Track 12 - April 21 – 23, 2015
Meeting the Challenge in a Data-Centric World
Data security is defined by the processes and mechanisms in place that prevent data misuse and identify threat risks. However, many biological research data sources, from IP to genomic to mobile, require different levels of security. The reality is that it matters not where your data exists, but the ways in which data is accessed. Track 12 addresses security services for both cloud-based systems and traditional computing.
Download Brochure | Workshops
Tuesday, April 21
7:00 am Workshop Registration and Morning Coffee
8:00 – 11:30 Recommended Morning Pre-Conference Workshops*
An Embarrassment of Riches: Choosing and Implementing Cloud Infrastructure
12:30 – 4:00 pm Recommended Afternoon Pre-Conference Workshops*
Large-Scale NGS Analysis Using Globus Genomics
* Separate registration required
2:00 – 6:30 Main Conference Registration
5:00 – 7:00 Welcome Reception in the Exhibit Hall with Poster Viewing
Wednesday, April 22
7:00 am Registration Open and Morning Coffee
9:00 Benjamin Franklin Awards and Laureate Presentation
9:30 Best Practices Awards Program
9:45 Coffee Break in the Exhibit Hall with Poster Viewing
10:50 Chairperson’s Opening Remarks
11:00 FEATURED PRESENTATION: COMPLIANT CLOUD COMPUTING
Krista Woodley, Director, Information Technology, Biogen Idec
We provide insight on how to best manage SaaS-based projects in a regulated world, by discussing best practices for Lifecycle management, change control, security management and IT risk management. IT and business project teams will have a clear understanding of how to optimize their IT deployments in this new cloud-based environment.
11:30 Rethinking Cloud Security: You Can’t Control What You Can’t See
Elizabeth Lawler, CEO, Conjur, Inc.
As more companies adopt DevOps programs and build new infrastructure, the quantity and sensitivity of data being processed outside of the traditional IT stack are growing. Few organizations know where the access points into this information are, or how to secure them. We outline best practices for establishing visibility and control in this new space, drawing real-world examples from environments large and small.
12:00 pm Presentation to be Announced
12:30 Session Break
12:40 Luncheon Presentation I
Speaker to be Announced
1:10 Luncheon Presentation II (Sponsorship Opportunity Available)
1:40 Session Break
1:50 Chairperson’s Remarks
1:55 Security vs. Freedom – It‘s Not a Matter of Philosophy
Nora Manstein, Ph.D., IT Project Manager, Bayer Business Services GmbH
We contribute to the debate on how patient’s rights and wishes are respected and meaningful research with patient data can be done. In order to support this, we have developed an organizational process and a technical tool by which patients’ informed consents are an integral part of the authorization process, allowing compliant access to and scientific analysis of patient data.
2:25 Privacy, Access Control and Security in Clinical Genomics Environments
Toby Bloom, Ph.D., Deputy Scientific Director, Informatics, New York Genome Center
The integration of clinical and genomic data introduces new, complex problems in privacy and security. These include protecting the anonymity of clinical data when it is linked to “self-identifying” genomic data; managing the fine-granularity access control required to share data from multiple projects; and overcoming the regulatory and legal hurdles associated with clinical genomic data. We discuss these and other access issues.
2:55 Sponsored Presentation (Opportunity Available)
3:25 Refreshment Break in the Exhibit Hall with Poster Viewing
4:00 Data Integration, Privacy and Openness at PatientsLikeMe, a Social Network for Patients with Life-Altering Conditions
Marcia M. Nizzari, MS, Vice President, Engineering, PatientsLikeMe, Inc.
PatientsLikeMe provides a social network and research platform for capturing, curating and analyzing patient-reported data. With 300,000+ users, 2,300+ conditions represented and over 25 million health datapoints collected, it provides a new, rich source of data to integrate with EHR and genomic data to drive new insights about disease. We discuss trade-offs in privacy and openness when combining EHR and other sources of clinical and research data – such as -omics – with patient-reported data.
4:30 Differential Privacy: Future-Proof Protection for Sensitive Data
Ishaan Nerurkar, CEO and Co-Founder, LeapYear Innovations
Sophisticated analytical techniques for cross-referencing and querying databases have demonstrated that de-identification does a poor job of protecting private information. LeapYear Privacy is a differential privacy software that guarantees complete concealment of sensitive information while ensuring that the aggregate results of analysis run on privatized data are almost indistinguishable from aggregate results from the original database.
5:00 Sponsored Presentation (Opportunity Available)
5:30 Best of Show Awards Reception in the Exhibit Hall with Poster Viewing
6:30 Close of Day
Thursday, April 23
7:00 am Registration Open and Morning Coffee
10:00 Coffee Break in the Exhibit Hall and Poster Competition Winners Announced
10:30 Chairperson’s Remarks
10:40 Next-Generation Sequencing and Cloud Scale: A Journey to Large-Scale Flexible Infrastructures in AWS
Jason Tetrault, Associate Director, Business and Information Architect, R&D IT, Biogen Idec
Biogen Idec has built burst capabilities for large-scale NGS processing and collaboration with our partners. This extension of our infrastructure capability allows us to be more nimble, process more data and scale as needed. It also gives us unique options as we work with collaborators at scale. Of course, because it is NGS data, doing it securely is important.
11:10 Data Communications in BSL-3 and BSL-4 Containment: Safety, Compliance and Security
John McCall, Director, Information Technology and Telecommunications, National Emerging Infectious Diseases Laboratories, Boston University
Innovative solutions for BSL-3 and BSL-4 facilities address the asset tracking, personnel monitoring and worker communication problems associated with personal protective equipment and physical environment design. I scope out what it takes to plan and roll out a wireless networking and voice-over-IP system that meets safety, security and compliance requirements at Boston University’s National Emerging Infectious Disease Laboratory.
11:40 Presentation to be Announced
12:10 pm Session Break
12:20 Luncheon Presentation (Sponsorship Opportunity Available) or Lunch on Your Own
1:20 Dessert Refreshment Break in the Exhibit Hall with Poster Viewing
1:55 Chairperson’s Remarks
2:00 FEATURED PRESENTATION: OPENFDA: FDA’S MOST INNOVATIVE CLOUD-BASED BIG DATA AND ANALYTICS PLATFORM
Taha A. Kass-Hout, M.D., MS, Chief Health Informatics Officer, CTO and Director, Office of Informatics and Technology, FDA
OpenFDA was the first innovation created by Taha Kass-Hout, M.D., MS, upon joining FDA as the first Chief Health Information Officer in March 2013. OpenFDA was launched on June 2, 2014, allowing software developers, researchers and the public to tap into adverse events for drugs and medical devices; recalls, for drugs, devices and foods; and labeling for products on the market.
2:30 Global Developments in Privacy and Data Security Law
John M. Conley, J.D., Ph.D., William Rand Kenan, Jr. Professor of Law, University of North Carolina, Chapel Hill
The international legal climate governing privacy and data security is changing. The European Union is in the midst of a fundamental shift in its approach. The U.S. still lacks a national data law, so the states and individual federal agencies are groping toward a strategy. This presentation focuses on the impact of these ongoing changes on genomics, bioinformatics and health research.
3:00 PANEL DISCUSSION: Achieving Much-Needed Innovation while Hurdling the Barriers of Stringent Regulation
Moderator: John M. Conley, J.D., Ph.D., William Rand Kenan, Jr. Professor of Law, University of North Carolina, Chapel Hill
Dave Peterson, Executive Director, Vendor & Third Party Assurance, National IT Compliance, Kaiser Permanente Information Technology
Additional Panelists to be Announced
The growth in patient healthcare and life sciences innovations can be attributed to technology enhancements like cloud computing, big data analytics and mobile applications, but may conflict with increasing regulatory compliance demands to ensure protection of healthcare life and quality as well as patient data privacy and security. This panel of esteemed technology solution providers and regulators debates real-world challenges and how regulation must also innovate at technology’s pace.
4:00 Conference Adjourns
Download Brochure | Workshops