2015 Theme: Priorities for Health Organizations: Breaches. Security. Risk Assessment. Privacy. Mobile.

SecureHEALTH Summit & Council Meeting:CALL FOR SPEAKERS

The Security Council is in the process of developing the program for its upcoming Summit. If you are interested in participating in the program, and have insight to share on one or many of the below topics, please contact our Program & Research Development Manager, Ellen Slots at ellens@htrac.org

The HTRAC’s SecureHEALTH Summit & Council meeting has been designed to unite c-level executives in an exclusive setting to address key health IT security strategies to improve data sharing while protecting electronic health information and patient privacy. Through a unique blend of executive roundtables, keynote panel discussions, and insightful case-study based presentations, CIOs/CISOs/CMIOs/CTOs/IT Directors will walk away with the strategic insights and tactical methods needed to prepare their organizations for effectively handling even the worst security incidents. The focus of discussions will include:

Cyber Security Attacks & Strategy

  • Identifying and Recovering from Targeted PHIsing Attacks
  • Determining Issues with PHI Security and Encryption
  • Improving Network Security Resiliency by Mitigating Threats and Enhancing Incident Detection
  • Strengthening Privileged-Access Management Authentication to Prevent Insider Threats
  • Defining Advanced Attacks and Educating Employees on Handling Advanced Attacks

Big Data Analytics and Enterprise IT Architecture Security

  • Optimizing Data Center Security to Prevent IT System Vulnerabilities
  • Improving Data Masking to Protect Data
  • Securing Unstructured Files and Data as a Part of IT Security Strategy
  • Refining Network Security Threat Intelligence Strategy to Include Enterprise Architecture Vulnerabilities
  • Utilizing Data and Predictive Analytics to Anticipate Cyber Threats
  • Advancing the Existing Enterprise Information Management (EIM) Program by Securely Leveraging Big Data

Risk Management Strategy

  • Utilizing a Risk-Based Strategy toward Health Information Exchange: Mitigating Risk
  • Implementing a Continuous Monitoring Model over ePHI (electronic Personal Healthcare Information)
  • Common Trends from HHS’s “Wall of Shame”
  • Compliance Perspective on Risk Assessment to Prevent Breaches
  • Conducting Assessments to Determine Threat & Vulnerability Levels
  • Incorporating Fraud Management Strategy in the Risk Profile

HIPAA Privacy & Audits

  • Challenges with HIPAA Privacy, Security and Breach Notification
  • Challenges with HIPAA Privacy, Security and Breach Notification
  • Analyzing the new HIPAA Privacy Rule Changes

Digital Space Challenges: Patient Privacy and Population Health Management

  • The Issues of Maintaining Patient Privacy with Physician Portals & Unique Patient Identification
  • Key Components from an Advanced Privacy Program that Protects Patient Information
  • Delivering Patient Outcome Improvements through Population Health
  • Utilizing Predictive Analytics to Improve Patient Health Characteristics and Healthcare Services
  • Improving Security Framework between Connectivity Platforms and Systems
  • Continued Challenges with Meaningful Use of EHRs

Mobile Health & Telehealth Security Challenges

  • Optimizing Endpoint Security Threat Detection
  • Increasing Safety Measure with Mobile Application Threats
  • Securely Managing Mobile Devices to Prevent Mobile-Based Threats
  • Modernizing Doctor Visits with Telemedicine: Benefits and Risks
  • Enhancing Patient Experience & Patient Engagement while Securing Patient Information
  • Managing Security Issues around Data Collection and Flow

Wireless Medical Device Security

  • Challenges with Improving Medical Devices: Interoperability, Integration, and Security
  • Integrating Standards for Efficient Medical Device Interoperability
  • Managing Cyber Security Vulnerabilities in Medical Devices
  • Determining if the Malfunctioning Medical Device is also a Security Issue
  • Identifying Stakeholder Responsibilities with Regards to Security and Safety: User, Provider, and Manufacturer
  • Emphasizing Security and Safety as Priorities in the Design and Function of Medical Devices

Connecting Clinical Data

  • Methods for Protecting Real-World Evidence Data (Payer Data, Health Records, Clinical Trial Data)
  • Enhancing Clinical Trial Data Security to Maintain Patient Privacy
  • Leveraging E.H.R. Data to Gain Perspective into the Market and Drive Patient Outcomes and Drug Development
  • Integrating Pharmacometric Principles into Data Analysis to Gain a Comprehensive View of Disease Progression
  • Interoperability Data Sharing to Improve R&D Drug Development

Cloud Application & Cloud Security

  • Structuring Cloud Security Controls
  • Uncovering Potential Bandwidth and Bottlenecking Issues
  • Automating the Process and Supporting Near Real-Time Monitoring for the Cloud
  • Optimizing Data Sharing and Protection in between Clouds
  • Security & Privacy in Service-Level Agreements for Cloud Providers