SlideShare a Scribd company logo
1 of 44
Download to read offline
IT governance and monitoring of operational
         and legal risks in hospitals
                     Mr. William Grollier,
                IT Systems & Security Officer,
       CHU (University Hospital Center) - Nice, France.
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Nice CHU in a nutshell




 22 departments
 5 hospitals
 1.700 beds
 ~60.000 patients hospitalized per year, ~180.000 visits
  per year
 8.000 employees
 240 servers and 3700 workstations running 100
  healthcare applications
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Founding principles behind IT governance
  and risks management

              • The legal risk is the consequence of operational risk
  Legal




              • The operational risk is more and more induced by IT risks
Operational


              • IT risks strongly relate to:
                • The availability and the performance of IT systems
                • The integrity and the confidentiality of data
    IT
                • The compliance with IT standards and policies
• Legal obligations
                                             Legal Risk
                                                          • Hospital Authority
                                                            responsibilities
                                                          • Financial impact




                                  Ops Risk

•   Services interoperability
•   Diagnostic reliability
•   Data corruption and leakage
•   Procedures Efficiency                                 IT Risk

                        • Poorly managed H/W, S/W infrastructure
                        • Weak protection and non compliant
                          behaviors
                        • Heterogeneity of HC applications
                        • HC IT services unavailability
Poorly managed H/W S/W infrastructure

  IT impact                   Operational                 Management
                                Impact                      Impact



•Waste of time             •Non interoperability        •Poor ROI of existing
                                                        infrastructure
•Complexity                •Poor QoS
                                                        •Additional
•Disruption due to                                      management costs
unwanted applications




    Requirement :
              Continuously monitor the PC standardization compliance
Weak protection and non compliant behaviors

 IT impact                    Operational                   Management
                                Impact                        Impact


•Disruption                  •Data                         •Penal impact
                                 •Corrupted
•Time wasted                     •Loss                     •Reputation
                                 •Cannot be accessed
•Repair cost                     or updated                •Financial loss

                             •Information leakage



   Requirement :
               Continuously monitor the security policy compliance
Heterogeneity of the HC applications
                                                              Management
    IT impact                  Operational                      Impact
                                 Impact


•Expensive maintenance        • Non interoperable         •   Penal responsibility
                              versions
•Application malfunctioning                               •   Reputation
                              •Data corruption
•QoS degradation                                          •   Cost and poor ROI
                              •Wrong diagnostics




      Requirement :
               Continuously monitor the HC applications compliance level
HC IT service unavailability

                                 Operational                Management
   IT impact
                                   Impact                     Impact


•Malfunctioning              •   Data unavailable         •Penal consequences
applications
                             •   Unaccessible images      •Reputation
•Poor availaility and
performnance                 •   Corrupted diagnostic     •Poor ROI

•Saturated bandwidth         •   Systems inefficiency



     Requirement :
               Continuously monitor the Quality of Services and users impact
Approach



    90% of
   incidents
 have internal   20% of basic good
     origin       practices resolve
                     80% of the        Security and Qos
                     problems            are a matter of
                                      proper governance,
                                       competences and
                                         taking control
                                      rather than a matter
                                            of means
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
IT governance monitoring @ work




               PC standardization compliance


                Security policy effectiveness



              HC applications compliance level



             Quality of Service and user support
Well managed H/W S/W infrastructure
          PC standardization compliance monitoring
Well managed H/W S/W infrastructure
          PC standardization compliance monitoring
Well managed H/W S/W infrastructure
          PC standardization compliance monitoring
Well managed H/W S/W infrastructure
          PC standardization compliance monitoring
Strong protection and compliant behaviors
         Security policy compliance and effectiveness monitoring
Strong protection and compliant behaviors
         Security policy compliance and effectiveness monitoring
Strong protection and compliant behaviors
         Security policy compliance and effectiveness monitoring
Shared or stolen user code identification (1/3)

         Security policy compliance and effectiveness monitoring
User codes connected on several machines
over a period of 30 minutes (2/3)
Security policy compliance and effectiveness monitoring
User codes connected simultaneously on
                                 several machines (3/3)
Security policy compliance and effectiveness monitoring
HC IT services availability

               Quality of Service monitoring
HC IT services availability

               Quality of Service monitoring
HC IT services availability

               Quality of Service monitoring
HC IT services availability

               Quality of Service monitoring
HC IT services availability

               Quality of Service monitoring
HC IT Services Support
Dynamic workstation monitoring
Troubleshoting (1/3)
Dynamic workstation monitoring
Troubelshooting (2/3)
Dynamic workstation monitoring
Troubleshooting (3/3)




         Program installed at 6:00 AM - New binary detected
Suspicious exe searches - query
Identified binaries executed over a period
of time (retrieve Hash codes from library)
Comparing binaries’s signature using
NEXThink library
Detection of system32.exe, Version 0.0.0.0, Ran
from a USB
Monitoring IT risks governance
drastically reduces ops and legal risks

Legal
• The legal risk is the consequence of
  operational risk



     Operational
     • The operational risk is more and more
       induced by IT risk



           IT risks
           • Availability and the performance of IT systems
           • Integrity and the confidentiality of data
           • Compliance with IT standards and policy
HC IT Services Governance Life Cycle




   Assess gap          Execute
                                          Monitor to
     against         and Monitor
                                          Maintain on
   target and         progress to
                                            target
   plan action       reach target



         •Risk Detection and Security Compliance
        •World class Quality of Service and Support
       •Cost effective HC infrastructure maintenance
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Solution benefits

       IT
              Cost of ownership: super fast deployment, lightweight, zero coding
              Non intrusive, zero infrastructure performance impact
              360°IT governance in one unified environment
              On Demand diagnosis
              OOTB, Investigation, Reporting, Alerting, Library
              Extensible to backend monitoring solutions

       Operations and Management
              G.R.C.: desktop configuration and usage compliance
              World class support / user satisfaction
              360°view over the QoS / impact analyses in real time
              Financial: infrastructure rationalization based on real usage
              Consistent PMSI repo*

* http://fr.wikipedia.org/wiki/Programme_de_m%C3%A9dicalisation_des_syst%C3%A8mes_d%27information
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Project phases

 End point Assessment Baseline (evaluation)
    Installation and deployment: 1 day
    Information collection: 3 weeks without work
    Configuration: 2 days

 Full deployment
    New dashboards creation and deployment
    Reporting and alerting

 NEXT Steps
    New dashboards, reports, alerts
    Integration to backend monitoring platforms to enable end-to-end
     monitoring
Thank you!


Contact:
Francois D’Haegeleer
francois.dhaegeleer@nexthink.com
+33 6 14 10 04 91

More Related Content

What's hot

3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.IGN MANTRA
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
NCI Network Engineering
NCI Network EngineeringNCI Network Engineering
NCI Network EngineeringChris Young
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseAnton Chuvakin
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesJohn Gilligan
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable SolarWinds
 
Dependable Operations
Dependable OperationsDependable Operations
Dependable OperationsLiming Zhu
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...AlienVault
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton ResumeJesse Hinton
 

What's hot (20)

3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
 
8. operations security
8. operations security8. operations security
8. operations security
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
NCI Network Engineering
NCI Network EngineeringNCI Network Engineering
NCI Network Engineering
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
SIG-NOC Tools Survey 2015
SIG-NOC Tools Survey 2015SIG-NOC Tools Survey 2015
SIG-NOC Tools Survey 2015
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best Practices
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable
 
Dependable Operations
Dependable OperationsDependable Operations
Dependable Operations
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
Muneer Balqadi
Muneer BalqadiMuneer Balqadi
Muneer Balqadi
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 

Viewers also liked

Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...Heather Leson
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy ProgramSamir Pawaskar
 
LEPC: Social media and disasters
LEPC: Social media and disastersLEPC: Social media and disasters
LEPC: Social media and disastersDuty Officer
 
Disasters and Management
Disasters and ManagementDisasters and Management
Disasters and ManagementNancy Schwartz
 
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...Reynaldo Joson
 
M Cartner: Mass Casualties and Real Disasters
M Cartner: Mass Casualties and Real DisastersM Cartner: Mass Casualties and Real Disasters
M Cartner: Mass Casualties and Real DisastersSMACC Conference
 
Leadership At Times Of Crises
Leadership At Times Of CrisesLeadership At Times Of Crises
Leadership At Times Of CrisesReginaPhelps
 
Gerard Fennessy: Anaphylaxis - the dying breaths
Gerard Fennessy: Anaphylaxis - the dying breathsGerard Fennessy: Anaphylaxis - the dying breaths
Gerard Fennessy: Anaphylaxis - the dying breathsSMACC Conference
 
Disaster management in india
Disaster management in indiaDisaster management in india
Disaster management in indiaNikhil Gaikwad
 
Disaster Management Initiatives in India
Disaster Management Initiatives in IndiaDisaster Management Initiatives in India
Disaster Management Initiatives in IndiaALNAP
 
Disaster management
Disaster managementDisaster management
Disaster managementSCGH ED CME
 
Evolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterEvolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterNicholas Kman, MD, FACEP
 
Principles of disaster management
Principles of disaster managementPrinciples of disaster management
Principles of disaster managementSCGH ED CME
 
Disaster management principles
Disaster management principlesDisaster management principles
Disaster management principlesSCGH ED CME
 
Disaster Management and Health
Disaster Management and HealthDisaster Management and Health
Disaster Management and HealthAswin KP
 

Viewers also liked (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy Program
 
Building a Citizen Engaged Research Project
Building a Citizen Engaged Research ProjectBuilding a Citizen Engaged Research Project
Building a Citizen Engaged Research Project
 
LEPC: Social media and disasters
LEPC: Social media and disastersLEPC: Social media and disasters
LEPC: Social media and disasters
 
Disasters and Management
Disasters and ManagementDisasters and Management
Disasters and Management
 
15db dm
15db dm15db dm
15db dm
 
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
 
M Cartner: Mass Casualties and Real Disasters
M Cartner: Mass Casualties and Real DisastersM Cartner: Mass Casualties and Real Disasters
M Cartner: Mass Casualties and Real Disasters
 
Leadership At Times Of Crises
Leadership At Times Of CrisesLeadership At Times Of Crises
Leadership At Times Of Crises
 
Gerard Fennessy: Anaphylaxis - the dying breaths
Gerard Fennessy: Anaphylaxis - the dying breathsGerard Fennessy: Anaphylaxis - the dying breaths
Gerard Fennessy: Anaphylaxis - the dying breaths
 
Policy and Insititutional Arrangement for Disaster Management
Policy and Insititutional Arrangement for Disaster ManagementPolicy and Insititutional Arrangement for Disaster Management
Policy and Insititutional Arrangement for Disaster Management
 
Disaster management in india
Disaster management in indiaDisaster management in india
Disaster management in india
 
Disaster Management Initiatives in India
Disaster Management Initiatives in IndiaDisaster Management Initiatives in India
Disaster Management Initiatives in India
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Evolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterEvolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disaster
 
Principles of disaster management
Principles of disaster managementPrinciples of disaster management
Principles of disaster management
 
Disaster management principles
Disaster management principlesDisaster management principles
Disaster management principles
 
Disaster Management and Health
Disaster Management and HealthDisaster Management and Health
Disaster Management and Health
 
Environmental Disasters
Environmental DisastersEnvironmental Disasters
Environmental Disasters
 

Similar to William Grollier - CHU Nice - IT Governance in hospitals

Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfNaveenKumar470500
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Schneider Electric
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudVISI
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital servicesNetDef
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanjiFeisal Nanji
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsPrecisely
 

Similar to William Grollier - CHU Nice - IT Governance in hospitals (20)

Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the Cloud
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital services
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanji
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
 
Pci Req
Pci ReqPci Req
Pci Req
 

More from Roald Sieberath

Présentation MediPath fr
Présentation MediPath frPrésentation MediPath fr
Présentation MediPath frRoald Sieberath
 
Cetic table ronde WeHealth-27042011
Cetic table ronde WeHealth-27042011Cetic table ronde WeHealth-27042011
Cetic table ronde WeHealth-27042011Roald Sieberath
 
Table ronde WeHealth Introduction
Table ronde WeHealth IntroductionTable ronde WeHealth Introduction
Table ronde WeHealth IntroductionRoald Sieberath
 
smart solutions healthcare MIC
smart solutions healthcare MICsmart solutions healthcare MIC
smart solutions healthcare MICRoald Sieberath
 
Cetic opportunites eHealth MIC
Cetic opportunites eHealth MICCetic opportunites eHealth MIC
Cetic opportunites eHealth MICRoald Sieberath
 
Cloud and health white paper
Cloud and health white paperCloud and health white paper
Cloud and health white paperRoald Sieberath
 
Laurens Touwen - Zorg Binnen Bereik
Laurens Touwen -  Zorg Binnen BereikLaurens Touwen -  Zorg Binnen Bereik
Laurens Touwen - Zorg Binnen BereikRoald Sieberath
 
Jan de Sitter - IT & health care delivery
Jan de Sitter - IT & health care deliveryJan de Sitter - IT & health care delivery
Jan de Sitter - IT & health care deliveryRoald Sieberath
 
Gilberte Deltour - home nurse experience
Gilberte Deltour -  home nurse experienceGilberte Deltour -  home nurse experience
Gilberte Deltour - home nurse experienceRoald Sieberath
 
Frank Robben - e-health platform
Frank Robben - e-health platformFrank Robben - e-health platform
Frank Robben - e-health platformRoald Sieberath
 
Trevor Single - Telecare & Telehealth in the UK
Trevor Single - Telecare & Telehealth in the UKTrevor Single - Telecare & Telehealth in the UK
Trevor Single - Telecare & Telehealth in the UKRoald Sieberath
 
Jan Van Emelen - MLOZ e-health
Jan Van Emelen - MLOZ e-healthJan Van Emelen - MLOZ e-health
Jan Van Emelen - MLOZ e-healthRoald Sieberath
 
Dirk De Wachter - how to feel more at home even in hospital
Dirk De Wachter - how to feel more at home even in hospitalDirk De Wachter - how to feel more at home even in hospital
Dirk De Wachter - how to feel more at home even in hospitalRoald Sieberath
 
WeHealth - bourse à projets
WeHealth - bourse à projetsWeHealth - bourse à projets
WeHealth - bourse à projetsRoald Sieberath
 

More from Roald Sieberath (15)

Presentation Polymedis
Presentation PolymedisPresentation Polymedis
Presentation Polymedis
 
Présentation MediPath fr
Présentation MediPath frPrésentation MediPath fr
Présentation MediPath fr
 
Cetic table ronde WeHealth-27042011
Cetic table ronde WeHealth-27042011Cetic table ronde WeHealth-27042011
Cetic table ronde WeHealth-27042011
 
Table ronde WeHealth Introduction
Table ronde WeHealth IntroductionTable ronde WeHealth Introduction
Table ronde WeHealth Introduction
 
smart solutions healthcare MIC
smart solutions healthcare MICsmart solutions healthcare MIC
smart solutions healthcare MIC
 
Cetic opportunites eHealth MIC
Cetic opportunites eHealth MICCetic opportunites eHealth MIC
Cetic opportunites eHealth MIC
 
Cloud and health white paper
Cloud and health white paperCloud and health white paper
Cloud and health white paper
 
Laurens Touwen - Zorg Binnen Bereik
Laurens Touwen -  Zorg Binnen BereikLaurens Touwen -  Zorg Binnen Bereik
Laurens Touwen - Zorg Binnen Bereik
 
Jan de Sitter - IT & health care delivery
Jan de Sitter - IT & health care deliveryJan de Sitter - IT & health care delivery
Jan de Sitter - IT & health care delivery
 
Gilberte Deltour - home nurse experience
Gilberte Deltour -  home nurse experienceGilberte Deltour -  home nurse experience
Gilberte Deltour - home nurse experience
 
Frank Robben - e-health platform
Frank Robben - e-health platformFrank Robben - e-health platform
Frank Robben - e-health platform
 
Trevor Single - Telecare & Telehealth in the UK
Trevor Single - Telecare & Telehealth in the UKTrevor Single - Telecare & Telehealth in the UK
Trevor Single - Telecare & Telehealth in the UK
 
Jan Van Emelen - MLOZ e-health
Jan Van Emelen - MLOZ e-healthJan Van Emelen - MLOZ e-health
Jan Van Emelen - MLOZ e-health
 
Dirk De Wachter - how to feel more at home even in hospital
Dirk De Wachter - how to feel more at home even in hospitalDirk De Wachter - how to feel more at home even in hospital
Dirk De Wachter - how to feel more at home even in hospital
 
WeHealth - bourse à projets
WeHealth - bourse à projetsWeHealth - bourse à projets
WeHealth - bourse à projets
 

Recently uploaded

Call Girls Bangalore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bangalore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Bangalore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bangalore Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...vidya singh
 
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomdiscovermytutordmt
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋TANUJA PANDEY
 
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...Arohi Goyal
 
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls JaipurRussian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Dipal Arora
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeCall Girls Delhi
 
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...hotbabesbook
 
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Chandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableChandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableDipal Arora
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...narwatsonia7
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...chandars293
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiRussian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiAlinaDevecerski
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...Taniya Sharma
 

Recently uploaded (20)

Call Girls Bangalore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bangalore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Bangalore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bangalore Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
 
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
 
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
 
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls JaipurRussian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
Russian Call Girls in Jaipur Riya WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
 
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Siliguri Just Call 9907093804 Top Class Call Girl Service Available
 
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
 
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
 
Chandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD availableChandrapur Call girls 8617370543 Provides all area service COD available
Chandrapur Call girls 8617370543 Provides all area service COD available
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 8250192130 ⟟ Call Me For Gen...
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
 
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls DelhiRussian Escorts Girls  Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
Russian Escorts Girls Nehru Place ZINATHI 🔝9711199012 ☪ 24/7 Call Girls Delhi
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
 

William Grollier - CHU Nice - IT Governance in hospitals

  • 1. IT governance and monitoring of operational and legal risks in hospitals Mr. William Grollier, IT Systems & Security Officer, CHU (University Hospital Center) - Nice, France.
  • 2. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 3. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 4. Nice CHU in a nutshell  22 departments  5 hospitals  1.700 beds  ~60.000 patients hospitalized per year, ~180.000 visits per year  8.000 employees  240 servers and 3700 workstations running 100 healthcare applications
  • 5. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 6. Founding principles behind IT governance and risks management • The legal risk is the consequence of operational risk Legal • The operational risk is more and more induced by IT risks Operational • IT risks strongly relate to: • The availability and the performance of IT systems • The integrity and the confidentiality of data IT • The compliance with IT standards and policies
  • 7. • Legal obligations Legal Risk • Hospital Authority responsibilities • Financial impact Ops Risk • Services interoperability • Diagnostic reliability • Data corruption and leakage • Procedures Efficiency IT Risk • Poorly managed H/W, S/W infrastructure • Weak protection and non compliant behaviors • Heterogeneity of HC applications • HC IT services unavailability
  • 8. Poorly managed H/W S/W infrastructure IT impact Operational Management Impact Impact •Waste of time •Non interoperability •Poor ROI of existing infrastructure •Complexity •Poor QoS •Additional •Disruption due to management costs unwanted applications Requirement : Continuously monitor the PC standardization compliance
  • 9. Weak protection and non compliant behaviors IT impact Operational Management Impact Impact •Disruption •Data •Penal impact •Corrupted •Time wasted •Loss •Reputation •Cannot be accessed •Repair cost or updated •Financial loss •Information leakage Requirement : Continuously monitor the security policy compliance
  • 10. Heterogeneity of the HC applications Management IT impact Operational Impact Impact •Expensive maintenance • Non interoperable • Penal responsibility versions •Application malfunctioning • Reputation •Data corruption •QoS degradation • Cost and poor ROI •Wrong diagnostics Requirement : Continuously monitor the HC applications compliance level
  • 11. HC IT service unavailability Operational Management IT impact Impact Impact •Malfunctioning • Data unavailable •Penal consequences applications • Unaccessible images •Reputation •Poor availaility and performnance • Corrupted diagnostic •Poor ROI •Saturated bandwidth • Systems inefficiency Requirement : Continuously monitor the Quality of Services and users impact
  • 12. Approach 90% of incidents have internal 20% of basic good origin practices resolve 80% of the Security and Qos problems are a matter of proper governance, competences and taking control rather than a matter of means
  • 13. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 14. IT governance monitoring @ work PC standardization compliance Security policy effectiveness HC applications compliance level Quality of Service and user support
  • 15. Well managed H/W S/W infrastructure PC standardization compliance monitoring
  • 16. Well managed H/W S/W infrastructure PC standardization compliance monitoring
  • 17. Well managed H/W S/W infrastructure PC standardization compliance monitoring
  • 18. Well managed H/W S/W infrastructure PC standardization compliance monitoring
  • 19. Strong protection and compliant behaviors Security policy compliance and effectiveness monitoring
  • 20. Strong protection and compliant behaviors Security policy compliance and effectiveness monitoring
  • 21. Strong protection and compliant behaviors Security policy compliance and effectiveness monitoring
  • 22. Shared or stolen user code identification (1/3) Security policy compliance and effectiveness monitoring
  • 23. User codes connected on several machines over a period of 30 minutes (2/3) Security policy compliance and effectiveness monitoring
  • 24. User codes connected simultaneously on several machines (3/3) Security policy compliance and effectiveness monitoring
  • 25. HC IT services availability Quality of Service monitoring
  • 26. HC IT services availability Quality of Service monitoring
  • 27. HC IT services availability Quality of Service monitoring
  • 28. HC IT services availability Quality of Service monitoring
  • 29. HC IT services availability Quality of Service monitoring
  • 30. HC IT Services Support
  • 33. Dynamic workstation monitoring Troubleshooting (3/3) Program installed at 6:00 AM - New binary detected
  • 35. Identified binaries executed over a period of time (retrieve Hash codes from library)
  • 36. Comparing binaries’s signature using NEXThink library
  • 37. Detection of system32.exe, Version 0.0.0.0, Ran from a USB
  • 38. Monitoring IT risks governance drastically reduces ops and legal risks Legal • The legal risk is the consequence of operational risk Operational • The operational risk is more and more induced by IT risk IT risks • Availability and the performance of IT systems • Integrity and the confidentiality of data • Compliance with IT standards and policy
  • 39. HC IT Services Governance Life Cycle Assess gap Execute Monitor to against and Monitor Maintain on target and progress to target plan action reach target •Risk Detection and Security Compliance •World class Quality of Service and Support •Cost effective HC infrastructure maintenance
  • 40. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 41. Solution benefits  IT  Cost of ownership: super fast deployment, lightweight, zero coding  Non intrusive, zero infrastructure performance impact  360°IT governance in one unified environment  On Demand diagnosis  OOTB, Investigation, Reporting, Alerting, Library  Extensible to backend monitoring solutions  Operations and Management  G.R.C.: desktop configuration and usage compliance  World class support / user satisfaction  360°view over the QoS / impact analyses in real time  Financial: infrastructure rationalization based on real usage  Consistent PMSI repo* * http://fr.wikipedia.org/wiki/Programme_de_m%C3%A9dicalisation_des_syst%C3%A8mes_d%27information
  • 42. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 43. Project phases  End point Assessment Baseline (evaluation)  Installation and deployment: 1 day  Information collection: 3 weeks without work  Configuration: 2 days  Full deployment  New dashboards creation and deployment  Reporting and alerting  NEXT Steps  New dashboards, reports, alerts  Integration to backend monitoring platforms to enable end-to-end monitoring