Session 2.02: Achieving an Adequate Level of Security Without Hindering Patient Care Jody S. Hawkins, ISO Dallas, Texas.

Slides:



Advertisements
Similar presentations
QPSC Overall KDA Based on Q38 – Intention to Leave.
Advertisements

A3 Getting Out What You Put In R T I Data School Leadership Team Training Pamela Shannon, School Psychologist
Session 2.3: Skills for Supportive Supervision
Project Selection (Ch 4)
Chapter 4: Project Integration Management
Evaluation of Training
Reading LibQUAL+ Results The University of Chicago Library LibQUAL+™ Survey Supervisors’ Meeting June 16, 2004.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Responsibility Centers: Revenue and Expense centre
Project Management: A Critical Skill for Organizations Presented by Hetty Baiz Project Office Princeton University.
Chapter 4: Project Integration Management
SE 450 Software Processes & Product Metrics 1 Quality Systems Frameworks.
Putting It all Together Facilitating Learning and Project Groups.
Lecture 11 Reliability and Security in IT infrastructure.
Performance Reviews.  The performance review is a summary of the ongoing feedback the employee has received throughout the specified time period and.
The Quality Improvement Model
UHCL Support Staff Association (SSA) and Professional and Administrative Staff Association (PASA) In consultation with Dr. Lisa M. Penney RAs: Lisa Sublett,
Sensitivity Analysis A systematic way of asking “what-if” scenario questions in order to understand what outcomes could possibly occur that would affect.
Slide 1 Intelligent Testing, Improvement and Assurance Susan Windsor Principal Gerrard Consulting Limited +44 (0)
Introduction to Network Defense
Six Sigma By: Tim Bauman April 2, Overview What is Six Sigma? Key Concepts Methodologies Roles Examples of Six Sigma Benefits Criticisms.
Cumulative Sum (CUSUM) charts for medical student peripheral venous cannulation; development of a difficulty-adjusted CUSUM Dr Harry Murgatroyd SpR Anaesthesia.
Forecasting inflation; The Fan Chart CCBS/HKMA May 2004.
CHAPTER 9 Capital Investment Decision Basics
Department of Education 2011 Campus Policy Memo Dr. MAK Mitchell Executive Director of School Governance DAPS 1.
Development version 19/06/ of 48 Effectiveness of a postural care training programme © 2012 Effectiveness of a postural care education programme.
Copyright © 2003, eePulse, Inc. 1 Transforming Surveys Into Leadership Tools.
Risk Analysis vs Security Controls. Security Controls Risk assessment is a flawed safeguard selection method. There is a tendency to confuse security.
Process for Analysis  Choose a standard / type  Qualitative / Quantitative Or  Formal / Informal  Select access controls  Match outcome to project.
Too expensive Too complicated Too time consuming.
5-1 Collect & Interpret Data Use SPC to Maintain Current Process Collect & Interpret Data Select Measures Define Process Is Process Capable ? Improve Process.
The Health Metrics Network Assessment Tool. HMN Assessment Process & Tool Why use the HMN assessment tool? A step towards a comprehensive HIS vision;
Systems Life Cycle 1.Project Idenification 2. Initial Investigation 3. Feasibilty Study 4. Analysis 5. Design 6. Development and testing 7. Implementation.
Outcome Data June Eating Self-Efficacy Scale (ESES) Higher score indicates greater difficulty controlling your eating. (lower self-efficacy) The.
Engagement at The Health Trust Presented by Quantum Workplace 2014 Executive Report - The Health Trust.
Chapter 2 Risk Measurement and Metrics. Measuring the Outcomes of Uncertainty and Risk Risk is a consequence of uncertainty. Although they are connected,
+ Recitation 3. + The Normal Distribution + Probability Distributions A probability distribution is a table or an equation that links each outcome of.
Assessing Current Network Concerns Lesson 5. CERT/CC Stats.
Anderson Health Information Systems Vision Training
Systems Analysis and Design
Hypothesis testing Intermediate Food Security Analysis Training Rome, July 2010.
Free Personal Care Issues from the Survey John Jackson Co-Chair Resources Network.
1 MARKETING RESEARCH Week 5 Session A IBMS Term 2,
Protection in General- Purpose OS Week-3. Our Main Concern In what way do operating systems protect one user’s process from inadvertent or malicious interaction.
STEP 4 Manage Delivery. Role of Project Manager At this stage, you as a project manager should clearly understand why you are doing this project. Also.
Project quality management. Introduction Project quality management includes the process required to ensure that the project satisfies the needs for which.
HIPAA Security A Quantitative and Qualitative Risk Assessment Rosemary B. Abell Director, National Healthcare Vertical Keane, Inc. HIPAA Summit VII September.
Issues concerning the interpretation of statistical significance tests.
Software Architecture Evaluation Methodologies Presented By: Anthony Register.
TSQM Overall Merged Data Analysis by Industry Analysis by Company Size July 10, 2006 Vicki Deng.
Template provided by: “posters4research.com” Data were collected by interviewing the caseload holders at Services A and B with reference to patients case.
New Supervisors’ Guide To Effective Supervision
Use of Resources Calderdale workshop 18 May 2009 Janet Matthews- Audit Commission Steve Brennan- Calderdale PCT.
1 Solving the Puzzle: The Hybrid Reinsurance Pricing Method John Buchanan CAS Ratemaking Seminar – REI 4 March 17, 2008 CAS RM 2008 – The Hybrid Reinsurance.
Assessing Current Network Concerns Lesson 5. The Assessment Two important elements you will need to determine in order to produce a valuable assessment.
Training on Safe Hospitals in Disasters Module 3: Action Planning for “Safe Hospitals”
Nevada Department of Education Office of Educational Opportunity Nevada Comprehensive Curriculum Audit Tool for Schools NCCAT-S August
Supervisor Success Series “3S” Session 5: Performance Management.
Securing number facts Year 5. Over the next two weeks we will be rehearsing multiplication facts to 10 × 10 and the related division facts. We will use.
Rosemarie Bernabe, PhD Julius Center for Health Sciences and Primary Care Patient representatives’ contributions to the benefit-risk assessment tasks of.
A Guide to Vocational Subjects Assembly: Wednesday 29th March 2017
NATA Foundation Student Grants Process
Breaking the Communication Barrier: forming a Clinical Research Professionals Group at your Institution Dena Martin, CCRP Annie Pennella MS, CCRP.
Health Information Security and Privacy Collaborative (HISPC) Overview
Audit Risk Assessment Model
Topic 5: Communication and the Internet
Tools for Implementation
Tools for Implementation
Loyola’s Performance Management Process For Employees
The Technology Policies We Need Now and Why
Presentation transcript:

Session 2.02: Achieving an Adequate Level of Security Without Hindering Patient Care Jody S. Hawkins, ISO Dallas, Texas

2 Overview “Key Points” Preface Measuring Security Levels Balancing Security and Patient Care Learning Curves for New Implementations Utilizing an Entire Security Architecture Conclusion

Dallas, Texas 3 Key Points This presentation does not take any cost analysis vs. risk acceptance into consideration There will always be an acceptable level of risk, but this presentation works under the assumption that those processes have been completed and an acceptable solution is available

Dallas, Texas 4 Measuring Security Levels Very difficult to measure and prove Subjective – relying on Security Expert Objective – need (sometimes) years of data Risk Analysis and Gap Analysis a must Every organization will be different but some suggestions would be: Network Vulnerability, Virus Activity, Password Management, Perimeter Defense, User Education, Account Management, etc. Create an overall Security Health Score Example – 10 measurable security facets with an overall health score of 100 Each facet has individual weight of 10 with a cumulative max of 100, but not necessarily a minimum of 0 Negative scoring would include items like Network Vulnerabilities and Virus Activity

Dallas, Texas 5 Measuring… continued Formulas (MS Excel is an excellent tool) Example of Negative Scoring Low, Medium, High -.001,.01, and.1 respectively Take a sum of those values and multiply by 10 (highest possible score and conversion of decimal point) and then subtract that value from 10 and post the difference as the score. –If you have 0 vulnerabilities you have a Security score of 10. With 1 low and no medum or high you have a 9.99 –10 high, 3 medium and 10 low produces a score of -0.4 Negative scoring makes perfect since if you look at the big picture All aspects of security are perfect except one (giving you a Security Health Score of 90), but you have 50 high network security vulnerabilities which would produce a score of -40, thus bringing down the overall score to 50 (or 50% out of 100%) This can be used on all “low, med, high” outputs

Dallas, Texas 6 Measuring… continued Formulas Audit vs. Breach – variables are # of audits performed and #of breaches found. Takes into consideration the number of audits performed when weighting the number of breaches (i.e. 10 audits with 1 breach produces a lower score than 100 audits with 1 breach) –(((# of audits * 10)+(# of breaches * 10))/ # of audits)10=Score Security Investigations – variables are total # of investigations, # of formal investigations (formula can automatically figure preliminary inquiries), # of investigations dealing with PHI, and finally the number of investigations that found malicious intent by a user (((# formal * 0.5)+(# PHI * 1)+(# Malicious * 1.5))/ # investigations)10 = X then 10 – X = Score

Dallas, Texas 7 Measuring… continued Sum it all up Give all facets identified an initial measurement of 0 and keep a 0 for all facets that you currently do not have a means to measure (i.e. you need a network vulnerability assessment tool to perform audits and produce scores) Define acceptable percentages based on findings and best business practices I have defined my scoring process as: Green – 80% - 100% - Very unlikely an attack will be successful or a breach will occur Blue – 68% - 79% - Not likely an attack will be successful or a breach will occur Orange – 46% - 67% - Somewhat likely an attack will be successful and/or a breach will occur Red – 25% - 45% - Very likely an attack will be successful and or a breach will occur Black – 0% - 24% - Extremely likely an attack will be successful and or a breach will occur

Dallas, Texas 8 Balancing Security and Patient Care An Uneven Scale 0 breaches of Security does not equal 100% hindrance to Patient Care Red line is an arbitrary mark representing a break point. If the mark is hit the process needs change

Dallas, Texas 9 Balancing… continued Note – the right side of the chart “Breaches of Security” is likely or probable breaches. Defining Hindrances Is 16 seconds a hindrance to patient care? What about 32 seconds? How about 10 minutes? A good deal of security is user education Learning curves New implementations need time for the users to become proficient. Will have slightly higher hindrances at first, but will drop as the users become accustomed to the new procedures

Dallas, Texas 10 Balancing… continued Calculating hindrances Can be accomplished in many ways Walk the floors and ask them what they think Questionnaires and Surveys Always involve leadership of affected departments Show audit, questionnaire and survey results and let them have buy-in to the process. Support from top down is critical Calculating the learning curve Variables How does the new implementation affect the end users? –New login method? –Requiring stronger passwords? –Look and feel of application changed? –Additional end-user responsibility requirements? How does the new implementation affect other applications currently in use?

Dallas, Texas 11 Balancing… continued Calculating the learning curve Implementation of stronger password policy User involvement is HIGH User difficulty in learning new process is LOW –The user already understands the use of passwords Lower initial impact by leading the implementation with proper user education Through input collected from end users you can closely predict initial impact As users become accustomed to the change the hindrance should be little to none after the initial first weeks If the users are going to be forced to change password the hindrance will go back up at force change time This type of effort could take a year or more to level out

Dallas, Texas 12 Utilizing An Entire Security Architecture Linking it all together A solid security architecture designs itself once all the above is accomplished List all measurable aspects (including hindrances) You will see your deficiencies and strengths Becomes a living gap analysis Example scenario where lack of training for password management has caused the overall security score to drop. With all other individual aspects being at adequate levels, look at the chart to the right of the formulas at lines 5 and 11. You should see that lines 5 and 11 are considerably lower than all other scores and are associated with Failed Logon Attempts and Security Investigations, respectively

Dallas, Texas 13 Utilizing… continued In this scenario we can use an example of a new password management policy implementation where proper education did not get to the end users, causing a drop in the overall security score In this example, 150 logon attempts were audited and showed that 6 accounts were locked, 8 went over 6 attempts and 27 had minor trouble logging in Coupled with Security Investigations, the score drops even more dramatically due to the fact that users will be sharing passwords, using each others logons, leaving workstations logged into clinical applications, and writing their passwords down and leaving them next to workstations

Dallas, Texas 14 Utilizing… continued Breaches will occur due to the fact that the patient care providers will be focused on their primary job responsibility… the delivery of patient care If security inhibits the delivery of patient care to the point of breakage then security will be breached In this scenario, you can see how easy it is to notice an area that needs improvement and you can make sound decisions based on facts that will fix security problems before major breaches occur Risk Assessment and Gap Analysis is a must, but most focus on the security “holes” that are found Learn to look at Security as a “whole” and the “holes” will be obvious

Dallas, Texas 15 Conclusion Keeping thorough and concise documentation is a must Over time, this documentation can be utilized to produce objective information that can be used to continually tweak the overall security architecture for a specific organization There are no tools available Tools are good for individual aspects This is the job of the Security Professional Take control of the Security Architecture in your organization Will give you a much better picture of security Will give the confidence to you Will give confidence to affected departments and users Will gain more support for security implementations