Presentation is loading. Please wait.

Presentation is loading. Please wait.

Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision.

Similar presentations


Presentation on theme: "Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision."— Presentation transcript:

1 Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision HIPAA Collaborative of Wisconsin Fall 2010 Conference

2  Survey Results  Why Data Protection is More Important Today  Challenges to Maintain Security & Compliance  Why Should You Have Business Process Management Controls  Review of Common Process Frameworks  Keys to Successful Business Process Management  Recommended Next Steps  Open Discussion

3  Top Challenges  Current Frameworks in Use (by department or enterprise wide)

4  Security has become a fundamental need and mandate  The risk and exposure to data and security breaches carries an increased cost ◦ Recovering from a security breach could cost thousands of dollars ◦ You may lose patient confidence and trust, whereby your reputation damages may not be recoverable  Medical Identity Theft is a Major Problem: http://money.cnn.com/2010/01/13/news/ec onomy/health_care_fraud/index.htm http://money.cnn.com/2010/01/13/news/ec onomy/health_care_fraud/index.htm

5  Limited budget dollars for adequate security controls  Limited formal written policies, standards and procedures  Risk and Security Assessments not conducted on a regular basis, or have never been conducted

6  Limited: ◦ Audit mechanisms to identify and report on security breaches ◦ Malware protection controls ◦ Written Incident Response Procedures  Unfinished or outdated Disaster Recovery & Business Continuance Plans  Inadequate Workforce Security Awareness Training

7  Actual practices do not match formal policies, standards and procedures. For example: ◦ Mis-configured systems that do not match configuration and change management standards ◦ Weak passwords ◦ Shared accounts and passwords ◦ Unencrypted ePHI when sent through Internet (email & FTP) ◦ Audit controls do not detect modifications or deletes to medical records

8

9

10  End Goal = Improved Process  Focus on: ◦ Efficiency ◦ Effectiveness ◦ Governance ◦ Reasonable & Manageable Budgets  Control Processes ◦ Leadership Involvement ◦ Configuration ◦ Change ◦ Problems & Incidents ◦ Security – CIA Triad Elements

11 Access, Authorization and Authentication ControlsEncryption and Digital Signature Practices Anti-Malware PracticesIncident Handling Practices Application Development PracticesLogging and Auditing Practices Asset Classification and Sensitivity PracticesOrganizational Security Policy Asset Management PracticesPassword Protection Practices Acquisition of New Company PracticesPatch Management Practices Change Management PracticesPersonnel Security Controls Configuration Management PracticesPhysical and Environmental Controls Communications and Operations ManagementRemote Access and VPN Practices Computer System Acceptable Use PracticesRisk Assessment Practices Data Backup PracticesSecurity Awareness Practices Data Retention PracticesSoftware Licensing Practices Disaster Recovery & Business Continuity PracticesWireless Security Practices

12 ServersWorkstations Intrusion Detection/Prevention SystemsSecurity Information & Event Management Systems Two-Factor Authentication SystemsData Leakage Protection Systems Database Access Monitoring SystemsIntegrated Security Appliances Firewalls / VPNVulnerability Management Systems Secure Cloud Computing InitiativesNetwork Admission Control Systems Encryption and Digital Control SystemsVirtualization Configuration Management Database SystemsHost Based Malware Controls

13

14  Conduct a gap analysis to identify obvious processes that are not effective or efficient  Implement a process improvement project for these obvious process weaknesses ◦ Identify Key Leadership Stakeholders and Sponsors ◦ Budget for and Prioritize Project ◦ Identify Resources  Map workflow for each process  Define KPIs

15  Create strategic and tactical documents for each process (Business Plans, Policies, Standards, Procedures, etc)  Monitor Progress  Add more processes until all key processes are included in the Process Improvement Program  Continually optimize

16  ITIL Official Site - http://www.itil-officialsite.com/home/home.asphttp://www.itil-officialsite.com/home/home.asp  Six Sigma - http://www.isixsigma.com/http://www.isixsigma.com/  COBIT - http://www.isaca.org/Knowledge- Center/COBIT/Pages/Overview.aspxhttp://www.isaca.org/Knowledge- Center/COBIT/Pages/Overview.aspx  CMMI - http://www.sei.cmu.edu/cmmi/http://www.sei.cmu.edu/cmmi/  Center for Medicare & Medicaid Services: (https://www.cms.gov/hipaageninfo/)https://www.cms.gov/hipaageninfo/  Center for Internet Security for IT Component Best Practices: (http://cisecurity.org/)http://cisecurity.org/  National Institute of Standard and Technologies (NIST) for Best Practices Guides: (http://csrc.nist.gov/publications/PubsSPs.html)http://csrc.nist.gov/publications/PubsSPs.html  U.S. Department of Health & Family Services HIPAA Page: (http://www.hhs.gov/ocr/privacy/)http://www.hhs.gov/ocr/privacy/  Health Information Trust Alliance (HITRUST) site dedicated to HIPAA: (http://www.hitrustalliance.net/)http://www.hitrustalliance.net/  Site for more HIPAA information: (http://www.hipaa.org/)http://www.hipaa.org/

17 Thank you Larry Boettger Director, InfoSec Security & Compliance Group adtec Services, Inc. 2801 International Lane, Ste. 101 Madison, WI 53704 Office: (608) 245-9910 ext. 306 Cell: (608) 228-1678 Fax: (608) 245-9885 lboettger@adtecservices.com http://www.adtecservices.com/ LinkedIn Profile: http://www.linkedin.com/in/larryboettger lboettger@adtecservices.com http://www.adtecservices.com/http://www.linkedin.com/in/larryboettger


Download ppt "Privacy & Security Policy Meets Technology at the Crossroads: Best Practice Methods & Approaches to Developing Organizational Frameworks to Avoid Collision."

Similar presentations


Ads by Google