Download presentation
Presentation is loading. Please wait.
Published byMichelle Weber Modified over 11 years ago
1
HIPAA Security: Case Studies for Small to Medium Health Organizations (Compliance Methods) Jeff Bardin, CISSP, CISM, NSA IAM, OCTAVE SM Principal & CSO Treadstone 71 www.treadstone71.com jbardin@treadstone71.com
2
Agenda From Threat Agent to Safeguard The NSA IAM Method Criticality of Information Matrix Systems Criticality Matrix OCTAVE SM Method Human Actors Using Network Access Threat Profile: System Problems Basic Risk Profile Initial Findings Scorecards HIPAA & ISO17799 Roadmap Q&A
3
Vulnerabilities available for exploit
4
Threat Agent Threat Vulnerability Risk Asset (ePHI) Exposure Safeguard Gives rise to Exploits Leads to Can damage And causes an Can be countermeasured by Directly affects
5
ConfidentialityIntegrityAvailability Patient Records Medical Staff Records Employee Records Vendor Contracts Employee Health Records Legal Files (lawsuit information) Contracts w/Agency People Meeting Minutes (Board) Survey Reports (Joint Commission (Medicare/Medicaid) Docs – Security Eng Tests & Inspections Patient Accounts Financial Audits Planning Documents (Strategic/Master Facility Plan) Payroll Records Psych/Drug/Alcohol/HIV Criticality of Information Matrix HMMMHMMM M M M M M M H H H H HHHHHHHHHH H H H H H H M H H H HMMMHMMM M M M M M M H H H H M M National Security Agency Information Assurance Methodology
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.