Subscribe to Events Feeds

271 Results Found

Shes Geeky Seattle 2014
5/9/2014 8:30 AM - 5/10/2014 5:00 PM
Lake Washington Rowing Club Seattle, Washington United States
Event Listing

She's Geeky Seattle 2014 is the premier networking conference for women in Science, Technology, Engineering, Arts and Math.

Presented by She's Geeky

Price: $90/day; $160 for both days; check website for rates.

Shanghai International Conference on Social Science 2014
9/13/2014 8:00 AM - 9/15/2014 5:00 PM
The Qube Pudong Shanghai China
Event Listing

The 2014 SICSS will be held during September 13-15, 2014 in Shanghai, China.

San Fernando Valley Startup Weekend
4/25/2014 6:00 PM - 4/27/2014 7:00 PM
Office Slice Sherman Oaks, California United States
Event Listing

Startup Weekends are 54-hour events designed to provide superior experiential education for technical and non-technical entrepreneurs.

SOAR kickoff event
Power Plant @ American Tobacco Durham, North Carolina United States
Event Listing

SOAR wants to address the PROVEN funding gap facing promising female entrepreneurs starting scalable businesses in the Triangle with concrete actions. We will connect these women with advisors, colleagues, ideas and access to capital resources.

SF MusicTech Summit XV
5/20/2014 9:00 AM - 5:00 PM
Hotel Kabuki San Francisco, California United States
Event Listing

The SF MusicTech Summit brings together visionaries in the evolving music/business/technology ecosystem.

Price: $25 off with startupdigest

SB Makerspace General Meeting
4/26/2014 2:00 PM
Santa Barbara Makerspace Goleta, California United States
Event Listing

Makers,We have general meetings every Saturday @ 2pm in the makerspace. We'd love to see you there!

SB Makerspace General Meeting
4/19/2014 2:00 PM
Santa Barbara Makerspace Goleta, California United States
Event Listing

Makers,We have general meetings every Saturday @ 2pm in the makerspace. We'd love to see you there!

Risk Management for Pharmaceutical Change Control program
4/22/2014 10:00 AM - 11:00 AM
Online Event Fremont, California United States
Event Listing

It is a process that can significantly impact the efficiency of an organization. This presentation will introduce a risk based approach and procedure with regard to severity, likelihood and detection to manage the change control program.

Risk Analysis to Meet HIPAA HITECH and Meaningful Use Webinar By MentorHealth
5/7/2014 10:00 AM - 11:00 AM
online event Fremont, California United States
Event Listing

Overview: This presentation will guide the user on the principles of Risk Analysis and Risk Management to prioritize risks. It will rely heavily on the NIST 800-30 as revised and finalized on 09/18/2012.

The process of risk analysis starts with the simple principle that you must know you have an asset in order to protect it. This presentation will provide information about how to determine where the risks to the organization exist and point organizations to where to look for this information. Once information asset locations have been identified, then the risk and safeguards to that information can be explored.

Risk assessments are a key part of effective risk management and facilitate decision making at all three tiers in the risk management hierarchy including the organization level, network level, and information system level.

Risk Management is a process that provides for the identification, prioritization and management of technical and non-technical risk to the confidentiality, integrity or availability of information. Risks cannot be eliminated; they must be managed appropriately. A key step in security management is risk analysis; that is, identifying threats and vulnerabilities against security controls and measures. A risk analysis allows an organization to estimate potential loss. It also can help determine the most appropriate and cost-effective security measures to implement. After the risk analysis is performed, organizations should implement the safeguards and controls needed to keep risks at an acceptable level as determined by executive management or owner.

Why should you attend: The HIPAA security rule requires every covered entity (CE) to conduct a risk analysis to determine security risks and implement measures "to sufficiently reduce those risks and vulnerabilities to a reasonable and appropriate level." In addition to attest for Meaningful Use and organization must complete a HIPAA Risk Analysis and implement a Risk Management Program. This would include conducting a risk analysis at the organizational, network and application levels.

HITECH EMR Meaningful Use Post-Pay Audits have included a request that organizations provide proof that a risk analysis was performed prior to the end of the reporting period. In addition, they will ask for a risk mitigation plan to address deficiencies and they may request completion dates. It is not the Vendors Responsibility to conduct an application risk analysis; it is the covered entities responsibility. The Meaningful Use guidance has also shown that your risk analysis cannot be limited to just the application.

This session will explore the processes and methods that can assist organizations prioritize IT security projects by addressing the highest risks to the organization. Covered entities must make security decisions on what is appropriate for their specific environment and risk analysis is the tool to ensure that risk mitigation activities are reasonable for a specific environment.

This presentation reviews the regulatory requirements for security risk analysis and management, provides an overview of the types of risk analysis that can be performed, and offers a practical approach on how to comply with these requirements.

Areas Covered in the Session:

Locate the data, and then conduct a risk analysis

Define Reasonable By Using NIST and CMS Guidance as a Guide

Risk Analysis Steps

Identify the scope of the specific analysis

Gather Data

Identify and document potential threats and vulnerabilities

Assess and document current security measures

Determine the likelihood of threat occurrence

Determine the potential impact of threat occurrence

Determine the level of risk

Identify potential security measures and finalize documentation

Risk Management Steps

Develop and implement a risk management plan

Implement security measures

Evaluate (monitor) and maintain security measures

Risk Mitigation or Acceptance Options

Define Reasonable by Using the HIPAA Regulation as a Guide

The size, complexity, and capabilities of the covered entity

The covered entity's technical infrastructure, hardware, and software security capabilities

The costs of security measures

The probability and criticality of potential risks to EPHI

Conducting a Risk Analysis Of my Certified EMR

What questions should I ask?

What Documentation should I retain?

Creating a mitigation plan

Who Will Benefit:

Information Security Officers

Compliance Officers

Chief Information Officers

Meaningful Use Coordinators

William Miaoulis CISA, CISM, is a senior healthcare information system (IS) professional with more than 20 years of healthcare Information Security experience. Bill is the founder and primary consultant for HSP Associates. Prior to starting HSP Associates in January of 2013, Bill was the Chief Information Security Officer (CISO) and led the HIPAA security and privacy consulting efforts for Phoenix Health Systems for over 11 years and also was the HIPAA Consulting Manager for SAIC for 18 months. For seven years, Miaoulis was the University of Alabama Birmingham (UAB) Medical Center’s Information Security Officer, where he instituted the first security and privacy programs at UAB starting in October 1992.


Phone No: 800-385-1607

FaX: 302-288-6884

Event Link:

Research Commercialization From Ideas to IPO
5/19/2014 9:00 AM - 5/20/2014 5:00 PM
Millennium Gloucester Hotel London Kensington London United Kingdom
Event Listing

This conference will provide an international forum for knowledge transfer that will enable different sectors to develop new government- university-industry -investor collaborations. Thought leaders representing a wide range of government, academic, and industrial experts all of whom understand the necessity for an international partnering platform, will address what has worked, what has failed, and concrete steps to improve global economic innovation and job creation. Together they will explore ways to translate entrepreneurial innovations into economic growth.

Events Map