Skip to main content

SCCE

HCCA

Overall Survey | Agenda Overall Survey | Agenda
Embedding 2nd Line Risk Review into Your Organization: Focus on the Journey, Not the Destination

Shelley Aul, Director, Privacy Office, Early Warning Services

  • Hear how one team incrementally embedded 2nd line risk review into their organization and how they’ve matured the review program over the years
  • Understand that team’s current process, lessons learned that have informed where they are today, and where they’re going in the future

Presentation
Evaluation

Social Media and Health Care Privacy: Challenges, Complications and Opportunities

Christie Moon, Principal, Moon Compliance Consulting, LLC

  • HIPAA Privacy & social media: brief legal overview
  • Challenges and Complications - Case Studies
  • Opportunity

Presentation
Handout
Evaluation

 

Compliance and Ethics Risk Assessment: The Foundation of an Effective C&E Program

Amii Barnard-Bahn, Executive Coach, Bestselling Author, Speaker, Barnard-Bahn Coaching & Consulting
Rebecca Walker, Partner, Kaplan & Walker LLP

  • Why a thorough understanding of C&E risks can help make every aspect of your compliance program more effective: From training and communications to board oversight, to auditing and monitoring
  • How to create effective, continuous risk assessment methodologies and use the results of risk assessment to enhance your program
  • The importance of sharing risk assessment results with senior leaders and the board and how to avoid those things that can go wrong

Presentation
Handout 1
Handout 2
Evaluation

HITRUST: Achieving Certification with a Global Standard

Uday Ali Pabrai, CEO, ecfirst

  • Overview of HITRUST CSF as a credible, global cybersecurity standard
  • Walk through how HITRUST CSF maps to and addresses CMMC, ISO 27001, HIPAA, PCI DSS, and NIST standards
  • Step through the HITRUST i1 and r2 Certification options
  • Understand options for HITRUST assessment and certification
  • Navigate key phases to achieve HITRUST certification

Presentation
Evaluation

 

 

Making Compliance Training Great: From Two Minutes to Two Hours

Kirsten Liston, Founder & Principal, Rethink Compliance LLC

  • Learn content marketing strategies to help you grab attention - fast
  • See four techniques based on learning effectiveness research that you can put to work today
  • Get strategies to measure how well your training worked

Presentation
Evaluation

 

 

 

Leveraging Actionable Analytics to Timely Detect and Mitigate Risk

Cagla Ozden, Chief, Enterprise Performance Optimization, L A Care Health Plan

  • Outline the methods to move the needle from reactive, audit-based compliance efforts to proactive risk detection and remediation
  • Review the end-to-end process to develop and implement quantitative and qualitative metrics, do results/root cause analyses, and take remediating actions
  • Review the different sources of performance intelligence that should be included in a holistic performance management to enable organizations and leaders to take evidence-based action

Presentation
Evaluation

Vulnerability Is Crucial to the Algorithm of Good Leadership

McCeil Johnson, VP-Accreditation/Reg Compliance, University of Phoenix
Elizabeth McDuffie, Attorney-at-Law

  • Identify the key aspects of good leadership and team building
  • Explore vulnerability as a crucial part of the algorithm of good leadership
  • Examine opportunities for applying vulnerability to leadership scenarios
  • Responding: discuss what an investigation looks like, how to work with others in the organization to standardize the process

Presentation
Evaluation

HIPAA Case Studies

Katie Roemer, Vice President, Compliance & Privacy Officer, Alta Hospitals System, LLC

  • Foundational overview of HIPAA Privacy regulations
  • Identification of what constitutes PHI and III
  • Interactive case studies

Presentation
Evaluation

 

 

Threat Intelligence: Anticipating and Preventing Attacks Before They Happen... Here's How!

Janet Lawless, CEO, Center for Threat Intelligence

  • Understand how rethinking intelligence strategies may help to anticipate and prevent attacks
  • Learn the importance of integrating physical and logical security to build strategies for threat intelligence within your organization
  • Participants will learn how to reevaluate what you have been doing and perhaps rethink moving forward with something different.
  • Hear a case study of an organization that redesigned its strategy to anticipate an adversary’s moves

Presentation
Evaluation

 

Healthcare Security and Compliance: Mitigating the Number of Impacted Records, Risk Management and Reporting

Martin Ignatovski, Chief Information Officer, SimplePractice

  • Current threats to healthcare organizations
  • Data findings: Factors that impact the number of breached records in a healthcare organization
  • Strategies to minimize organizational risk, align with compliance regulations, and improve organizational cybersecurity and compliance posture
  • Risk management in post-incident scenarios
  • Risk mitigation and limiting the impact of a data breach on collected, stored, and processed PHI records.

Presentation
Evaluation

Sustainability & ESG in 2023: Key Developments and Hot Topics

Kevin Feldis, Partner, Perkins Coie LLP
Mason Ji, Associate, Perkins Coie LLP

  • Defining ESG
  • COP27 key takeaways for business leaders
  • Biodiversity
  • Carbon credits
  • Methane
  • Greenwashing
  • Supply Chains
  • The importance of a plan based on your business and stakeholder priorities
  • Risks and opportunities

Presentation
Evaluation

Hot Topics and Trends in 2023 - What Compliance Leaders Should be Aware of in 2023

Carole Klove, General Counsel and Chief Nursing Officer, Elemeno Health
Kelly Willenberg, CEO, Kelly Willenberg and Associates

  • Review the significant changes in reimbursement and compliance and trends in care at home
  • Trends to be aware of in security, privacy, and ransomware
  • Addressing workforce shortages, clinical burnout, and employee retention

Presentation
Evaluation