Try the new CSRC.nist.gov and let us know what you think!
(Note: Beta site content may not be complete.)

View the beta site
NIST Logo and ITL Banner Link to the NIST Homepage Link to the ITL Homepage Link to the NIST Homepage

Insert Description Here.

prEsENtatioNs - 2012 HIPAA

(updated: Wed., June 6 @ 10:27am EST.)

NOTE: All presentations posted are in PDF format. Also note, when you click on the link to a presentation, the presentation will open up in a new browser window and this page will still be open in the background.

Wednesday, June 6 (Day 1):

9:00-9:15 Welcome and Logistics
David Holtzman, OCR and Kevin Stine, NIST

9:15-9:30 Leadership Remarks
Matt Scholl, Deputy Chief, Computer Security Division, NIST

9:30-10:15 Risk Management Framework: Privacy Controls
Dr. Ron Ross, NIST

10:30-11:15 Beyond HIPAA: The FTC Privacy Report
Cora Tung Han, FTC

11:15-12:15 Establishing an Access Auditing Program
Cindy Matson, Sanford Health System

1:15-2:00 View From the Cloud: Security Assurance Considerations for a Purchaser
Mac McMillan, HIMSS; and Vince Campitelli, Cloud Security Alliance

2:00-2:45 HHS/ONC Overview
Joy Pritts, Chief Privacy Officer, Office of the National Coordinator

3:00-4:00 (Breakout A-1 Session) Security of Mobile Devices
Lisa Gallagher, HIMSS

3:00-4:00 (Breakout B-1 Session) Security of Health Information When Maximizing Accessibility and Usability
Matt Quinn, NIST, and David Baquis, US Accessibility Board

4:05-4:50 (Breakout A-2 Session) ONC Mobile Device Project
David Shepherd, LMI

4:05-4:50 (Breakout B-2 Session) Integrity Protections
Dan Rode, AHIMA

 

Thursday, June 7 (Day 2):

9:00-9:30 The Convergence of Privacy and Security in Protecting Health Information
Leon Rodriguez, Director, OCR

9:30-10:30 OCR Audit Program
Linda Sanches, OCR

10:45-11:45 HIPAA Security Rule Toolkit Use Case
Sue Miller, WEDI Security and Privacy Workgroup; Jim Sheldon-Dean, Lewis Creek Systems, LLC and Sherry Wilson, Jopari Solutions

1:00-2:00 Federal Data Breach Response of Health and Consumer Protected Information
David Holtzman, OCR, and Alain Sheer, FTC

2:00-3:00 Data Breach Strikes
Gerard Stegmaier, Wilson, Sonsini, Goodrich & Rosati; and Paul Luehr Stroz Friedberg

3:15-4:00 Security Testing and Assessment Methodologies
Karen Scarfone, Scarfone Cybersecurity; and Richard Metzer, D.Sc. CISSP, Lockheed Martin

4:00-4:45 Meaningful Use Crosswalk to the Security Rule
Adam Greene, Davis Wright Tremaine LLP