Review agenda. Select a timekeeper.
"Addressing the insider threat" (0:40) Scott Miller 1993 paper by Hochberg, Jackson, et. al. discuss formulating medical security policies (0:40) Chris & Steven employ David Day's model to design an audit plan NT policy editor (0:10) Brant wrap-up. final report? what next? Kathy's status on NT config (0:10) Kathy Admin (0:05) Maria has received virus code and MTE. proceeding. Proceedings from Medical Records Institute not here yet. Chris checked. Accounts for our new students? Topics for next agenda (0:05) Karl tell us about phone conversation with Susan
01-July-97 Meeting Notes, 1:10pm - 3:30pm
Attendees: Steven Templeton, Chris, Julie, Brant, Scott Miller, Matt Bishop Joe's Kitchen.
It looked like Brant had the best lunch, chow fun, dry. shuffled Scott's talk til end, when we reconvened in the conf. room. discuss formulating medical security policies (0:20) Chris & Steven employ David Day's model to design an audit plan Chris & Steven met with Financial aid and internal auditors to get access to real data and perhaps detect fraud. Some minor discussion about Chris' brain fart, not many had read it. NT policy editor (0:10) Brant Brant will table it for now. Reviewed with Chris after the meeting. "Addressing the insider threat" (0:40) Scott Miller 1993 paper by Hochberg, Jackson, et. al. consensus that this is a good paper, well written and lots of good examples. Chris' played devil's advocate and said that most suggestions were impractical, so what is the use? Matt countered that they were goals to be aimed for, not necessarily achieved.