Schedule & Registration

If you are not logged in, please sign in below to register for this event.

AHIA Tech Talk: Securing Data & Delivering Value

This webinar will provide insight into a practical framework through which internal auditors can economically identify sensitive information relating to both patients and employees in data repositories such as shared drives. Operational and financial leadership, Information Technology, and department data owners should use this framework to structure access rights and establish protective procedures. This whitepaper will provide an understanding of the tools and strategies needed to execute continuous security audits on corporate-wide sensitive patient and employee information.

Securing Data & Delivering Value: Identifying Patient and Employee Related Sensitive Information in Data Repositories

Featuring:
Rubensky Calixte, MBA, CISA - SNATEK

This presentation will take place on Monday, December 2, 2019 at 1:00 pm Eastern time (12:00 pm Central time).

Member Price: FREE | Non-Member Price: $49 or Join AHIA today to take advantage of this benefit!
Scroll down to register

Please Note: 
Registration will close one hour prior to the live event on Monday, December 2nd.


Discussion Description:
Healthcare organizations collect and store much more than just patient health information. Functional areas such as Human Resources, Internal Audit, and Finance accumulate terabytes of sensitive employee and patient information across business functions. The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and National Institute of Standards and Technology (NIST) recommend guidelines to establish internal safeguards for sensitive data. However, operational and financial leadership, as well as Internal Audit, need practical solutions to identify and control the amount of and access to information stored within an organization. 

This webinar will provide insight into a practical framework through which internal auditors can economically identify sensitive information relating to both patients and employees in data repositories such as shared drives. Operational and financial leadership, Information Technology, and department data owners should use this framework to structure access rights and establish protective procedures. This whitepaper will provide an understanding of the tools and strategies needed to execute continuous security audits on corporate-wide sensitive patient and employee information. 

  • Provide insight into a practical framework through which internal auditors can economically identify sensitive information relating to both patients and employees in data repositories.

  • Use tools and strategies to execute continuous security audits on corporate-wide sensitive patient and employee information.

  • Create a framework to structure access rights and establish protective procedures.

In addition, the session will provide significant time for your questions.

Program Level: All

Prerequisites: None

Field of Study: Information Technology

Delivery Method: Interactive discussion using telephone and Internet technology.

CPE Credits: 1 credit

Speaker Bios:

Rubensky Calixte, MBA, CISA - SNATEK 
Rubensky (Ruben) Calixte is SNATEK's vice president of operations & information security. Ruben has over ten years of information technology (IT) and consulting experience in industries ranging from healthcare, energy, transportation, and hospitality. He joins SNATEK from Jackson Health System (JHS) where he was responsible for leading IT internal audit and assurance. Prior to his work at JHS, Ruben led IT audit and consulting engagements for Focal Point Data Risk (formerly Sunera), Deutsche Post DHL, and Royal Caribbean International. 

Ruben has professional and expert experience in several regulatory areas and frameworks, such as the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley Act (SOX), National Institute of Standards and Technology (NIST) Cybersecurity Framework, Payment Card Industry Data Security Standard (PCI DSS), and Control Objectives for Information and Related Technologies (COBIT) standards. 

Early in his career, Ruben designed mobile phones and radios within the electrical engineering team at Motorola, Inc. Ruben has also worked within the Information Management division of Florida Power & Light where he supported IT network operations and compliance efforts, which included the North American Electric Reliability Corporation (NERC) and Critical Infrastructure Protection (CIP) regulations. 

Rubensky earned an MBA from Babson College, a Bachelor of Science degree in Electrical Engineering from the University of Florida, and is a Certified Information Systems Auditor (CISA). 

Please Note: If you wish to receive continuing professional education credits for participating in the discussion, you are required to register and pay the registration fees. You will also be required to answer 3 of the 4 questions asked online during the discussion to qualify for CPE credit.

Cancellations received in writing within 7 calendar days prior to the discussion will be issued a full refund. No refunds for cancellations received within the week of the discussion. For more information regarding refund, complaint and program cancellation policies, please contact AHIA at 888-ASK-AHIA (275-2442).


Continuing Professional Education Credits:
AHIA is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org.

When
12/2/2019 12:00 PM - 12/2/2019 1:00 PM
Where
Your Office