We want to hear from you! chime16.org/evals

Slides:



Advertisements
Similar presentations
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
Advertisements

Formulating a Security Policy for the Modern IT Landscape.
Website Hardening HUIT IT Security | Sep
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Protecting your site from DDoS and data breach attacks Ronan Lavelle LeaseWeb Web Application Security Group.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
FFIEC Cyber Security Assessment Tool
Critical Security Controls & Effective Cyber Defense Hasain “The Wolf”
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Albany Bank Corporation Security Incident Management Program.
MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
Protection of Transportation Infrastructure from Cyber Attacks EXECUTIVE BRIEFING.
XAHIVE International LLC Ottawa New York Comprehensive Secure Communication, Cybersecurity and Privacy Assessment Services Co-founders: David Mohajer &
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
A CISO’s Perspective on Cloud Compliance Everything for the CISO to understand J. Hybinette, CISM, CISSP, NSA-IEM, NSA-IAM, ISSAP, ISSMP 1.
Tuesday March 15, 2016 Session 19-D Technology Forum David Finkelstein, CIO RiverSpring Health.
Our Five Year Health and Care Strategy - Plan on a Page Worcestershire Joint Health and Well Being Strategy We will work to deliver financial balance,
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Surveillance and Security Systems Cyber Security Integration.
Cybersecurity as a Business Differentiator
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
CIS 500 Slingshot Academy / cis500.com
New A.M. Best Cyber Questionnaire
Cybersecurity - What’s Next? June 2017
and Security Management: ISO 28000
Level 2 Diploma Unit 11 IT Security
Information Security.
Information Technology Sector
Responding to Intrusions
GUIDE TO USINg REDCAP for the elf study
Board Concerns About Cyber Security
Introduction to the Federal Defense Acquisition Regulation
Cyber Protections: First Step, Risk Assessment
NYBA 2017 Technology, Compliance &
Managing Cyber Threats for Health Systems
Information Security: Risk Management or Business Enablement?
Cybersecurity Awareness
Webroot Antivirus offers a hassle-free scan option and helps which prevent your important data and system from the virus and malware attack.
CIS 500 HELPS Education for Service-- cis500helps.com.
I have many checklists: how do I get started with cyber security?
Andy Hall – Cyber & Tech INSURANCE Specialist
Health Insurance Portability and Accountability Act of 1996 (HIPAA)
THIS IS A TIPS & TRICKS SLIDE FOR YOU
Healthcare Cloud Security Stack for Microsoft Azure
ONE® Pages Training Presentation
Issue The Cyber Attack on 12th May 2017 on Barts Health impacted not only on access to PACS (imaging), Pathology and ARIA Chemotherapy Prescribing, but.
Cybersecurity Am I concerned?
Healthcare Cloud Security Stack for Microsoft Azure
Cybersecurity ATD technical
Security week 1 Introductions Class website Syllabus review
Strategic threat assessment
WELCOME AOI Tech Solutions Get Instant Tech Help & Support.
Tom Murphy Chief Information Security Officer
WELCOME AOI Tech Solutions - Network Security.
Tobey Clark, Director*, Burlington USA
Information Protection
Data Security and Privacy Techniques for Modern Databases
Handling information 14 Standard.
SECURITY IN THE DIGITAL AGE
Conducting a Business Impact Analysis (BIA)
Global Cyber Security Market (By Product Segments, Service Segments, Industry Verticals, Geography, Recent Developments) - Forecast to 2025
Presentation transcript:

1 2 3 4 5 We want to hear from you! chime16.org/evals Select the session type Find the correct session Rate the session Cast your vote for Encore Sessions Add comments then click “Submit” chime16.org/evals 1 2 3 4 5 Evaluations also available on the CHIME16 mobile app Access track session slides at www.chime16.org

Security Threat Management A practical approach for healthcare organizations Chad Wilson, CISO - Children’s National Health System Adam Sears, Director - The Bear Institute at Children’s National Health System

Agenda Recent health IT security climate changes Impact of cyber threats to care delivery Understanding the threats Building a wellness plan

In the news 2009 to Jan 2016: 1,440 Organizational Reports Healthcare: 21% of total breach incidents, 34% of total records

In the news

In the news

Organizational impacts Data loss Reputational damage Interruption of continuity of care delivery Loss of patient trust Scheduling/Services impact Regulatory fines Negative financial impact

What are the threats? Malware Social Engineering Network Mobile Internet of Things

How does it work? Your Outlook Web Access Password Expires in 2 hour(s) You are to change your Password below via the ACCOUNT MANAGEMENT PAGE. Click on CHANGE PASSWORD If Password is not change in the next 2 hour(s) Your next log-in Access will be declined. If you do find any difficulties to Change Password, quotas, accessing files or missing files please contact the ITS Helpdesk. Regards, IT Services.

Threat Management Understand the business Know the attackers methods Care delivery Wellness Community Outreach Know the attackers methods Identify the impact of methods on the business – know high risk areas Model the threat vectors

Threat Management

Cyber Wellness Plan Stay vigilant Tenants to build an effective wellness plan, with a focus on prevention: Strategic focus Patient care is the No. 1 priority in a hospital Protecting care delivery and the IT health of the organization is a strategic imperative Collaborate with leaders and care providers Everyone uses IT Collaborate to identify positive outcomes Understand your systems Identify risk & vulnerabilities Know the impact of successful attack to plan appropriate mitigations & investments Perform first aid on the organization Stay vigilant Cybersecurity’s “golden hour” is “22 seconds” Continuous monitoring of systems, as threats move at the speed of computers Interoperability across protection technologies Treat systems as a virtual team that needs to collaborate

Questions?

1 2 3 4 5 We want to hear from you! chime16.org/evals Select the session type Find the correct session Rate the session Cast your vote for Encore Sessions Add comments then click “Submit” chime16.org/evals 1 2 3 4 5 Evaluations also available on the CHIME16 mobile app Access track session slides at www.chime16.org