Download presentation
Presentation is loading. Please wait.
Published byAmberly Gardner Modified over 8 years ago
2
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner
3
Mark Gaynor, PhD – Saint Louis University School of Public Health, St. Louis, MO Associate Professor, Department of Health Management and Policy Feliciano Yu, M.D. – Washington University School of Medicine, St. Louis, MO CMIO of Barnes Children’s Hospital and Assistant Professor at Washington University School of Medicine Bryan Duepner, MHA – Saint Louis University School of Public Health, St. Louis, MO Graduate Research Assistant
4
Security Management Reasons What are management models? ISO Model Maintenance Model Conclusion Importance of security management
5
Avoid overconfidence after implementation of improved information security procedures Organizational changes: New assets acquired New vulnerabilities emerge Business priorities and strategic goals shift Partnerships change Organizational divestiture and acquisition Employee hire and turnover
6
Security is an ongoing task that never finishes Security must be a way of thinking, not an afterthought Security management Cycle Testing current security procedures Identifying the weaknesses, Improving the system, Restart the cycle Security systems must evolve More expensive to reengineer information security profile than evolve it
7
Basic question: How can the need for information and the need to protect privacy be balanced? Strict authorization control Credentials to access information Audit and accountability Audit all access to all patient information Hold people accountable for unauthorized access
8
Management model must be supported by top management to promote adoption and smooth operation of ongoing security program
9
Effective security systems are layered Layered home security system Locked door Alarm system Big dog Safe Only as good as weakest link Firewall to prevent outside access http://www.homesecuritysystem.com/home-security-solutions Large Pet Door
10
Layered computer security All systems have strong passwords All applications have strong passwords All system are in secure locations Firewall to prevent outside access
11
Five areas of ISO model transformed into five areas of security management: Fault management Configuration and change management Accounting and auditing management Performance management Security program management
12
Identifying, tracking, diagnosing, and resolving faults in system Vulnerability assessment with simulation and penetration testing simulated attacks exploiting documented vulnerabilities Real testing for undocumented vulnerabilities Tracking and resolving user complaints Train help desk personnel to recognize security problem and how to report them
13
Administration of the configuration of security program components Administration of changes in strategy, operation, or components Nontechnical changes: Impact procedures and people Technical changes: Technology implemented to support security efforts in the hardware, software, and data components
14
Information system auditing is used to monitor use of particular component of a system Reviewing use of a system, not to check performance, but to determine misuse or malfeasance; automated tools can assist Look for abnormal access Sequential access to patient records in a large hospital is one possible abnormal access pattern
15
Important to monitor performance of security systems and underlying IT infrastructure to determine if they are working effectively Common metrics are applicable in security, especially when components being managed are associated with network traffic Need baselines to establish performance of security system
16
Designed to focus organizational effort on maintaining systems Five areas recommended for maintenance model: External monitoring Internal monitoring Planning and risk assessment Vulnerability assessment and remediation Readiness and review
17
University Information Security Office provides the following security services to xyz School of Medicine Will be the central Information Security Office for the School of Medicine Create, maintain, review and communicate information security policies, guidelines and procedures Review, document, approve and track exceptions to those policies, guidelines and procedures Track and communicate legal and regulatory legislation that will impact the University Work with business units to develop Business Continuity plans for the School of Medicine Track compliance efforts
18
Develop and present training and awareness materials Implement security controls to monitor and protect the network from attacks or disclosures Communicate with departments through security liaisons changes in policy, controls or requirements Track reported incidents and their resolutions Conduct Risk Assessments of new or modified processes or configurations Work with departments to help them develop secure operating procedures Serve as an intermediary to the departments during external audits
19
Comprehensive view Aggregates logs and events from all network devices, security systems, and applications Events happen and may create an incident
21
Importance of Security Management Necessary for protection of assets Models used to provide a framework for security decisions within the organization Different models can be used at different times, or simultaneously, for different purposes Security is more a management problem than a technical problem
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.