SlideShare a Scribd company logo
1 of 5
Download to read offline
“Security and Sanity in the HIPAA-Compliant 
Workplace” 
! 
Alex Connor 
Lead Architect at Crimson Care Management 
at Advisory Board Co. 
! 
! 
Tweet: @HITizen 
#cloudcamp 
Sponsored by 
Hosted by 
#cloudcamp 
@CloudCamp_CHI
Security and Sanity 
In a HIPAA-compliant environment
HIPAA – BA Requirements 
• Data Security – PHI 
• Encryption 
• Physical Security 
• Traceability 
• To whom does the data refer? 
• Who saw it? 
• What did they see? 
• When did they see it? 
• How did they access it? 
• From where did they see it? 
• Why are they allowed to see it? 
• Personnel 
• Annual HIPAA training 
• PHI access authorization
Safety Best Practices 
• Designate an Information Security Officer 
• Personal Computer 
• HD must be encrypted 
• Screen shield 
• Lock it whenever you leave it – even for less than a minute 
• Email 
• Encrypt or “send secure” by default 
• Report sensitive data sent by external parties 
• Files 
• Never attach files with PHI to email or chat 
• Use SFTP or other secure file sharing
Staying Sane 
• Set clear expectations 
• Define a policy and train staff on it 
• Include clear definitions around warnings, sanctions and breaches 
• Contextualize policy and definitions 
• Cultivate a culture of security 
• Enforce screen lock policies 
• Make secure communication the norm, not the exception 
• Promote openness and discussion 
• Keep Perspective 
• Have a sense of humor, as much as possible 
• Stay current with laws and best practices

More Related Content

What's hot

BeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Austin Meetup: BeyondCorp Myths BustedBeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Austin Meetup: BeyondCorp Myths BustedIvan Dwyer
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security RisksDavid Kondrup
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Nick Powers
 
Artifical Intelligence in Cyber Security
Artifical Intelligence in Cyber SecurityArtifical Intelligence in Cyber Security
Artifical Intelligence in Cyber SecurityEnis Kovacevic
 
Ted - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed Sanders
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark webVeriato
 
BeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence GapBeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence GapIvan Dwyer
 
Information security
Information securityInformation security
Information securityVarshil Patel
 
CIS 2015- User-Authorized Discovery- George Fletcher
CIS 2015- User-Authorized Discovery- George FletcherCIS 2015- User-Authorized Discovery- George Fletcher
CIS 2015- User-Authorized Discovery- George FletcherCloudIDSummit
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityCambridge Intelligence
 
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorConf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorTechExeter
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesBitglass
 
Enterprise Documents Secure and On the Go
Enterprise Documents Secure and On the GoEnterprise Documents Secure and On the Go
Enterprise Documents Secure and On the GoRob Bogue
 
Detecting Threats - How to Think Like an Attacker
Detecting Threats - How to Think Like an AttackerDetecting Threats - How to Think Like an Attacker
Detecting Threats - How to Think Like an AttackerAlbert Hui
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesSecurity Innovation
 
October 1 Cleared Job Fair, Security Clearance Briefings, Resume Review
October 1 Cleared Job Fair, Security Clearance Briefings, Resume ReviewOctober 1 Cleared Job Fair, Security Clearance Briefings, Resume Review
October 1 Cleared Job Fair, Security Clearance Briefings, Resume ReviewClearedJobs.Net
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksFidelis Cybersecurity
 

What's hot (20)

BeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Austin Meetup: BeyondCorp Myths BustedBeyondCorp Austin Meetup: BeyondCorp Myths Busted
BeyondCorp Austin Meetup: BeyondCorp Myths Busted
 
Managing Cyber Security Risks
Managing Cyber Security RisksManaging Cyber Security Risks
Managing Cyber Security Risks
 
Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101Aegis Personal Cybersecurity 101
Aegis Personal Cybersecurity 101
 
Artifical Intelligence in Cyber Security
Artifical Intelligence in Cyber SecurityArtifical Intelligence in Cyber Security
Artifical Intelligence in Cyber Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ted - CyberSecurity for your Business
Ted - CyberSecurity for your BusinessTed - CyberSecurity for your Business
Ted - CyberSecurity for your Business
 
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
SecureAuth & 451 Research Webinar: Connected Security - A Holistic Approach t...
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
 
BeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence GapBeyondCorp Boston Meetup: Closing the Adherence Gap
BeyondCorp Boston Meetup: Closing the Adherence Gap
 
Information security
Information securityInformation security
Information security
 
CIS 2015- User-Authorized Discovery- George Fletcher
CIS 2015- User-Authorized Discovery- George FletcherCIS 2015- User-Authorized Discovery- George Fletcher
CIS 2015- User-Authorized Discovery- George Fletcher
 
Visualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber SecurityVisualizing Threats: Network Visualization for Cyber Security
Visualizing Threats: Network Visualization for Cyber Security
 
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actorConf 2019 - Workshop: Liam Glanfield - know your threat actor
Conf 2019 - Workshop: Liam Glanfield - know your threat actor
 
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use casesISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
ISC(2) Security Briefing Part 2 - CASBs: Real-world use cases
 
Enterprise Documents Secure and On the Go
Enterprise Documents Secure and On the GoEnterprise Documents Secure and On the Go
Enterprise Documents Secure and On the Go
 
Detecting Threats - How to Think Like an Attacker
Detecting Threats - How to Think Like an AttackerDetecting Threats - How to Think Like an Attacker
Detecting Threats - How to Think Like an Attacker
 
Threat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to VulnerabilitiesThreat Modeling - Locking the Door to Vulnerabilities
Threat Modeling - Locking the Door to Vulnerabilities
 
October 1 Cleared Job Fair, Security Clearance Briefings, Resume Review
October 1 Cleared Job Fair, Security Clearance Briefings, Resume ReviewOctober 1 Cleared Job Fair, Security Clearance Briefings, Resume Review
October 1 Cleared Job Fair, Security Clearance Briefings, Resume Review
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 
Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 

Viewers also liked

Proceso de investigacion
Proceso de investigacionProceso de investigacion
Proceso de investigacionIE Simona Duque
 
No climbs katahdin
No climbs katahdinNo climbs katahdin
No climbs katahdinSandy Olson
 
Faça os exercícios com atenção aula28
Faça os exercícios com atenção aula28Faça os exercícios com atenção aula28
Faça os exercícios com atenção aula28Marcia Roberto
 
Cleusa regina halfen e luiz alberto de vargas o professor e seu tempo de trab...
Cleusa regina halfen e luiz alberto de vargas o professor e seu tempo de trab...Cleusa regina halfen e luiz alberto de vargas o professor e seu tempo de trab...
Cleusa regina halfen e luiz alberto de vargas o professor e seu tempo de trab...Luiz Alberto de Vargas
 
Honorários advocatícios na Justiça do Trabalho - 10a Turma TRT 4a. Região
Honorários advocatícios na Justiça do Trabalho - 10a Turma TRT 4a. RegiãoHonorários advocatícios na Justiça do Trabalho - 10a Turma TRT 4a. Região
Honorários advocatícios na Justiça do Trabalho - 10a Turma TRT 4a. RegiãoLuiz Alberto de Vargas
 
Rev crian 38
Rev crian 38Rev crian 38
Rev crian 38FSBA
 
1日でマスターするWordpress講座
1日でマスターするWordpress講座1日でマスターするWordpress講座
1日でマスターするWordpress講座光利 吉田
 

Viewers also liked (20)

Proceso de investigacion
Proceso de investigacionProceso de investigacion
Proceso de investigacion
 
No climbs katahdin
No climbs katahdinNo climbs katahdin
No climbs katahdin
 
shahin navaseri cv
shahin navaseri cvshahin navaseri cv
shahin navaseri cv
 
Filmoteca
FilmotecaFilmoteca
Filmoteca
 
Tutankhamen treasury
Tutankhamen treasuryTutankhamen treasury
Tutankhamen treasury
 
Subversivos3
Subversivos3Subversivos3
Subversivos3
 
Faça os exercícios com atenção aula28
Faça os exercícios com atenção aula28Faça os exercícios com atenção aula28
Faça os exercícios com atenção aula28
 
Cleusa regina halfen e luiz alberto de vargas o professor e seu tempo de trab...
Cleusa regina halfen e luiz alberto de vargas o professor e seu tempo de trab...Cleusa regina halfen e luiz alberto de vargas o professor e seu tempo de trab...
Cleusa regina halfen e luiz alberto de vargas o professor e seu tempo de trab...
 
Sun set
Sun setSun set
Sun set
 
Como usar um blog para mudar o mundo
Como usar um blog para mudar o mundoComo usar um blog para mudar o mundo
Como usar um blog para mudar o mundo
 
Dave-Glaser
Dave-GlaserDave-Glaser
Dave-Glaser
 
Lectura
LecturaLectura
Lectura
 
Poupee coleccion
Poupee coleccionPoupee coleccion
Poupee coleccion
 
Videoformatos
VideoformatosVideoformatos
Videoformatos
 
Esteban
EstebanEsteban
Esteban
 
Honorários advocatícios na Justiça do Trabalho - 10a Turma TRT 4a. Região
Honorários advocatícios na Justiça do Trabalho - 10a Turma TRT 4a. RegiãoHonorários advocatícios na Justiça do Trabalho - 10a Turma TRT 4a. Região
Honorários advocatícios na Justiça do Trabalho - 10a Turma TRT 4a. Região
 
paper_72
paper_72paper_72
paper_72
 
Mesa redonda: Humanizar el espacio público urbano: Guatemala
Mesa redonda: Humanizar el espacio público urbano: GuatemalaMesa redonda: Humanizar el espacio público urbano: Guatemala
Mesa redonda: Humanizar el espacio público urbano: Guatemala
 
Rev crian 38
Rev crian 38Rev crian 38
Rev crian 38
 
1日でマスターするWordpress講座
1日でマスターするWordpress講座1日でマスターするWordpress講座
1日でマスターするWordpress講座
 

Similar to CloudCamp Chicago lightning talk: "Security and Sanity in the HIPAA-Compliant Workplace" - Alex Connor

Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionNicholas Davis
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Aptera Inc
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...PECB
 
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe HarborUnsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe HarborRay Potter
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipEC-Council
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Innovators
 
Six steps for securing offshore development
Six steps for securing offshore developmentSix steps for securing offshore development
Six steps for securing offshore developmentgmaran23
 
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...eFax Corporate®
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeCompliancy Group
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingQuest
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security ResilienceJoel Aleburu
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansRob Ragan
 
CloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19TechSoup
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceMatthew R. Barrett
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Precisely
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are ComingErnest Staats
 

Similar to CloudCamp Chicago lightning talk: "Security and Sanity in the HIPAA-Compliant Workplace" - Alex Connor (20)

Lecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_preventionLecture data classification_and_data_loss_prevention
Lecture data classification_and_data_loss_prevention
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe HarborUnsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
 
Global CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy PartnershipGlobal CISO Forum 2017: Privacy Partnership
Global CISO Forum 2017: Privacy Partnership
 
Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015Community IT Webinar - Crafting IT Security Policy Apr 2015
Community IT Webinar - Crafting IT Security Policy Apr 2015
 
Six steps for securing offshore development
Six steps for securing offshore developmentSix steps for securing offshore development
Six steps for securing offshore development
 
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
Protecting ePHI Transmissions in Healthcare - Is your Business Secure? | eFax...
 
Security by Design for Law Firms
Security by Design for Law FirmsSecurity by Design for Law Firms
Security by Design for Law Firms
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
Sounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and AlertingSounding the Alarm with Real-Time AD Detection and Alerting
Sounding the Alarm with Real-Time AD Detection and Alerting
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Architecting for Security Resilience
Architecting for Security ResilienceArchitecting for Security Resilience
Architecting for Security Resilience
 
Social Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response PlansSocial Engineering: the Bad, Better, and Best Incident Response Plans
Social Engineering: the Bad, Better, and Best Incident Response Plans
 
CloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare ITCloudCamp Chicago - Healthcare IT
CloudCamp Chicago - Healthcare IT
 
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
 
SharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and ComplianceSharePointlandia 2013: SharePoint and Compliance
SharePointlandia 2013: SharePoint and Compliance
 
HTTPS
HTTPSHTTPS
HTTPS
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 

More from CloudCamp Chicago

CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...CloudCamp Chicago
 
CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago
 
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...CloudCamp Chicago
 
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...CloudCamp Chicago
 
CloudCamp Chicago - June 17, 2015 The Internet of Things
CloudCamp Chicago - June 17, 2015 The Internet of ThingsCloudCamp Chicago - June 17, 2015 The Internet of Things
CloudCamp Chicago - June 17, 2015 The Internet of ThingsCloudCamp Chicago
 
CloudCamp Chicago lightning talk "Building warehousing systems on Redshi...
CloudCamp Chicago lightning talk      "Building warehousing systems on Redshi...CloudCamp Chicago lightning talk      "Building warehousing systems on Redshi...
CloudCamp Chicago lightning talk "Building warehousing systems on Redshi...CloudCamp Chicago
 
CloudCamp Chicago lightning talk "Spark: A Quick Ignition" - Matthew Kem...
CloudCamp Chicago lightning talk      "Spark: A Quick Ignition" - Matthew Kem...CloudCamp Chicago lightning talk      "Spark: A Quick Ignition" - Matthew Kem...
CloudCamp Chicago lightning talk "Spark: A Quick Ignition" - Matthew Kem...CloudCamp Chicago
 
CloudCamp Chicago lightning talk "Big Data without Big Infrastructure" by ...
CloudCamp Chicago lightning talk    "Big Data without Big Infrastructure" by ...CloudCamp Chicago lightning talk    "Big Data without Big Infrastructure" by ...
CloudCamp Chicago lightning talk "Big Data without Big Infrastructure" by ...CloudCamp Chicago
 
CloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
CloudCamp Chicago - Big Data & Cloud May 2015 - All SlidesCloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
CloudCamp Chicago - Big Data & Cloud May 2015 - All SlidesCloudCamp Chicago
 
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...CloudCamp Chicago
 
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...CloudCamp Chicago
 
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...CloudCamp Chicago
 
CloudCamp Chicago April 2015 - "FinTech"
CloudCamp Chicago April 2015 - "FinTech"CloudCamp Chicago April 2015 - "FinTech"
CloudCamp Chicago April 2015 - "FinTech"CloudCamp Chicago
 
CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago
 
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx CloudCamp Chicago
 
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/OCloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/OCloudCamp Chicago
 
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago
 
Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
 Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re... Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...CloudCamp Chicago
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"CloudCamp Chicago
 
Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
 Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ... Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...CloudCamp Chicago
 

More from CloudCamp Chicago (20)

CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
 
CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare
 
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
 
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
 
CloudCamp Chicago - June 17, 2015 The Internet of Things
CloudCamp Chicago - June 17, 2015 The Internet of ThingsCloudCamp Chicago - June 17, 2015 The Internet of Things
CloudCamp Chicago - June 17, 2015 The Internet of Things
 
CloudCamp Chicago lightning talk "Building warehousing systems on Redshi...
CloudCamp Chicago lightning talk      "Building warehousing systems on Redshi...CloudCamp Chicago lightning talk      "Building warehousing systems on Redshi...
CloudCamp Chicago lightning talk "Building warehousing systems on Redshi...
 
CloudCamp Chicago lightning talk "Spark: A Quick Ignition" - Matthew Kem...
CloudCamp Chicago lightning talk      "Spark: A Quick Ignition" - Matthew Kem...CloudCamp Chicago lightning talk      "Spark: A Quick Ignition" - Matthew Kem...
CloudCamp Chicago lightning talk "Spark: A Quick Ignition" - Matthew Kem...
 
CloudCamp Chicago lightning talk "Big Data without Big Infrastructure" by ...
CloudCamp Chicago lightning talk    "Big Data without Big Infrastructure" by ...CloudCamp Chicago lightning talk    "Big Data without Big Infrastructure" by ...
CloudCamp Chicago lightning talk "Big Data without Big Infrastructure" by ...
 
CloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
CloudCamp Chicago - Big Data & Cloud May 2015 - All SlidesCloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
CloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
 
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
 
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
 
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
 
CloudCamp Chicago April 2015 - "FinTech"
CloudCamp Chicago April 2015 - "FinTech"CloudCamp Chicago April 2015 - "FinTech"
CloudCamp Chicago April 2015 - "FinTech"
 
CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security
 
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
 
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/OCloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
 
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
 
Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
 Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re... Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
 
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"
 
Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
 Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ... Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
 

Recently uploaded

Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Miss joya
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunNiamh verma
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Call Girls Service Chandigarh Ayushi
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...Gfnyt.com
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsHelenBevan4
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhVip call girls In Chandigarh
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...High Profile Call Girls Chandigarh Aarushi
 

Recently uploaded (20)

Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service GuwahatiCall Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
 
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 8854095900 👄🫦Independent Escort Service Dehradun
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
 
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
 
Call Girls in Lucknow Esha 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
Call Girls in Lucknow Esha 🔝 8923113531  🔝 🎶 Independent Escort Service LucknowCall Girls in Lucknow Esha 🔝 8923113531  🔝 🎶 Independent Escort Service Lucknow
Call Girls in Lucknow Esha 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skills
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
 

CloudCamp Chicago lightning talk: "Security and Sanity in the HIPAA-Compliant Workplace" - Alex Connor

  • 1. “Security and Sanity in the HIPAA-Compliant Workplace” ! Alex Connor Lead Architect at Crimson Care Management at Advisory Board Co. ! ! Tweet: @HITizen #cloudcamp Sponsored by Hosted by #cloudcamp @CloudCamp_CHI
  • 2. Security and Sanity In a HIPAA-compliant environment
  • 3. HIPAA – BA Requirements • Data Security – PHI • Encryption • Physical Security • Traceability • To whom does the data refer? • Who saw it? • What did they see? • When did they see it? • How did they access it? • From where did they see it? • Why are they allowed to see it? • Personnel • Annual HIPAA training • PHI access authorization
  • 4. Safety Best Practices • Designate an Information Security Officer • Personal Computer • HD must be encrypted • Screen shield • Lock it whenever you leave it – even for less than a minute • Email • Encrypt or “send secure” by default • Report sensitive data sent by external parties • Files • Never attach files with PHI to email or chat • Use SFTP or other secure file sharing
  • 5. Staying Sane • Set clear expectations • Define a policy and train staff on it • Include clear definitions around warnings, sanctions and breaches • Contextualize policy and definitions • Cultivate a culture of security • Enforce screen lock policies • Make secure communication the norm, not the exception • Promote openness and discussion • Keep Perspective • Have a sense of humor, as much as possible • Stay current with laws and best practices