Guide Agenda All Summit Sessions will be held in CA Thayer Ballroom (unless noted). All approved presentations will be available online following the Summit at https://files.sans.org/summits/healthcare13.

More information

Featuring industry research by. Produced by

Featuring industry research by. Produced by Featuring industry research by Produced by With the ubiquity of personal electronic devices, healthcare workers are all too commonly performing workarounds alternatives to approved workflows that bypass

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED

BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED SM BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED HOW DO YOU BYOD? A popular topic for hospitals right now is whether to allow employees to use their personal smartphones

More information

Healthcare IT Trending Issues for 2015

Healthcare IT Trending Issues for 2015 Healthcare IT Trending Issues for 2015 January 2015 Contents Providers Start to Really Pay Attention to Privacy and Security... 3 Hospitals Take a New Interest in Upgrading Administrative Information Systems...

More information

Cyberprivacy and Cybersecurity for Health Data

Cyberprivacy and Cybersecurity for Health Data Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies

More information

Mobile Applications in Community-Based Mental Health: The Time is Now

Mobile Applications in Community-Based Mental Health: The Time is Now Mobile Applications in Community-Based Mental Health: The Time is Now 1 Executive Summary Behavioral health providers face increasing challenges to support larger caseloads and productivity goals, regulatory

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Health Informatics. Health Informatics. Key Message. Health Informatics 01/29/2014. Jean Johnson, PhD, RN, FAAN 1

Health Informatics. Health Informatics. Key Message. Health Informatics 01/29/2014. Jean Johnson, PhD, RN, FAAN 1 Health Informatics Jean Johnson, PhD, RN, FAAN Dean and Professor George Washington University This program generously funded by the Robert Wood Johnson Foundation Health Informatics Use information and

More information

Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources

Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources NIST/OCR Conference June 6, 2012 Speaker Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy and Security

More information

BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED

BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED SM BYOD TRENDS IN HEALTHCARE: AN INDUSTRY SNAPSHOT 2015 SURVEY RESULTS REVEALED HOW DO YOU BYOD? A popular topic for hospitals right now is whether to allow employees to use their personal smartphones

More information

Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources

Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources HOA Mobility Conference Sept 27, 2012 Speaker Lisa A. Gallagher, BSEE, CISM, CPHIMS Senior Director, Privacy

More information

June 15 th -17 th, 2015 Optimizing Operations in the Ever-Changing Environment of Healthcare Providers

June 15 th -17 th, 2015 Optimizing Operations in the Ever-Changing Environment of Healthcare Providers 4:30pm 6:00pm June 15 th -17 th, 2015 Optimizing Operations in the Ever-Changing Environment of Healthcare Providers Roundtable Sessions Track 1: Achieving Goals: Patient Engagement Track 2: Managing the

More information

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015

Cybersecurity Best Practices in Mortgage Banking. Article by Jim Deitch October 2015 Cybersecurity Best Practices in Mortgage Banking Article by Jim Deitch Cybersecurity Best Practices in Mortgage Banking BY JIM DEITCH Jim Deitch Recent high-profile cyberattacks have clearly demonstrated

More information

Proactive IT Risk Management Mary Washington Healthcare embraces phased risk management approach

Proactive IT Risk Management Mary Washington Healthcare embraces phased risk management approach Mary WAShington Healthcare CASE STUDY BY Proactive IT Risk Management embraces phased risk management approach Mike Vida (left), Sr. Security Analyst, Security Program Office, Joyce Hanscome (center),

More information

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement

More information

Bring Your Own Device Policy. Report to the Joint Legislative Oversight Committee on Information Technology

Bring Your Own Device Policy. Report to the Joint Legislative Oversight Committee on Information Technology Bring Your Own Device Policy Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer March 2014 This page left blank intentionally Contents

More information

Guideline on Safe BYOD Management

Guideline on Safe BYOD Management CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version

More information

CONNECTED HEALTHCARE. Trends, Challenges & Solutions

CONNECTED HEALTHCARE. Trends, Challenges & Solutions CONNECTED HEALTHCARE Trends, Challenges & Solutions Trend > Remote monitoring and telemedicine are growing Digital technology for healthcare is accelerating. Changes are being driven by the digitization

More information

Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP

Security & Privacy Strategies for Expanded Communities. Deven McGraw Partner Manatt, Phelps & Phillips LLP Security & Privacy Strategies for Expanded Communities Deven McGraw Partner Manatt, Phelps & Phillips LLP 1 Key Challenges in Community Data Sharing Patient-mediated data sharing Sharing data with companies

More information

SOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term?

SOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF June 2014 How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF While bring your own device (BYOD) and physician texting are hot

More information

5 HIPAA-Compliant Best Practices for Mobile Devices in Healthcare

5 HIPAA-Compliant Best Practices for Mobile Devices in Healthcare 5 HIPAA-Compliant Best Practices for Mobile Devices in Healthcare How to Enhance Patient Services Without Sacrificing Patient Privacy A FreedomPACS White Paper for the Healthcare Industry with a Special

More information

THE AMERICAN LAW INSTITUTE Continuing Legal Education

THE AMERICAN LAW INSTITUTE Continuing Legal Education 1 THE AMERICAN LAW INSTITUTE Continuing Legal Education Mobile Technology, Health Care, and Data Security: Minimizing the Risks and Leveraging the Benefits June 26, 2014 Telephone Seminar/Audio Webcast

More information

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response

Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary

More information

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives Cyber Risk as a Component of Business Risk: Communicating with the C-Suite Jigar Kadakia DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily

More information

Implemen'ng an Enterprise Framework for Secure Health Data Exchange

Implemen'ng an Enterprise Framework for Secure Health Data Exchange Implemen'ng an Enterprise Framework for Secure Health Data Exchange Gregory Franklin, Assistant Secretary, California Technology Agency Jim Rose, Deputy CIO, Indiana Office of Technology Robert Myles,

More information

OPEN MINDS 2012 Planning & Innovation Institute

OPEN MINDS 2012 Planning & Innovation Institute Panel: Trish Cavestany, MSN, RN, CCM Director, Clinical Products and Services, Robert Bosch Healthcare Systems Steve Daviss, MD Chair, Dept Psychiatry, Baltimore Washington Medical Center Chair, Committee

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

Learning about Technology through Global Healthcare

Learning about Technology through Global Healthcare Kyle Pollock www.meditourexpo.net Learning about Technology through Global Healthcare Global Healthcare is defined as crossing borders for care and requires innovation in ways to communicate with different

More information

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk A Hootsuite & Nexgate White Paper Mapping Organizational Roles & Responsibilities for Social Media Risk Executive Summary

More information

2015 Events. Where innovation meets insight PRIVACY & SECURITY REVENUE CYCLE SOLUTIONS BIG DATA ANALYTICS PATIENT ENGAGEMENT

2015 Events. Where innovation meets insight PRIVACY & SECURITY REVENUE CYCLE SOLUTIONS BIG DATA ANALYTICS PATIENT ENGAGEMENT 2015 Events Where innovation meets insight PRIVACY & SECURITY REVENUE CYCLE SOLUTIONS BIG DATA ANALYTICS PATIENT ENGAGEMENT Welcome to HIMSS Media Events Come meet the innovators and thinkers reshaping

More information

Mobile Security: Controlling Growing Threats with Mobile Device Management

Mobile Security: Controlling Growing Threats with Mobile Device Management Mobile Security: Controlling Growing Threats with Mobile Device Management As the use of mobile devices continues to grow, so do mobile security threats. Most people use their mobile devices for both work

More information

FROM DATA TO KNOWLEDGE: INTEGRATING ELECTRONIC HEALTH RECORDS MEANINGFULLY INTO OUR NURSING PRACTICE

FROM DATA TO KNOWLEDGE: INTEGRATING ELECTRONIC HEALTH RECORDS MEANINGFULLY INTO OUR NURSING PRACTICE FROM DATA TO KNOWLEDGE: INTEGRATING ELECTRONIC HEALTH RECORDS MEANINGFULLY INTO OUR NURSING PRACTICE Rayne Soriano MS, RN Manager of Nursing Informatics and Clinical Transformation Program Kaiser Permanente

More information

How Technology Executives are Managing the Shift to BYOD

How Technology Executives are Managing the Shift to BYOD A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the

More information

Dallas, TX September 10. Chairman: Lance Spitzner

Dallas, TX September 10. Chairman: Lance Spitzner Dallas, TX September 10 Chairman: Lance Spitzner AGENDA All Summit Sessions will be held in the Vista Ballroom (unless noted). All approved presentations will be available online following the Summit

More information

How To Be A Successful Health Care Security Consultant

How To Be A Successful Health Care Security Consultant Cybersecurity and Interoperability: Working together for Patient Safety Sponsored by In his current role, Bill provides executive leadership and oversight to Information Security programs and to the Governance,

More information

Meaningful Use and Security Risk Analysis

Meaningful Use and Security Risk Analysis Meaningful Use and Security Risk Analysis Meeting the Measure Security in Transition Executive Summary Is your organization adopting Meaningful Use, either to gain incentive payouts or to avoid penalties?

More information

LEVERAGING EXISTING IT INFRASTRUCTURE FOR IMPLEMENTING & INTEGRATING A PATIENT ENGAGEMENT SYSTEM

LEVERAGING EXISTING IT INFRASTRUCTURE FOR IMPLEMENTING & INTEGRATING A PATIENT ENGAGEMENT SYSTEM LEVERAGING EXISTING IT INFRASTRUCTURE FOR IMPLEMENTING & INTEGRATING A PATIENT ENGAGEMENT SYSTEM COAXIAL CABLE RF CAT 5/CAT 6 ETHERNET WIFI STAFF COMMUNICATION EMR NURSE CALL SYSTEM REAL-TIME LOCATION

More information

Health Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules. The Curriculum.

Health Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules. The Curriculum. Health Information Management Systems Technology and Analysis (HIMSTA) Domains, Competencies and Modules Introduction: The Curriculum The outline below frames the 14 modules of this curriculum within their

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

Disclosure of Conflict of Interest

Disclosure of Conflict of Interest Challenging the Status Quo of Telehealth in Policy, Technology, & Clinical Care H. Stephen Lieber President and Chief Executive Officer HIMSS Disclosure of Conflict of Interest No Conflict of Interest

More information

CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE

CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE CREATING AN EFFECTIVE SUPPORT PLAN FOR BYOD: A BEST PRACTICE GUIDE Delivering The Connected Enterprise Workforce Enablement Asset Management Customer Engagement Network Infrastructure Introduction Bring

More information

DRAFT. Medical School Health IT Curriculum Topics. Matthew Swedlund, John Beasley, Erkin Otles, Eneida Mendonca

DRAFT. Medical School Health IT Curriculum Topics. Matthew Swedlund, John Beasley, Erkin Otles, Eneida Mendonca Medical School Health IT Curriculum Topics DRAFT Matthew Swedlund, John Beasley, Erkin Otles, Eneida Mendonca PC3. Use information technology to optimize patient care. 1. Attributes relating to appropriate

More information

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca

More information

HealthTECH Workforce Forum Presents: Electronic Health Records Adoption: Driving to 2015 and Beyond

HealthTECH Workforce Forum Presents: Electronic Health Records Adoption: Driving to 2015 and Beyond HealthTECH Workforce Forum Presents: Electronic Health Records Adoption: Driving to 2015 and Beyond May 19 th, 2011 EHR Implementation Panel Moderator: Paula J. Magnanti, MT(ASCP) Founder & Managing Principal

More information

Big Data in Health Care: Rewards and Risks. Daniel J. Weissburg, JD, CHC, Privacy Officer, UW Health Molly R. Berkery, JD, MPH, Godfrey & Kahn, S.C.

Big Data in Health Care: Rewards and Risks. Daniel J. Weissburg, JD, CHC, Privacy Officer, UW Health Molly R. Berkery, JD, MPH, Godfrey & Kahn, S.C. Big Data in Health Care: Rewards and Risks Daniel J. Weissburg, JD, CHC, Privacy Officer, UW Health Molly R. Berkery, JD, MPH, Godfrey & Kahn, S.C. Outline Big Data in Health Care Impetus Benefits & Potential

More information

VHCA Legal Quarterly

VHCA Legal Quarterly VHCA Legal Quarterly Winter 2015 Text Messaging in Nursing Facility Patient Care: HIPAA Challenges, Survey Scrutiny, and Possible Solutions Written by Nathan Mortier and Peter Mellette Mellette, PC Williamsburg,

More information

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring

More information

HIPAA and Beyond: The Evolving Landscape of Health Privacy

HIPAA and Beyond: The Evolving Landscape of Health Privacy HIPAA and Beyond: The Evolving Landscape of Health Privacy Melissa Bianchi, Hogan Lovells US LLP Ann Tobin, UnitedHealth Group IAPP Global Privacy Summit, March 9, 2012 No Longer Just HIPAA New developments

More information

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire Compliance, Security and Risk Management Relationship Advice Andrew Hicks, Director Coalfire Housekeeping You may submit questions throughout the webinar using the question area in the control panel on

More information

TELEHEALTH TECHNOLOGY SUPPORT SERVICES

TELEHEALTH TECHNOLOGY SUPPORT SERVICES CDW HEALTHCARE WE GET IT HOW WE DO IT. TELEHEALTH TECHNOLOGY SUPPORT SERVICES CDW Healthcare s services can help you get the most from telehealth technology to improve collaboration and quality of care

More information

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP

North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

Getting Hip to the HIPAA and HITECH Act Compliance

Getting Hip to the HIPAA and HITECH Act Compliance Getting Hip to the HIPAA and HITECH Act Compliance NaNotchka M. Chumley, D.O., M.P.H. Family Medicine Physician Los Angeles, CA Integrating Global Trade & Logistic and Cybersecurity Westin St. Francis,

More information

Is Your Digital Health Strategy Thriving, Surviving or Non-Existent?

Is Your Digital Health Strategy Thriving, Surviving or Non-Existent? Is Your Digital Health Strategy Thriving, Surviving or Non-Existent? 5 Key Steps Companies Can Take to Start or Accelerate Their Digital Health Strategy More people than ever before are using technology

More information

REGULATIONS AND COMPLIANCE FOR ENTERPRISE MOBILE HEALTH APPLICATIONS

REGULATIONS AND COMPLIANCE FOR ENTERPRISE MOBILE HEALTH APPLICATIONS REGULATIONS AND COMPLIANCE FOR ENTERPRISE MOBILE HEALTH APPLICATIONS Author: Dilip Chatulingath A RapidValue Solutions Whitepaper Contents Mobilizing healthcare applications 01 Security concerns and challenges

More information

WHITE PAPER. Is BYOD Right for Your Hospital? Mobile Devices in Healthcare

WHITE PAPER. Is BYOD Right for Your Hospital? Mobile Devices in Healthcare WHITE PAPER Is BYOD Right for Your Hospital? Mobile Devices in Healthcare Vocera Communications, Inc. May, 2014 Key questions you should ask when considering the use of personal mobile devices in the hospital

More information

CES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill

CES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill CES 2016 AGENDA January 2, 2016 2:00PM 5:00PM Bally s, Las Vegas 5:30PM 7:30PM Government Business Executive Forum Reception Ramsey Pub and Grill Caesar s Palace January 3, 2016 10:00AM 4:00PM 8:00AM 3:00PM

More information

Top 5 Reasons to Choose User-Friendly Strong Authentication

Top 5 Reasons to Choose User-Friendly Strong Authentication SOLUTION BRIEF: USER-FRIENDLY STRONG AUTHENTICATION........................................ Top 5 Reasons to Choose User-Friendly Strong Authentication Who should read this paper This executive brief asserts

More information

GOVERNMENT USE OF MOBILE TECHNOLOGY

GOVERNMENT USE OF MOBILE TECHNOLOGY GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...

More information

Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder

Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Friday, October 25, 2013 The Suburban Collection Showplace - Novi, Michigan Tentative Agenda as of October 4, 2013 Friday, October 25,

More information

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012 Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives Initiation date: January 2012 Completion date: June 2012 Nomination submitted by: Samuel A. Nixon

More information

White Paper: The Current State of BYOD

White Paper: The Current State of BYOD CTOlabs.com White Paper: The Current State of BYOD May 2012 A White Paper providing context and guidance you can use Inside: Snapshot of a fast moving trend Summary of recent surveys Considerations for

More information

DATA ACROSS THE CARE CONTINUUM

DATA ACROSS THE CARE CONTINUUM FierceHealthIT Sponsored by: A FierceHealthIT Executive Summary share: DATA ACROSS THE CARE CONTINUUM Health IT execs share challenges, rewards of data analytics at live event in Chicago By Gienna Shaw

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

The Oracle Mobile Security Suite: Secure Adoption of BYOD

The Oracle Mobile Security Suite: Secure Adoption of BYOD An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will

More information

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?

More information

Health Care Delivery and Information Technology (HIT) Subcommittee : DRAFT Recommendations

Health Care Delivery and Information Technology (HIT) Subcommittee : DRAFT Recommendations President s Information Technology Advisory Committee (PITAC) Health Care Delivery and Information Technology (HIT) Subcommittee : DRAFT Recommendations April 13, 2004 President s Information Technology

More information

Testimony of Charles Jarvis, Vice Chair of the HIMSS EHR Association. House Ways and Means Committee, Health Subcommittee

Testimony of Charles Jarvis, Vice Chair of the HIMSS EHR Association. House Ways and Means Committee, Health Subcommittee Introduction Testimony of Charles Jarvis, Vice Chair of the HIMSS EHR Association House Ways and Means Committee, Health Subcommittee Incentives Promoting the Adoption of Health Information Technology

More information

A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK

A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK A PRACTICAL GUIDE TO USING ENCRYPTION FOR REDUCING HIPAA DATA BREACH RISK Chris Apgar Andy Nieto 2015 OVERVIEW How to get started assessing your risk What your options are how to protect PHI What s the

More information

Webinar: Implications of FDA Regulation of Medical Devices: When is an ipad More Than an ipad?

Webinar: Implications of FDA Regulation of Medical Devices: When is an ipad More Than an ipad? Webinar: Implications of FDA Regulation of Medical Devices: When is an ipad More Than an ipad? Additional resources on this topic may be found at: www.aamc.org/fdamobiledevice Sharon Klein, Esq. Pepper

More information

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability T. Jepsen, N. Buckley, D. Witters, K. Stine INTRODUCTION The IEEE-USA Medical Technology Policy Committee sponsored

More information

IT and Public Policy Symposium: Addressing the Healthcare Needs of our Aging Population with Technology

IT and Public Policy Symposium: Addressing the Healthcare Needs of our Aging Population with Technology Final Report 26 October 2004 IT and Public Policy Symposium: Addressing the Healthcare Needs of our Aging Population with Technology IEEE-USA Medical Technology Policy Committee Geriatric Care Information

More information

Big Data Analytics Driving Healthcare Transformation

Big Data Analytics Driving Healthcare Transformation Big Data Analytics Driving Healthcare Transformation Greg Caressi SVP Healthcare & Life Sciences November, 2014 Six Big Themes for the New Healthcare Economy Themes Modernizing Care Delivery Clinical practice

More information

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program

More information

ADDRESSING HEALTHCARE DATA INTEGRATION TO AUTOMATE PATIENT ENGAGEMENT WORKFLOWS

ADDRESSING HEALTHCARE DATA INTEGRATION TO AUTOMATE PATIENT ENGAGEMENT WORKFLOWS ADDRESSING HEALTHCARE DATA INTEGRATION TO AUTOMATE PATIENT ENGAGEMENT WORKFLOWS STAFF COMMUNICATION EMR NURSE CALL SYSTEM REAL-TIME LOCATION PATIENT EDUCATION ADT DIETARY SYSTEMS ENTERTAINMENT ORDERS CHARTING

More information

OCTOBER 2013 PART 1. Keeping Data in Motion: How HIPAA affects electronic transfer of protected health information

OCTOBER 2013 PART 1. Keeping Data in Motion: How HIPAA affects electronic transfer of protected health information OCTOBER 2013 PART 1 Keeping Data in Motion: How HIPAA affects electronic transfer of protected health information Part 1: How HIPAA affects electronic transfer of protected health information It is difficult

More information

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Topics: Explain why it is important for firms of all sizes to address cybersecurity risk. Demonstrate awareness

More information

Winning the EHR Replacement Game: Success Strategies for Better Satisfaction

Winning the EHR Replacement Game: Success Strategies for Better Satisfaction Winning the EHR Replacement Game: Success Strategies for Better Satisfaction mdsuite.com 1 Contents 03 Introduction 04 Do I really need to replace my current EHR? 06 How do I start the search for a replacement?

More information

Early Lessons learned from strong revenue cycle performers

Early Lessons learned from strong revenue cycle performers Healthcare Informatics June 2012 Accountable Care Organizations Early Lessons learned from strong revenue cycle performers Healthcare Informatics Accountable Care Organizations Early Lessons learned from

More information

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015

SMB Data Breach Risk Management Best Practices. By Mark Pribish February 19, 2015 SMB Data Breach Risk Management Best Practices By Mark Pribish February 19, 2015 Presentation Agenda About Mark Pribish Information Governance The Threat Landscape Data Breach Trends Legislative and Regulatory

More information

Health Care 2.0: How Technology is Transforming Health Care

Health Care 2.0: How Technology is Transforming Health Care Health Care 2.0: How Technology is Transforming Health Care Matthew Kaiser, CEBS, SPHR Director, HR Technology and Outsourcing Lockton Kansas City, Missouri The opinions expressed in this presentation

More information

Impact of Healthcare Regulations on the Data Center

Impact of Healthcare Regulations on the Data Center Executive Report Impact of Healthcare Regulations on the Data Center Impact of Healthcare Regulations The HIPAA and HITECH acts, along with the Affordable Care Act, are changing the face of the healthcare

More information

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for

More information

BYOD Nightmare. Perfect Storm of Mobile Devices and Application in Hospitals

BYOD Nightmare. Perfect Storm of Mobile Devices and Application in Hospitals BYOD Nightmare Perfect Storm of Mobile Devices and Application in Hospitals Neha Patel, MD MS Director of Mobile Strategy and Applications Director of Quality, Section of Hospital Medicine University of

More information

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012 A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES

More information

Healthcare Information Security Today

Healthcare Information Security Today Healthcare Information Security Today 2015 Survey Analysis: Evolving Threats and Health Info Security Efforts WHITE PAPER SURVEY BACKGROUND The Information Security Media Group conducts an annual Healthcare

More information

EHRs and Information Availability: Are You At Risk?

EHRs and Information Availability: Are You At Risk? May 2006 Issue EHRs and Information Availability: Are You At Risk? The EHR initiative is changing the face of disaster and the nature of prevention planning. By Jim Grogan On April 27, 2004, the age of

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

THE TOP 5 WAYS TODAY S SCHOOLS CAN UPGRADE CYBER SECURITY. Public School Cyber Security is Broken; Here s How to Fix It

THE TOP 5 WAYS TODAY S SCHOOLS CAN UPGRADE CYBER SECURITY. Public School Cyber Security is Broken; Here s How to Fix It THE TOP 5 WAYS TODAY S SCHOOLS CAN UPGRADE CYBER SECURITY Public School Cyber Security is Broken; Here s How to Fix It COPYRIGHT 2015 isheriff, INC. SCHOOLS NEED TO UPGRADE CYBER SECURITY It s become a

More information

The U.S. FDA s Regulation and Oversight of Mobile Medical Applications

The U.S. FDA s Regulation and Oversight of Mobile Medical Applications The U.S. FDA s Regulation and Oversight of Mobile Medical Applications The U.S. FDA s Regulation and Oversight of Mobile Medical Applications As smart phones and portable tablet computers become the preferred

More information

Achieving Regulatory Compliance through Security Information Management

Achieving Regulatory Compliance through Security Information Management www.netforensics.com NETFORENSICS WHITE PAPER Achieving Regulatory Compliance through Security Information Management Contents Executive Summary The Compliance Challenge Common Requirements of Regulations

More information

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA 8 th Annual Safeguarding Health Information: Building Assurance through HIPAA Security HHS Office of Civil Rights and National Institute of Standards & Technology Wednesday September 2, 2015 Suzanne B.

More information

AFCEA Global Identity Summit 2014 Engagement Theater

AFCEA Global Identity Summit 2014 Engagement Theater AFCEA Global Identity Summit 2014 Engagement Theater Tuesday, September 16 th 2:00 p.m. - 3:50 p.m. Confirmation of the Biometric Identity of an epassport Holder and Atomic Authorization for Devices (AKA

More information

HIT Policy Committee Privacy & Security Tiger Team Virtual Hearing on Accounting for Disclosures Monday, September 30, 2013.

HIT Policy Committee Privacy & Security Tiger Team Virtual Hearing on Accounting for Disclosures Monday, September 30, 2013. HIT Policy Committee Privacy & Security Tiger Team Virtual Hearing on Accounting for Disclosures Monday, September 30, 2013 11:45am ET Agenda CaltoOrder 1. Call to Order/Roll Call Michelle Consolazio,

More information