SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Creating an Effective 
Cyber Security Strategy 
________ 
Key Attributes for Success, Challenges and Critical Success Factors 
Skip Hubbard, MBA, FCHIME, LCHIME, CHCIO 
SVP, Business Intelligence & Performance Improvement 
Bon Secours Health System 
#LEAD14 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
2 
A $3.4 billion not-for-profit Catholic health system, Bon Secours Health System, Inc. (BSHSI) owns, manages or joint ventures: 
•19 Acute Care Hospitals 
‒14 Owned 
‒5 Joint Ventures 
•15 Post-acute Centers 
•14 Home Care/Hospice Providers 
•2.3 Million Patient Care Encounters 
•9 Communities in 6 states 
•Over 23,000 caregivers 
•850 Physicians 
•60,000 System users 
•136,000 Clinical Portal users 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
What is Needed 
•Build Relationships 
•Establish the Culture 
•Education 
•Risk Analysis 
•Build a Core Security Team 
•Build Infrastructure 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Build Relationships 
•Board (Governance & Relationship) 
•Executive Awareness & Support 
•Internal, Teams Across Disciplines 
–IA, Privacy, CRO 
–HR, Legal, Technology … 
•External Relationships 
–Law Enforcement 
–Media Firm 
–Cyber liability Insurer 
•Education 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Establish the Culture 
•Leaders are aware and talk about security 
•Education of everyone (staff, faculty, physicians, …) 
•Framework – Detailed Plan – Testing 
–Are you using NIST or ISO … 
–Issues and Investigations protocols 
–Incident Reporting: (PHI, PII, PCI, Hacks) 
•Do Audits of: 
–Easy-to-guess password on system audits 
–Vendor management – SSAE16, SOC2 Type2 Reports 
–Access modes & points - Cloud computing 
•In healthcare security involves Privacy & Cyber Security 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Risk Analysis 
•Risk Assessment: 
–Part of the companies ‘ERM’ ? 
–What is your risk tolerance, for each class of data 
•Level of user access to data & systems 
•Leakage thru employee – (error, misuse) 
–"Lifecycle" approach to Policy and Procedures 
–Technology portfolio 
•Spending/Budget for Security 
•Up-to-date ? – 
–System Patch Levels - Virus Protection Levels 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Build a Core Security Team 
•Determine Core Security Team 
–Knowledge of Regulation (Federal & State) 
•what states people live in, if data accessed 
–Turnover & Retention 
–Tools & Training 
•Incident Response Team Needs 
–Plans & Escalation plan 
–Breach reporting 
–How & Where to document 
–Where are the logs? Do you have the right logs? 
Great 
Workplace 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Build Infrastructure 
•Understand your environment 
–DLP, IDS, Firewalls 
–Segmentation 
–Strong passwords 
•Physical Security (& Education) 
•Encryption - ‘everything’ 
•Change Management (i.e iOS 8.0.1) 
•Disaster Recovery 
•Team training 
Basic must be in place 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Understanding your Environment 
•Users 
–Login patterns (service accounts during night time, login after terms) 
–Account Volumes 
–Last used and time since password change 
–Failed Login Attempts 
–Internal and External access 
•Usage 
–Understand Both Systems & Network Configurations 
–Identity of New Network Segments 
–Bandwidth usage of network 
–FTP (22) and Secure (443) site statistics and destinations 
–Website attempts; Blacklisted sites (i.e. outbound blocked sites) or do Whitelisting 
Metrics; There is a strong relationship between metrics and problems 
A CHIME Leadership Education and Development Forum in collaboration with iHT2
A CHIME Leadership Education and Development Forum in collaboration with iHT2 
Be Prepared 
•The Board wants answers 
•HHS-CMS-OCR demands quick answers 
•Staff wants full access 
•Your community – Public wants assurances 
•You want to sleep at night
Q & A 
Skip Hubbard 
Skip_Hubbard@BSHSI.org 
A CHIME Leadership Education and Development Forum in collaboration with iHT2

Contenu connexe

Similaire à CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Success Factors” with Skip Hubbard, MBA, FCHIME, LCHIME, CHCIO, SVP, Business Intelligence & Performance Improvement, Bon Secours Health Systems

CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...Health IT Conference – iHT2
 
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptEDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptPreethamS41
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarConcept Searching, Inc
 
Security Architecture
Security ArchitectureSecurity Architecture
Security ArchitecturePriyank Hada
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
Philips john huffman
Philips john huffmanPhilips john huffman
Philips john huffmanBigDataExpo
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...Health IT Conference – iHT2
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKumawat Dharmpal
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.pptit160320737038
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security BaselineBarry Caplin
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeCompliancy Group
 
Web Security Overview
Web Security OverviewWeb Security Overview
Web Security OverviewNoah Jaehnert
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)U.S. News Healthcare of Tomorrow
 
Bab 11 pembelajaran manajemen Komputer.pptx
Bab 11 pembelajaran manajemen Komputer.pptxBab 11 pembelajaran manajemen Komputer.pptx
Bab 11 pembelajaran manajemen Komputer.pptxHermanTusiadi
 

Similaire à CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Success Factors” with Skip Hubbard, MBA, FCHIME, LCHIME, CHCIO, SVP, Business Intelligence & Performance Improvement, Bon Secours Health Systems (20)

CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
 
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptEDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Philips john huffman
Philips john huffmanPhilips john huffman
Philips john huffman
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
5548 isaca for-students
5548 isaca for-students5548 isaca for-students
5548 isaca for-students
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
Use of the COBIT Security Baseline
Use of the COBIT Security BaselineUse of the COBIT Security Baseline
Use of the COBIT Security Baseline
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
Web Security Overview
Web Security OverviewWeb Security Overview
Web Security Overview
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
 
Bab 11 pembelajaran manajemen Komputer.pptx
Bab 11 pembelajaran manajemen Komputer.pptxBab 11 pembelajaran manajemen Komputer.pptx
Bab 11 pembelajaran manajemen Komputer.pptx
 

Plus de Health IT Conference – iHT2

Plus de Health IT Conference – iHT2 (20)

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 

Dernier

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Dernier (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

CHIME LEAD DC 2014 “Key Attributes for Success, Challenges and Critical Success Factors” with Skip Hubbard, MBA, FCHIME, LCHIME, CHCIO, SVP, Business Intelligence & Performance Improvement, Bon Secours Health Systems

  • 1. Creating an Effective Cyber Security Strategy ________ Key Attributes for Success, Challenges and Critical Success Factors Skip Hubbard, MBA, FCHIME, LCHIME, CHCIO SVP, Business Intelligence & Performance Improvement Bon Secours Health System #LEAD14 A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 2. 2 A $3.4 billion not-for-profit Catholic health system, Bon Secours Health System, Inc. (BSHSI) owns, manages or joint ventures: •19 Acute Care Hospitals ‒14 Owned ‒5 Joint Ventures •15 Post-acute Centers •14 Home Care/Hospice Providers •2.3 Million Patient Care Encounters •9 Communities in 6 states •Over 23,000 caregivers •850 Physicians •60,000 System users •136,000 Clinical Portal users A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 3. What is Needed •Build Relationships •Establish the Culture •Education •Risk Analysis •Build a Core Security Team •Build Infrastructure A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 4. Build Relationships •Board (Governance & Relationship) •Executive Awareness & Support •Internal, Teams Across Disciplines –IA, Privacy, CRO –HR, Legal, Technology … •External Relationships –Law Enforcement –Media Firm –Cyber liability Insurer •Education A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 5. Establish the Culture •Leaders are aware and talk about security •Education of everyone (staff, faculty, physicians, …) •Framework – Detailed Plan – Testing –Are you using NIST or ISO … –Issues and Investigations protocols –Incident Reporting: (PHI, PII, PCI, Hacks) •Do Audits of: –Easy-to-guess password on system audits –Vendor management – SSAE16, SOC2 Type2 Reports –Access modes & points - Cloud computing •In healthcare security involves Privacy & Cyber Security A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 6. Risk Analysis •Risk Assessment: –Part of the companies ‘ERM’ ? –What is your risk tolerance, for each class of data •Level of user access to data & systems •Leakage thru employee – (error, misuse) –"Lifecycle" approach to Policy and Procedures –Technology portfolio •Spending/Budget for Security •Up-to-date ? – –System Patch Levels - Virus Protection Levels A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 7. Build a Core Security Team •Determine Core Security Team –Knowledge of Regulation (Federal & State) •what states people live in, if data accessed –Turnover & Retention –Tools & Training •Incident Response Team Needs –Plans & Escalation plan –Breach reporting –How & Where to document –Where are the logs? Do you have the right logs? Great Workplace A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 8. Build Infrastructure •Understand your environment –DLP, IDS, Firewalls –Segmentation –Strong passwords •Physical Security (& Education) •Encryption - ‘everything’ •Change Management (i.e iOS 8.0.1) •Disaster Recovery •Team training Basic must be in place A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 9. Understanding your Environment •Users –Login patterns (service accounts during night time, login after terms) –Account Volumes –Last used and time since password change –Failed Login Attempts –Internal and External access •Usage –Understand Both Systems & Network Configurations –Identity of New Network Segments –Bandwidth usage of network –FTP (22) and Secure (443) site statistics and destinations –Website attempts; Blacklisted sites (i.e. outbound blocked sites) or do Whitelisting Metrics; There is a strong relationship between metrics and problems A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 10. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Be Prepared •The Board wants answers •HHS-CMS-OCR demands quick answers •Staff wants full access •Your community – Public wants assurances •You want to sleep at night
  • 11. Q & A Skip Hubbard Skip_Hubbard@BSHSI.org A CHIME Leadership Education and Development Forum in collaboration with iHT2