BIT Header Desktop  
BIT Header Mobile 

Track 12 - April 21 – 23, 2015

Data Security 

Meeting the Challenge in a Data-Centric World

Data security is defined by the processes and mechanisms in place that prevent data misuse and identify threat risks. However, many biological research data sources, from IP to genomic to mobile, require different levels of security. The reality is that it matters not where your data exists, but the ways in which data is accessed. Track 12 addresses security services for both cloud-based systems and traditional computing.

Final Agenda

Download Brochure | Workshops 

Tuesday, April 21

7:00 am Workshop Registration and Morning Coffee

8:00 – 11:30 Recommended Morning Pre-Conference Workshops*

An Embarrassment of Riches: Choosing and Implementing Cloud Infrastructure

12:30 – 4:00 pm Recommended Afternoon Pre-Conference Workshops*

Large-Scale NGS Analysis Using Globus Genomics

* Separate registration required

2:00 – 6:30 Main Conference Registration



Click here for detailed information. 

5:00 – 7:00 Welcome Reception in the Exhibit Hall with Poster Viewing


Wednesday, April 22

7:00 am Registration Open and Morning Coffee



Click here for detailed information.  

9:00 Benjamin Franklin Awards and Laureate Presentation

9:30 Best Practices Awards Program

9:45 Coffee Break in the Exhibit Hall with Poster Viewing


10:50 Chairperson’s Opening Remarks



Krista Woodley, Director, Information Technology, Biogen Idec

We provide insight on how to best manage SaaS-based projects in a regulated world, by discussing best practices for Lifecycle management, change control, security management and IT risk management. IT and business project teams will have a clear understanding of how to optimize their IT deployments in this new cloud-based environment.

11:30 Rethinking Cloud Security: You Can’t Control What You Can’t See

Elizabeth Lawler, CEO, Conjur, Inc.

As more companies adopt DevOps programs and build new infrastructure, the quantity and sensitivity of data being processed outside of the traditional IT stack are growing. Few organizations know where the access points into this information are, or how to secure them. We outline best practices for establishing visibility and control in this new space, drawing real-world examples from environments large and small.

OKTA12:00 pm Presentation to be Announced

12:30 Session Break

Silicon Mechanics12:40 Luncheon Presentation I

Speaker to be Announced

Amazon logo1:10 Luncheon Presentation II
Speaker to be Announced 

1:40 Session Break


1:50 Chairperson’s Remarks

1:55 Security vs. Freedom – It‘s Not a Matter of Philosophy

Nora Manstein, Ph.D., IT Project Manager, Bayer Business Services GmbH

We contribute to the debate on how patient’s rights and wishes are respected and meaningful research with patient data can be done. In order to support this, we have developed an organizational process and a technical tool by which patients’ informed consents are an integral part of the authorization process, allowing compliant access to and scientific analysis of patient data.

2:25 Privacy, Access Control and Security in Clinical Genomics Environments

Toby Bloom, Ph.D., Deputy Scientific Director, Informatics, New York Genome Center

The integration of clinical and genomic data introduces new, complex problems in privacy and security. These include protecting the anonymity of clinical data when it is linked to “self-identifying” genomic data; managing the fine-granularity access control required to share data from multiple projects; and overcoming the regulatory and legal hurdles associated with clinical genomic data. We discuss these and other access issues.

2:55 Sponsored Presentation (Opportunity Available)

3:25 Refreshment Break in the Exhibit Hall with Poster Viewing

4:00 Data Integration, Privacy and Openness at PatientsLikeMe, a Social Network for Patients with Life-Altering Conditions

Marcia M. Nizzari, MS, Vice President, Engineering, PatientsLikeMe, Inc.

PatientsLikeMe provides a social network and research platform for capturing, curating and analyzing patient-reported data. With 300,000+ users, 2,300+ conditions represented and over 25 million health datapoints collected, it provides a new, rich source of data to integrate with EHR and genomic data to drive new insights about disease. We discuss trade-offs in privacy and openness when combining EHR and other sources of clinical and research data – such as -omics – with patient-reported data.

4:30 Differential Privacy: Future-Proof Protection for Sensitive Data

Ishaan Nerurkar, CEO and Co-Founder, LeapYear Innovations

Sophisticated analytical techniques for cross-referencing and querying databases have demonstrated that de-identification does a poor job of protecting private information. LeapYear Privacy is a differential privacy software that guarantees complete concealment of sensitive information while ensuring that the aggregate results of analysis run on privatized data are almost indistinguishable from aggregate results from the original database.

5:00 Sponsored Presentation (Opportunity Available)

5:30 Best of Show Awards Reception in the Exhibit Hall with Poster Viewing

6:30 Close of Day



Thursday, April 23

7:00 am Registration Open and Morning Coffee



Click here for detailed information. 

10:00 Coffee Break in the Exhibit Hall and Poster Competition Winners Announced


10:30 Chairperson’s Remarks

10:40 Next-Generation Sequencing and Cloud Scale: A Journey to Large-Scale Flexible Infrastructures in AWS

Jason Tetrault, Associate Director, Business and Information Architect, R&D IT, Biogen Idec

Biogen Idec has built burst capabilities for large-scale NGS processing and collaboration with our partners. This extension of our infrastructure capability allows us to be more nimble, process more data and scale as needed. It also gives us unique options as we work with collaborators at scale. Of course, because it is NGS data, doing it securely is important.

11:10 Data Communications in BSL-3 and BSL-4 Containment: Safety, Compliance and Security

John McCall, Director, Information Technology and Telecommunications, National Emerging Infectious Diseases Laboratories, Boston University

Innovative solutions for BSL-3 and BSL-4 facilities address the asset tracking, personnel monitoring and worker communication problems associated with personal protective equipment and physical environment design. I scope out what it takes to plan and roll out a wireless networking and voice-over-IP system that meets safety, security and compliance requirements at Boston University’s National Emerging Infectious Disease Laboratory.

Aspera11:40 Presentation to be Announced


12:10 pm Session Break

12:20 Luncheon Presentation (Sponsorship Opportunity Available) or Lunch on Your Own

1:20 Dessert Refreshment Break in the Exhibit Hall with Poster Viewing


1:55 Chairperson’s Remarks



Taha A. Kass-Hout, M.D., MS, Chief Health Informatics Officer, CTO and Director, Office of Informatics and Technology, FDA

OpenFDA was the first innovation created by Taha Kass-Hout, M.D., MS, upon joining FDA as the first Chief Health Information Officer in March 2013. OpenFDA was launched on June 2, 2014, allowing software developers, researchers and the public to tap into adverse events for drugs and medical devices; recalls, for drugs, devices and foods; and labeling for products on the market.

2:30 Global Developments in Privacy and Data Security Law

John M. Conley, J.D., Ph.D., William Rand Kenan, Jr. Professor of Law, University of North Carolina, Chapel Hill

The international legal climate governing privacy and data security is changing. The European Union is in the midst of a fundamental shift in its approach. The U.S. still lacks a national data law, so the states and individual federal agencies are groping toward a strategy. This presentation focuses on the impact of these ongoing changes on genomics, bioinformatics and health research.

3:00 PANEL DISCUSSION: Achieving Much-Needed Innovation while Hurdling the Barriers of Stringent Regulation

Moderator: John M. Conley, J.D., Ph.D., William Rand Kenan, Jr. Professor of Law, University of North Carolina, Chapel Hill


Dave Peterson, Executive Director, Vendor & Third Party Assurance, National IT Compliance, Kaiser Permanente Information Technology

Additional Panelists to be Announced

The growth in patient healthcare and life sciences innovations can be attributed to technology enhancements like cloud computing, big data analytics and mobile applications, but may conflict with increasing regulatory compliance demands to ensure protection of healthcare life and quality as well as patient data privacy and security. This panel of esteemed technology solution providers and regulators debates real-world challenges and how regulation must also innovate at technology’s pace.

4:00 Conference Adjourns

Download Brochure | Workshops 

View 2015 Brochure

Platinum Sponsors

 Cycle Computing logo 

 Data Direct Networks 




Illumnia logo 

Intel Logo 


Oracle Health Sciences 


 SGI small logo 


Thomson Reuters 

View All Sponsors 


Official Media Partner

View Media Partners 

Conference CD

CD iconOrder the 2014 event proceedings - now available on CD 

Complimentary Downloads

View white papers, listen to podcasts, and more! 

  • Making the World's Knowledge Computable
  • Bioinformatics in the Cloud
  • The Application of Text Analytics to Drug Safety Surveillance

Related Events

 HIT Logo for BIT 2015
CLN Co-located Event