CASC Regulated Data Working Group Meeting: HIPAA Round Table Ralph Zottola, PhD CTO – Strategy, Research and Communications University of Massachusetts.

Slides:



Advertisements
Similar presentations
© Pearson Prentice Hall 2009
Advertisements

NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholde r to insert your own image. Cybersecurity.
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
CAMP Med Building a Health Information Infrastructure to Support HIPAA Rick Konopacki, MSBME HIPAA Security Coordinator University of Wisconsin-Madison.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
David A. Brown Chief Information Security Officer State of Ohio
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
© 2004 Visible Systems Corporation. All rights reserved. 1 (800) 6VISIBLE Holistic View of the Enterprise Business Development Operations.
Information Security Policies and Standards
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Information Security Governance and Risk Chapter 2 Part 1 Pages 21 to 69.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Stephen S. Yau CSE , Fall Security Strategies.
Information Security for the Data Management Professional Micheline Casey Chief Data Officer Federal Reserve Board.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Ferst Center Incident Incident Identification – Border Intrusion Detection System Incident Response – Campus Executive Incident Response Team Incident.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Information Technology Audit
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
SEC835 Database and Web application security Information Security Architecture.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Challenges in Infosecurity Practices at IT Organizations
Chapter 6 of the Executive Guide manual Technology.
Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision.
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
“HIPAA-Proof” Your Healthcare Data: Safeguards at the Database Level Ted Julian VP Marketing & Strategy Application Security Inc.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
1 (ISC) 2 Conference Oct, 2008 Presented by Shin, Soojung Dr. Soojung shin, CISSP, Executive Vice President, Infosec, Korea.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Enterprise Cybersecurity Strategy
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
SecSDLC Chapter 2.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
The NIST Special Publications for Security Management By: Waylon Coulter.
CSC4003: Computer and Information Security Professor Mark Early, M.B.A., CISSP, CISM, PMP, ITILFv3, ISO/IEC 27002, CNSS/NSA 4011.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
February 3, 2009 Bridging Academic and Medical Cultures Academic Research Systems and HIPAA William K. Barnett Anurag Shankar.
OIT Security Operations
Information Security Program
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Designing, Building and Managing a Cyber Security Program Based on the NIST Cybersecurity Framework (NIST CSF) A Business Case.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Company Overview & Strategy
How to Mitigate the Consequences What are the Countermeasures?
IT Development Initiative: Status & Next Steps
Cybersecurity ATD technical
Security Policies and Implementation Issues
Presentation transcript:

CASC Regulated Data Working Group Meeting: HIPAA Round Table Ralph Zottola, PhD CTO – Strategy, Research and Communications University of Massachusetts President’s Office October 14, 2015

Context I am not an information security officer… AND I don’t usually pretend to be one, especially at conferences… BUT

I am told that I am well past the tin-foil hat stage of awareness…. …and thus need help so I am fortunate that some of my best friends are information security officers!

Today, Two Short Stories How we managed to build a clinical data warehouse when we were not the HIPAA covered entity Building a cybersecurity program at the University of Massachusetts President’s Office

UMassMed CDW Context UMass Medical School and UMass Memorial Health Care are separate legal entities Began as a Medical school initiative driven by our CTSA planning UMassMed is not a HIPAA covered entity Today, this is a shared strategic priority of UMassMed and UMMHC

UMassMed CDW Sell a Big Vision Know your audience Align with partner priorities Be flexible

TIDE Architecture aka Fort Knox Critical component to secure data access agreement and BAA with UMMHC The Trusted Independent Data Environment is the repository for all identified data Medical School functions as an “Honest Broker” Highly secure Dedicated firewalls, IDS, two factor authentication Limited number of users No “internet access” – all transfers via VPN secure FTP Human Subjects training (CITI) and background checks for all IT staff that have access Regular audits of traffic and system usage SOPs for data management Another secure zone created for transactional regulated data (i.e. REDCap, IRB authorized marts…)

Keys to Success & Lessons Learned 20% Technology -- 80% Policy & Procedure relationships Since the school is not the HIPAA covered entity, it took a year of review by legal, privacy and compliance, risk management, etc Do NOT dismiss any issue/concern NEED Executive Sponsorship Establish shared governance Expect to repeatedly address “resolved” issues Incremental builds to establish culture of success

UMPO Cybersecurity Program Led by Lawrence Wilson, CISO, UMPO A special acknowledgement for sharing slides UMass A federation of five campuses and the President’s Office Five Chancellors and a President Six CIOs, six CISOs Focus here on UMPO which manages the ERP, WAN, IdM services across the system

CISO’s View Of The Problem: Unmanaged Assets Our Managed Assets ARE protected Our managed assets  We need to understand why security breaches occur  And the steps to take to prevent them  And build a program to protect our organization’s assets Our unmanaged assets  There are undetected problems – not seen, not reported  Our unmanaged assets become easy targets  And lead to a breach from missing or ineffective controls Our Unmanaged Assets ARE NOT protected Design and build a security program to protect IT resources and information assets

So Many Standards Control Objectives for Information and Related Technology (COBIT) Council on CyberSecurity (CCS) Top 20 Critical Security Controls (CSC) ANSI/ISA ( )-2009, Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program: ANSI/ISA ( )-2013, Security for Industrial Automation and Control Systems: System Security Requirements and Security Levels: ISO/IEC 27001, Information technology --Security techniques -- Information security management systems --Requirements: NIST SP Rev. 4: NIST Special Publication Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, April 2013 (including updates as of January 15, 2014). We found that ISO is more process oriented—good for management and operations but difficult for IT people to understand. CCS is more technical— better suite for IT staff

The CISO Solution: Managed Assets Build layers of controls to protect your organization’s assets MGT – Management Controls TEC – Technical Controls OPS – Operational Controls Identify Protect Detect Respond Recover The NIST C Framework 3

The CISO Model: Controls Factory Technology Design Controls Framework Controls Standards Technology Architecture Design Office Technology Center Operations Center Controls Design Technology Build or Buy Security Administration Security Operations Program Management Incident Response Input Output The Current Profile (Before the Factory) The Target Profile (After the Factory) Program Delivery Program Planning Program Roadmap Testing Center Technology Testing Controls Testing Operations Testing Vulnerabilities & Defects Threats & Threat Actors Attack Chain Threat Office Unmanaged Assets Program Risk Management Factory Governance Program Compliance Management Factory Management Engineering Area Operations AreaBusiness Area Managed Assets

The Deliverables: Cybersecurity Programs Crown Jewels Program (Deliverables: Managed Critical Assets) Identity Governance Program (Deliverables: Managed People, Accounts, Entitlements) Data Governance Program (Deliverables: Managed Information) Application Security Program (Deliverables: Managed Applications) Engineerin g Office Technology Center Operations Center Testing Center Program Manageme nt Infrastructure Security Program (Deliverables: Managed Endpoints, Networks, Servers, Databases) Threat Office Input Unmanaged Assets Output Managed Assets Factory Manageme nt Controls Design Technology Build Operations Run Controls Test Program Deliverables Attack Models Factory Deliverables

The Approach: Factory in a Box From academic to early adopter to regulated environments Implementation Blueprint Research, Lab Environments (Academic, Cybersecurity Organizations) Dev, Test, Prod Environments (Early Adopters) Cloud, MSSP, Enterprise Environments (Regulated Entities) Feedback Loop Implementation Blueprint Feedback Loop Implementation Blueprint Feedback Loop 1 2 3

Thank you