BIT Header Desktop  
BIT Header Mobile 

Track 12 - April 21 – 23, 2015

Data Security 

Meeting the Challenge in a Data-Centric World

Data security is defined by the processes and mechanisms in place that prevent data misuse and identify threat risks. However, many biological research data sources, from IP to genomic to mobile, require different levels of security. The reality is that it matters not where your data exists, but the ways in which data is accessed. Track 12 addresses security services for both cloud-based systems and traditional computing.

Final Agenda

Download Brochure | Workshops 

Tuesday, April 21

7:00 am Workshop Registration and Morning Coffee

8:00 – 11:30 Recommended Morning Pre-Conference Workshops*

An Embarrassment of Riches: Choosing and Implementing Cloud Infrastructure

12:30 – 4:00 pm Recommended Afternoon Pre-Conference Workshops*

Large-Scale NGS Analysis Using Globus Genomics

* Separate registration required

2:00 – 6:30 Main Conference Registration



Click here for detailed information. 

5:00 – 7:00 Welcome Reception in the Exhibit Hall with Poster Viewing


Wednesday, April 22

7:00 am Registration Open and Morning Coffee



Click here for detailed information.  

9:00 Benjamin Franklin Awards and Laureate Presentation

9:30 Best Practices Awards Program

9:45 Coffee Break in the Exhibit Hall with Poster Viewing


10:50 Chairperson’s Opening Remarks



Krista Woodley, Director, Information Technology, Biogen Idec

We provide insight on how to best manage SaaS-based projects in a regulated world, by discussing best practices for Lifecycle management, change control, security management and IT risk management. IT and business project teams will have a clear understanding of how to optimize their IT deployments in this new cloud-based environment.

11:30 Rethinking Cloud Security: You Can’t Control What You Can’t See

Kevin Gilpin, CTO, Conjur, Inc.

As more companies adopt DevOps programs and build new infrastructure, the quantity and sensitivity of data being processed outside of the traditional IT stack are growing. Few organizations know where the access points into this information are, or how to secure them. We outline best practices for establishing visibility and control in this new space, drawing real-world examples from environments large and small.

OKTA12:00 pm Presentation to be Announced

12:30 Session Break

Silicon Mechanics12:40 Luncheon Presentation I

Speaker to be Announced


Amazon logo1:10 Luncheon Presentation II: Running Scalable and Cost Effective High-Throughput Sequencing Data Analysis on Amazon Web Services

Cory Funk, Ph.D., Research Scientist, Institute for Systems Biology

Dmitry Pushkarev, Ph.D., CEO and Founder, ClusterK

Here we present work by the Institute for Systems Biology, in collaboration with ClusterK and AWS, to run large cohort RNA-Seq comparative data analysis on the AWS Spot Market. We will showcase the SNAPR algorithm for transcriptome analysis, as well as highlight the advanced features of the ClusterK products that make full use of AWS Spot instances that resulted in significant cost savings over on-demand pricing.

1:40 Session Break


1:50 Chairperson’s Remarks

Nora Manstein, Ph.D., IT Project Manager, Bayer Business Services GmbH

1:55 Security vs. Freedom – It‘s Not a Matter of Philosophy

Nora Manstein, Ph.D., IT Project Manager, Bayer Business Services GmbH

We contribute to the debate on how patient’s rights and wishes are respected and meaningful research with patient data can be done. In order to support this, we have developed an organizational process and a technical tool by which patients’ informed consents are an integral part of the authorization process, allowing compliant access to and scientific analysis of patient data.

2:25 Privacy, Access Control and Security in Clinical Genomics Environments

Toby Bloom, Ph.D., Deputy Scientific Director, Informatics, New York Genome Center

The integration of clinical and genomic data introduces new, complex problems in privacy and security. These include protecting the anonymity of clinical data when it is linked to “self-identifying” genomic data; managing the fine-granularity access control required to share data from multiple projects; and overcoming the regulatory and legal hurdles associated with clinical genomic data. We discuss these and other access issues.

2:55 Blocking the Cyber Barbarians

Betsy Fallen, Global Head, Program and Business Development, SAFE-BioPharma Association

Identity trust is necessary for secure and regulated Internet communications. The presentation explains the issues associated with establishing online trust and the role of the industry-driven SAFE-BioPharma global identity management/digital signature standard in assuring that only authorized identities have access to protected information. Participants will learn about types and levels of identity credentials, government and industry organizations involved in establishing identity trust infrastructures, applicable standards, governance models and approaches to cloud-based identity management.

3:25 Refreshment Break in the Exhibit Hall with Poster Viewing

4:00 Data Integration, Privacy and Openness at PatientsLikeMe, a Social Network for Patients with Life-Altering Conditions

Marcia M. Nizzari, MS, Vice President, Engineering, PatientsLikeMe, Inc.

PatientsLikeMe provides a social network and research platform for capturing, curating and analyzing patient-reported data. With 300,000+ users, 2,300+ conditions represented and over 25 million health datapoints collected, it provides a new, rich source of data to integrate with EHR and genomic data to drive new insights about disease. We discuss trade-offs in privacy and openness when combining EHR and other sources of clinical and research data – such as -omics – with patient-reported data.

4:30 Differential Privacy: Future-Proof Protection for Sensitive Data

Ishaan Nerurkar, CEO and Co-Founder, LeapYear Innovations

Sophisticated analytical techniques for cross-referencing and querying databases have demonstrated that de-identification does a poor job of protecting private information. LeapYear Privacy is a differential privacy software that guarantees complete concealment of sensitive information while ensuring that the aggregate results of analysis run on privatized data are almost indistinguishable from aggregate results from the original database.

5:00 Speaker to be Announced

5:30 Best of Show Awards Reception in the Exhibit Hall with Poster Viewing

6:30 Close of Day



Thursday, April 23

7:00 am Registration Open and Morning Coffee



Click here for detailed information. 

10:00 Coffee Break in the Exhibit Hall and Poster Competition Winners Announced


10:30 Chairperson’s Remarks

Jason Tetrault, Associate Director, Business and Information Architect, R&D IT, Biogen Idec

10:40 Next-Generation Sequencing and Cloud Scale: A Journey to Large-Scale Flexible Infrastructures in AWS

Jason Tetrault, Associate Director, Business and Information Architect, R&D IT, Biogen Idec

Biogen Idec has built burst capabilities for large-scale NGS processing and collaboration with our partners. This extension of our infrastructure capability allows us to be more nimble, process more data and scale as needed. It also gives us unique options as we work with collaborators at scale. Of course, because it is NGS data, doing it securely is important.

11:10 Data Communications in BSL-3 and BSL-4 Containment: Safety, Compliance and Security

John McCall, Director, Information Technology and Telecommunications, National Emerging Infectious Diseases Laboratories, Boston University

Innovative solutions for BSL-3 and BSL-4 facilities address the asset tracking, personnel monitoring and worker communication problems associated with personal protective equipment and physical environment design. I scope out what it takes to plan and roll out a wireless networking and voice-over-IP system that meets safety, security and compliance requirements at Boston University’s National Emerging Infectious Disease Laboratory.

Aspera11:40 Breaking the Classical Barriers to Collaboration and Scientific Discovery - Distance and Data Size

Michelle Munson, President and CEO, Aspera, an IBM Company

Life sciences organizations need to dramatically reduce analytics time and speed up clinical interventions, but most still rely on shipping physical disks due to inherent problems with existing networks and transfer protocol inefficiencies. Spending days to transport data is not a viable option, this session will explore technology infrastructure for file transfer that will catalyze the transition from 1GbE to 10GbE and beyond.

12:10 pm Session Break

12:20 Luncheon Presentation (Sponsorship Opportunity Available) or Lunch on Your Own

1:20 Dessert Refreshment Break in the Exhibit Hall with Poster Viewing


1:55 Chairperson’s Remarks

John M. Conley, J.D., Ph.D., William Rand Kenan, Jr. Professor of Law, University of North Carolina, Chapel Hill; Counsel, Robinson Bradshaw & Hinson



Taha A. Kass-Hout, M.D., MS, Chief Health Informatics Officer, CTO and Director, Office of Informatics and Technology, FDA

OpenFDA was the first innovation created by Taha Kass-Hout, M.D., MS, upon joining FDA as the first Chief Health Information Officer in March 2013. OpenFDA was launched on June 2, 2014, allowing software developers, researchers and the public to tap into adverse events for drugs and medical devices; recalls, for drugs, devices and foods; and labeling for products on the market.

2:30 Global Developments in Privacy and Data Security Law

John M. Conley, J.D., Ph.D., William Rand Kenan, Jr. Professor of Law, University of North Carolina, Chapel Hill; Counsel, Robinson Bradshaw & Hinson

The international legal climate governing privacy and data security is changing. The European Union is in the midst of a fundamental shift in its approach. The U.S. still lacks a national data law, so the states and individual federal agencies are groping toward a strategy. This presentation focuses on the impact of these ongoing changes on genomics, bioinformatics and health research.

3:00 PANEL DISCUSSION: Achieving Much-Needed Innovation while Hurdling the Barriers of Stringent Regulation

Moderator: John M. Conley, J.D., Ph.D., William Rand Kenan, Jr. Professor of Law, University of North Carolina, Chapel Hill; Counsel, Robinson Bradshaw & Hinson


Dana Caulder, Senior Software Engineer, Bioinformatics and Computational Biology, Genentech

Chris Dwan, Assistant Director, Research Computing and Data Services, Broad Institute of MIT and Harvard

Sanjay Joshi, CTO – Life Sciences, Emerging Technologies Division, EMC

Taha A. Kass-Hout, M.D., MS, Chief Health Informatics Officer, CTO and Director, Office of Informatics and Technology, FDA

Dave Peterson, Executive Director, Vendor & Third Party Assurance, National IT Compliance, Kaiser Permanente Information Technology

Vas Vasiliadis, Director, Products, Computation Institute, University of Chicago and Argonne National Laboratory

Additional Panelists to be Announced

The growth in patient healthcare and life sciences innovations can be attributed to technology enhancements like cloud computing, big data analytics and mobile applications, but may conflict with increasing regulatory compliance demands to ensure protection of healthcare life and quality as well as patient data privacy and security. This panel of esteemed technology solution providers and regulators debates real-world challenges and how regulation must also innovate at technology’s pace.

4:00 Conference Adjourns

Download Brochure | Workshops 

View 2015 Brochure

Platinum Sponsors

 Cycle Computing logo 

 Data Direct Networks 




Illumnia logo 

Intel Logo 


Oracle Health Sciences 


 SGI small logo 


Thomson Reuters 

View All Sponsors 


Official Media Partner

View Media Partners 

Conference CD

CD iconOrder the 2014 event proceedings - now available on CD 

Complimentary Downloads

View white papers, listen to podcasts, and more! 

  • Making the World's Knowledge Computable
  • Bioinformatics in the Cloud
  • The Application of Text Analytics to Drug Safety Surveillance

Related Events

 HIT Logo for BIT 2015
CLN Co-located Event