Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Information Security Policies and Standards
Information Security Maintenance
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Session 3 – Information Security Policies
Learning Objectives Upon completion of this material, you should be able to:
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
MnSCU Audit Reports Presentation to the MnSCU Audit Committee Office of the Legislative Auditor September 21, 2004.
An Overview of Environmental Management Systems (EMS)
Evolving IT Framework Standards (Compliance and IT)
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Information Systems Security Computer System Life Cycle Security.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Information Security Standards Promoting Trust, Transparency, and Due Diligence E-Gov Washington Workshop.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Roles and Responsibilities
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Managing Risk in New Computing Paradigms Applying FISMA Standards and Guidelines to Cloud Computing Workshop.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
SecSDLC Chapter 2.
Chapter 8 Auditing in an E-commerce Environment
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
Information Security tools for records managers Frank Rankin.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Internal Control Process at Geneseo. Objectives Understand the objectives of effective internal controls Describe Geneseo’s internal control program Accurately.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Yeffry Handoko Putra, M.T
Risk management.
Security Standard: “reasonable security”
Introduction to the Federal Defense Acquisition Regulation
Move this to online module slides 11-56
The Privacy Cycle A Five-Step Process to Improve Your Privacy Culture
Safety plan.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
How to Mitigate the Consequences What are the Countermeasures?
HIPAA Privacy and Security Summit 2018 HIPAA Privacy Rule: Compliance Plans, Training, Internal Audits and Patient Rights Widener University Delaware.
IS4680 Security Auditing for Compliance
Presentation transcript:

Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner

 Mark Gaynor, PhD – Saint Louis University School of Public Health, St. Louis, MO Associate Professor, Department of Health Management and Policy  Feliciano Yu, M.D. – Washington University School of Medicine, St. Louis, MO CMIO of Barnes Children’s Hospital and Assistant Professor at Washington University School of Medicine  Bryan Duepner, MHA – Saint Louis University School of Public Health, St. Louis, MO Graduate Research Assistant

 Security Management Reasons What are management models? ISO Model Maintenance Model  Conclusion Importance of security management

 Avoid overconfidence after implementation of improved information security procedures  Organizational changes: New assets acquired New vulnerabilities emerge Business priorities and strategic goals shift Partnerships change Organizational divestiture and acquisition Employee hire and turnover

 Security is an ongoing task that never finishes  Security must be a way of thinking, not an afterthought  Security management Cycle Testing current security procedures Identifying the weaknesses, Improving the system, Restart the cycle  Security systems must evolve More expensive to reengineer information security profile than evolve it

 Basic question: How can the need for information and the need to protect privacy be balanced?  Strict authorization control Credentials to access information  Audit and accountability Audit all access to all patient information Hold people accountable for unauthorized access

 Management model must be supported by top management to promote adoption and smooth operation of ongoing security program

 Effective security systems are layered  Layered home security system Locked door Alarm system Big dog Safe Only as good as weakest link Firewall to prevent outside access Large Pet Door

 Layered computer security All systems have strong passwords All applications have strong passwords All system are in secure locations Firewall to prevent outside access

 Five areas of ISO model transformed into five areas of security management: Fault management Configuration and change management Accounting and auditing management Performance management Security program management

 Identifying, tracking, diagnosing, and resolving faults in system  Vulnerability assessment with simulation and penetration testing simulated attacks exploiting documented vulnerabilities Real testing for undocumented vulnerabilities  Tracking and resolving user complaints  Train help desk personnel to recognize security problem and how to report them

 Administration of the configuration of security program components  Administration of changes in strategy, operation, or components  Nontechnical changes: Impact procedures and people  Technical changes: Technology implemented to support security efforts in the hardware, software, and data components

 Information system auditing is used to monitor use of particular component of a system  Reviewing use of a system, not to check performance, but to determine misuse or malfeasance; automated tools can assist  Look for abnormal access Sequential access to patient records in a large hospital is one possible abnormal access pattern

 Important to monitor performance of security systems and underlying IT infrastructure to determine if they are working effectively  Common metrics are applicable in security, especially when components being managed are associated with network traffic  Need baselines to establish performance of security system

 Designed to focus organizational effort on maintaining systems  Five areas recommended for maintenance model: External monitoring Internal monitoring Planning and risk assessment Vulnerability assessment and remediation Readiness and review

 University Information Security Office provides the following security services to xyz School of Medicine Will be the central Information Security Office for the School of Medicine Create, maintain, review and communicate information security policies, guidelines and procedures Review, document, approve and track exceptions to those policies, guidelines and procedures Track and communicate legal and regulatory legislation that will impact the University Work with business units to develop Business Continuity plans for the School of Medicine Track compliance efforts

Develop and present training and awareness materials Implement security controls to monitor and protect the network from attacks or disclosures Communicate with departments through security liaisons changes in policy, controls or requirements Track reported incidents and their resolutions Conduct Risk Assessments of new or modified processes or configurations Work with departments to help them develop secure operating procedures Serve as an intermediary to the departments during external audits

 Comprehensive view  Aggregates logs and events from all network devices, security systems, and applications  Events happen and may create an incident

 Importance of Security Management Necessary for protection of assets Models used to provide a framework for security decisions within the organization Different models can be used at different times, or simultaneously, for different purposes  Security is more a management problem than a technical problem