SlideShare a Scribd company logo
1 of 22
Download to read offline
© 2014 Silverline – Confidential Do Not Distribute© 2014 Silverline – Confidential Do Not Distribute
© 2014 Silverline – Confidential Do Not Distribute
© 2014 Silverline – Confidential Do Not Distribute
The Michigan Health Information Network (MiHIN) is Michigan's
initiative to improve health care quality, efficient, and patient stagey
through the sharing of electronic health information, while reducing
costs.
• Official state designed entity for health information exchange across
Michigan and through integration with the eHealth Exchange.
• Nonprofit entity, functioning as a public and private collaboration between
the State of Michigan , sub-state health Information Exchanges, payers,
providers, and patients.
© 2014 Silverline – Confidential Do Not Distribute
• Who is Silverline?
• What can the Cloud do?
• Deploying the Cloud
• Security in the Cloud
• An example of the Cloud
• HIPAA and the Cloud
© 2014 Silverline – Confidential Do Not Distribute
• Serial Consultant
• Startups
• Cloud
© 2014 Silverline – Confidential Do Not Distribute
Headquartered in NYC with
resources around the US.
110
9.8/10
700+ Salesforce Deployments
Healthcare, Financial Services,
and Force.com
Provider, Health Plans,
Medical Devices, Wellness
Tools, Care Management
Services, Staffing/Recruiting
Firms
CalendarAnything, Visual
Relationship Mapping, and
The Watercooler: An Intranet
Platform
© 2014 Silverline – Confidential Do Not Distribute
Not Using the Cloud
Using the Cloud
70%
30%
© 2014 Silverline – Confidential Do Not Distribute
• Device Agnostic
• Predictable costs
• Reduced complexity due to coordination of hardware and software
• Faster and rapid deployment
• Universal access
• Proven management tools
• Streamlined M&A integration
• Realignment of IT resources to business imperatives
• Enhanced collaboration
• Improved analytics across applications
• Lack of tangible asset storage
…among others
© 2014 Silverline – Confidential Do Not Distribute
Health Plans
Improve visibility, collaboration, management,
and control over ongoing insurance policy
approvals, renewals, and changes with
sophisticated workflow and data validation
rules.
Medical Devices
Consolidate, Coordinate,
and Automate
Marketing/Sales Activities
and Streamline M&A Activity
Medical Supply
Replace ERPs. Consolidation of sales, inventory
management, and customer service into one
application, manage marketing efforts, track and
manage customer rewards, management and executive
dashboards
Healthcare Services
Automate and coordinate patient
lifecycle management and serve as
a lynch-pin between multiple
systems (inquiry, clinical,
scheduling & billing)
Health Information Network
Relationships between providers, patient care coordination, promote care
teams, connect patients, doctors, and healthcare facilities. TOC Notifications
© 2014 Silverline – Confidential Do Not Distribute
• Poor Information
o Messaging around cloud technology is often inaccurate, complex, and
not tailored to the audience. Leading to hesitancy and confusion,
rather than excitement and adoption
• Ambivalence
o “Cloud” represents leading-edge technology, the problem is that the
word “cloud” has become associated with so many different solutions,
products, apps, and offerings that people tend to disregard the value
• Lack of Trust
o Security is not the issue with cloud; trust is.
© 2014 Silverline – Confidential Do Not Distribute
• Applications designed for end-users delivered over
the web
• Examples – Salesforce, Workday, Concur
Software as a
Service (SaaS)
“Consume the Cloud”
• A set of tools and services designed to make coding
and deploying those applications quick and efficient
• Examples – Force.com, Google App Engine
Platform as a
Service (PaaS)
“Leverage the Cloud”
• The hardware and software that powers it all –
servers, storage, networks, operating systems
• Examples – Amazon Web Services, Azure, Rackspace
Infrastructure as
a Service (IaaS)
“Be a Cloud”
*Rackspace.com - “Whitepaper: Understanding the Cloud Computing Stack: SaaS, PaaS, IaaS”
*Blogs.technet.com – Cho’s Theories of Cloud Computing”
© 2014 Silverline – Confidential Do Not Distribute
Multi-tenant
Shared infrastructure and costs
Utility model
Service provider hosted
Single-tenant
No shared infrastructure
Higher, yet fixed cost
Greater flexibility
Highest level of security
Hosted at provider or enterprise
Composition of multiple cloud
environments (public/private)
Public
40%
*TechTarget's fall 2013 Cloud Pulse survey
Private
22%
Hybrid
38%
© 2014 Silverline – Confidential Do Not Distribute
• Defining secure infrastructure models
• Lack of trust between participants in cloud ecosystems
• Bridging the gap between existing internal security standards and
those governing off-premise services.
• Loss of governance
• Responsibility ambiguity – deployment model plays a role
• Isolation failure – mechanisms separating storage/memory/ routing
• Vendor lock-in
• Compounded malicious behavior
• Service unavailability
*Symantec – “The Secure Cloud: Best Practices for Cloud Adoption
*Cloud Standards Customer Council – Security for Cloud Computing – 10 Steps to Ensure Success
© 2014 Silverline – Confidential Do Not Distribute
*2014 Microsoft - Security Trends in Healthcare
Conduct
system-wide
data backups
that are
regularly
tested
Do not use
standardized
data
classification
Have a
disaster
recovery
program
Do not have
asset
management
policies and
conduct
asset
discovery
manually
Have
ineffective
controls for
removing
access when
employees
leave or are
reassigned
Have
immature
security
policies
© 2014 Silverline – Confidential Do Not Distribute
*Eran Feigenbaum – Director of Security for GoogleApps
30%
Using the Cloud
*Computerworld.com – “Cloud security concerns are overblown experts say”, Intermap Survey
Cloud-wary = 40% Cloud-wise = 15%
© 2014 Silverline – Confidential Do Not Distribute
*Symantec – “The Secure Cloud: Best Practices for Cloud Adoption
Infrastructure: How can you ensure that your infrastructure
providers have appropriate security and disaster recovery
policies and stick to them?
Identity: How can you enforce rigorous authentication across
multiple interconnected systems without adversely affecting
flexibility and productivity?
Information: How can you classify and protect sensitive
information, and ensure compliance with policies and
regulations?
© 2014 Silverline – Confidential Do Not Distribute
Preventative Corrective Detective
*Wikipedia
Set in place to
prevent any
purposeful attack on
a cloud system.
Much like a warning
sign on a fence or
property, these
controls do not
reduce the
vulnerability of the
system
Upgrade the
strength of the
system by managing
and safeguarding
vulnerabilities. They
cover the attack and
reduce the damage
and violation when
an attack occurs
Used to reduce the
effect of an attack.
Take action as an
attack is occurring.
Used to detect any
attacks that may be
occurring in the
system. In the event
of an attack, the
detective control will
signal the
preventative or
corrective controls
Deterrent
© 2014 Silverline – Confidential Do Not Distribute
• Conduct a full risk and compliance assessment, including processes
o Interoperability and portability
o Compliance – business continuity, data recovery, logs/audit trails
o Vendor risk
o Supply chain and ecosystem
o Infrastructure and operations quality
• Secure your own information, people, identities, and roles
o User privileges
o Authentication
o Endpoint security (where applicable)
o Encryption (where applicable)
• Implement a strong governance framework
• Embrace a security-by-design approach
• Implement an active monitoring solution
*Symantec – “The Secure Cloud: Best Practices for Cloud Adoption
*Cloud Standards Customer Council – Security for Cloud Computing – 10 Steps to Ensure Success
• Evaluate security controls on physical infrastructure
and facilities
© 2014 Silverline – Confidential Do Not Distribute
• SMS Identify Confirmation
• IP Range Restrictions
• Two-factor authentication options
(outside of username/pw)
• Secure employee systems
o Updated browsers
o Email filters
o Device protection
• SAS 70 Type II, SysTrust, and ISO 27001
• Enhanced password policies
• Secure sessions
• Session timeout thresholds
• Transparency of instances
• Governance (employees, security staff,
counsel, assessments, policies)
• Incorporation into development process
*Salesforce.com
Data
Database Security
Host Security
Network Security
Physical Security
Operational Security
© 2014 Silverline – Confidential Do Not Distribute
*Salesforce.com
© 2014 Silverline – Confidential Do Not Distribute
• “Final Rule” – BAAs and SLAs are critical!
• Security and privacy controls
• Define an exit strategy
• HIPAA ready/certified vs. HIPAA compliant/audited
• Industry background of vendor – regulatory environment
• Understand encryption of health information – LCD for encryption
• Ensure data segregation, especially PHI – physical/electronic proximity
• Understand the cloud delivery model – public/private/hybrid
• Evaluate breach monitoring
• MU informing HIPAA - CMS vs. Office of Civil Rights (OCR)
*HealthITSecurity – How HIPAA affects Healthcare cloud computing decisions
*HIPAA Considerations in Evaluating Cloud Computing – Ober | Kaler
© 2014 Silverline – Confidential Do Not Distribute

More Related Content

What's hot

Intelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business GroupIntelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business GroupAccenture Technology
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture Italia
 
Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardChristian Wernberg-Tougaard
 
Key trend in strategic sourcing
Key trend in strategic sourcing Key trend in strategic sourcing
Key trend in strategic sourcing Abhigupta110
 
Accenture: ACIC Rome & Red Hat
Accenture: ACIC Rome & Red HatAccenture: ACIC Rome & Red Hat
Accenture: ACIC Rome & Red HatAccenture Italia
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Codit
 
New world software sitefinity presentation
New world software sitefinity presentationNew world software sitefinity presentation
New world software sitefinity presentationchandrasekhar buddha
 
Delivering applications at the pace of business
Delivering applications at the pace of businessDelivering applications at the pace of business
Delivering applications at the pace of businessAccenture Technology
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureAmazon Web Services
 
Taking Windows Containers to Enterprise Level
Taking Windows Containers to Enterprise LevelTaking Windows Containers to Enterprise Level
Taking Windows Containers to Enterprise Levelaccenture
 
VEA Services Portfolio
VEA  Services  PortfolioVEA  Services  Portfolio
VEA Services Portfoliokeygrant
 
Government Innovation Country Specific Report - Australia
Government Innovation Country Specific Report - AustraliaGovernment Innovation Country Specific Report - Australia
Government Innovation Country Specific Report - Australiaaccenture
 
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019Accenture Technology
 
Accenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-valueAccenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-valuengaurhcd
 
Conf 2018 Track 1 - Aerospace Innovation
Conf 2018 Track 1 - Aerospace InnovationConf 2018 Track 1 - Aerospace Innovation
Conf 2018 Track 1 - Aerospace InnovationTechExeter
 

What's hot (20)

Intelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business GroupIntelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business Group
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 
Manufacturing and the data conundrum
Manufacturing and the data conundrumManufacturing and the data conundrum
Manufacturing and the data conundrum
 
Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaard
 
Infinite investor presentation March 2013
Infinite investor presentation   March 2013Infinite investor presentation   March 2013
Infinite investor presentation March 2013
 
Key trend in strategic sourcing
Key trend in strategic sourcing Key trend in strategic sourcing
Key trend in strategic sourcing
 
Accenture: ACIC Rome & Red Hat
Accenture: ACIC Rome & Red HatAccenture: ACIC Rome & Red Hat
Accenture: ACIC Rome & Red Hat
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
 
New world software sitefinity presentation
New world software sitefinity presentationNew world software sitefinity presentation
New world software sitefinity presentation
 
Delivering applications at the pace of business
Delivering applications at the pace of businessDelivering applications at the pace of business
Delivering applications at the pace of business
 
Pwc digital-iq-report final
Pwc digital-iq-report finalPwc digital-iq-report final
Pwc digital-iq-report final
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - Accenture
 
Taking Windows Containers to Enterprise Level
Taking Windows Containers to Enterprise LevelTaking Windows Containers to Enterprise Level
Taking Windows Containers to Enterprise Level
 
Nff 15112011 education from the cloud
Nff 15112011 education from the cloudNff 15112011 education from the cloud
Nff 15112011 education from the cloud
 
VEA Services Portfolio
VEA  Services  PortfolioVEA  Services  Portfolio
VEA Services Portfolio
 
Government Innovation Country Specific Report - Australia
Government Innovation Country Specific Report - AustraliaGovernment Innovation Country Specific Report - Australia
Government Innovation Country Specific Report - Australia
 
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
 
Accenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-valueAccenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-value
 
Accenture & Commvault
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
 
Conf 2018 Track 1 - Aerospace Innovation
Conf 2018 Track 1 - Aerospace InnovationConf 2018 Track 1 - Aerospace Innovation
Conf 2018 Track 1 - Aerospace Innovation
 

Similar to HEALTHCARE, THE CLOUD, AND ITS SECURITY

Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpointCloudPassage
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01promediakw
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Jean-Marie Abi-Ghanem
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
Checklist for Competent Cloud Security Management
Checklist for Competent Cloud Security ManagementChecklist for Competent Cloud Security Management
Checklist for Competent Cloud Security ManagementCloud Credential Council
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfCiente
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityHaluk Demirkan
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think Uni Systems S.M.S.A.
 

Similar to HEALTHCARE, THE CLOUD, AND ITS SECURITY (20)

Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpoint
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Checklist for Competent Cloud Security Management
Checklist for Competent Cloud Security ManagementChecklist for Competent Cloud Security Management
Checklist for Competent Cloud Security Management
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
GRC Dynamics in Securing Cloud
GRC Dynamics in Securing CloudGRC Dynamics in Securing Cloud
GRC Dynamics in Securing Cloud
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 

Recently uploaded

❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...Rashmi Entertainment
 
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...India Call Girls
 
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...Sheetaleventcompany
 
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*Mumbai Call girl
 
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...India Call Girls
 
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...Sheetaleventcompany
 
Low Rate Call Girls Pune {9142599079} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9142599079} ❤️VVIP NISHA Call Girls in Pune Maharas...Low Rate Call Girls Pune {9142599079} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9142599079} ❤️VVIP NISHA Call Girls in Pune Maharas...Sheetaleventcompany
 
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...Sheetaleventcompany
 
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...India Call Girls
 
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...Sheetaleventcompany
 
Premium Call Girls Bangalore {9179660964} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {9179660964} ❤️VVIP POOJA Call Girls in Bangalor...Premium Call Girls Bangalore {9179660964} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {9179660964} ❤️VVIP POOJA Call Girls in Bangalor...Sheetaleventcompany
 
2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in RheumatologySidney Erwin Manahan
 
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...Rashmi Entertainment
 
❤️Amritsar Call Girls Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ ...
❤️Amritsar Call Girls Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ ...❤️Amritsar Call Girls Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ ...
❤️Amritsar Call Girls Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ ...shallyentertainment1
 
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...India Call Girls
 
The Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's DiagramThe Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's DiagramMedicoseAcademics
 
Call Girl Service In Mumbai ❤️🍑 9xx000xx09 👄🫦Independent Escort Service Mumba...
Call Girl Service In Mumbai ❤️🍑 9xx000xx09 👄🫦Independent Escort Service Mumba...Call Girl Service In Mumbai ❤️🍑 9xx000xx09 👄🫦Independent Escort Service Mumba...
Call Girl Service In Mumbai ❤️🍑 9xx000xx09 👄🫦Independent Escort Service Mumba...Sheetaleventcompany
 
💚Trustworthy Call Girls Chandigarh 💯Niamh 📲🔝8868886958🔝Call Girls In Chandiga...
💚Trustworthy Call Girls Chandigarh 💯Niamh 📲🔝8868886958🔝Call Girls In Chandiga...💚Trustworthy Call Girls Chandigarh 💯Niamh 📲🔝8868886958🔝Call Girls In Chandiga...
💚Trustworthy Call Girls Chandigarh 💯Niamh 📲🔝8868886958🔝Call Girls In Chandiga...Sheetaleventcompany
 
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...Sheetaleventcompany
 
science quiz bee questions.doc FOR ELEMENTARY SCIENCE
science quiz bee questions.doc FOR ELEMENTARY SCIENCEscience quiz bee questions.doc FOR ELEMENTARY SCIENCE
science quiz bee questions.doc FOR ELEMENTARY SCIENCEmaricelsampaga
 

Recently uploaded (20)

❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ C...
 
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Kanpur 🧿 9332606886 🧿 High Class Call Gir...
 
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...
 
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*
Ulhasnagar Call girl escort *88638//40496* Call me monika call girls 24*
 
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Mysore 🧿 9332606886 🧿 High Class Call Girl Servi...
 
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
 
Low Rate Call Girls Pune {9142599079} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9142599079} ❤️VVIP NISHA Call Girls in Pune Maharas...Low Rate Call Girls Pune {9142599079} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9142599079} ❤️VVIP NISHA Call Girls in Pune Maharas...
 
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
 
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
💞 Safe And Secure Call Girls Coimbatore 🧿 9332606886 🧿 High Class Call Girl S...
 
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
Independent Call Girls Bangalore {7304373326} ❤️VVIP POOJA Call Girls in Bang...
 
Premium Call Girls Bangalore {9179660964} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {9179660964} ❤️VVIP POOJA Call Girls in Bangalor...Premium Call Girls Bangalore {9179660964} ❤️VVIP POOJA Call Girls in Bangalor...
Premium Call Girls Bangalore {9179660964} ❤️VVIP POOJA Call Girls in Bangalor...
 
2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology
 
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
 
❤️Amritsar Call Girls Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ ...
❤️Amritsar Call Girls Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ ...❤️Amritsar Call Girls Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ ...
❤️Amritsar Call Girls Service☎️98151-129OO☎️ Call Girl service in Amritsar☎️ ...
 
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
💸Cash Payment No Advance Call Girls Nagpur 🧿 9332606886 🧿 High Class Call Gir...
 
The Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's DiagramThe Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's Diagram
 
Call Girl Service In Mumbai ❤️🍑 9xx000xx09 👄🫦Independent Escort Service Mumba...
Call Girl Service In Mumbai ❤️🍑 9xx000xx09 👄🫦Independent Escort Service Mumba...Call Girl Service In Mumbai ❤️🍑 9xx000xx09 👄🫦Independent Escort Service Mumba...
Call Girl Service In Mumbai ❤️🍑 9xx000xx09 👄🫦Independent Escort Service Mumba...
 
💚Trustworthy Call Girls Chandigarh 💯Niamh 📲🔝8868886958🔝Call Girls In Chandiga...
💚Trustworthy Call Girls Chandigarh 💯Niamh 📲🔝8868886958🔝Call Girls In Chandiga...💚Trustworthy Call Girls Chandigarh 💯Niamh 📲🔝8868886958🔝Call Girls In Chandiga...
💚Trustworthy Call Girls Chandigarh 💯Niamh 📲🔝8868886958🔝Call Girls In Chandiga...
 
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
Lucknow Call Girls Service ❤️🍑 9xx000xx09 👄🫦 Independent Escort Service Luckn...
 
science quiz bee questions.doc FOR ELEMENTARY SCIENCE
science quiz bee questions.doc FOR ELEMENTARY SCIENCEscience quiz bee questions.doc FOR ELEMENTARY SCIENCE
science quiz bee questions.doc FOR ELEMENTARY SCIENCE
 

HEALTHCARE, THE CLOUD, AND ITS SECURITY

  • 1. © 2014 Silverline – Confidential Do Not Distribute© 2014 Silverline – Confidential Do Not Distribute
  • 2. © 2014 Silverline – Confidential Do Not Distribute
  • 3. © 2014 Silverline – Confidential Do Not Distribute The Michigan Health Information Network (MiHIN) is Michigan's initiative to improve health care quality, efficient, and patient stagey through the sharing of electronic health information, while reducing costs. • Official state designed entity for health information exchange across Michigan and through integration with the eHealth Exchange. • Nonprofit entity, functioning as a public and private collaboration between the State of Michigan , sub-state health Information Exchanges, payers, providers, and patients.
  • 4. © 2014 Silverline – Confidential Do Not Distribute • Who is Silverline? • What can the Cloud do? • Deploying the Cloud • Security in the Cloud • An example of the Cloud • HIPAA and the Cloud
  • 5. © 2014 Silverline – Confidential Do Not Distribute • Serial Consultant • Startups • Cloud
  • 6. © 2014 Silverline – Confidential Do Not Distribute Headquartered in NYC with resources around the US. 110 9.8/10 700+ Salesforce Deployments Healthcare, Financial Services, and Force.com Provider, Health Plans, Medical Devices, Wellness Tools, Care Management Services, Staffing/Recruiting Firms CalendarAnything, Visual Relationship Mapping, and The Watercooler: An Intranet Platform
  • 7. © 2014 Silverline – Confidential Do Not Distribute Not Using the Cloud Using the Cloud 70% 30%
  • 8. © 2014 Silverline – Confidential Do Not Distribute • Device Agnostic • Predictable costs • Reduced complexity due to coordination of hardware and software • Faster and rapid deployment • Universal access • Proven management tools • Streamlined M&A integration • Realignment of IT resources to business imperatives • Enhanced collaboration • Improved analytics across applications • Lack of tangible asset storage …among others
  • 9. © 2014 Silverline – Confidential Do Not Distribute Health Plans Improve visibility, collaboration, management, and control over ongoing insurance policy approvals, renewals, and changes with sophisticated workflow and data validation rules. Medical Devices Consolidate, Coordinate, and Automate Marketing/Sales Activities and Streamline M&A Activity Medical Supply Replace ERPs. Consolidation of sales, inventory management, and customer service into one application, manage marketing efforts, track and manage customer rewards, management and executive dashboards Healthcare Services Automate and coordinate patient lifecycle management and serve as a lynch-pin between multiple systems (inquiry, clinical, scheduling & billing) Health Information Network Relationships between providers, patient care coordination, promote care teams, connect patients, doctors, and healthcare facilities. TOC Notifications
  • 10. © 2014 Silverline – Confidential Do Not Distribute • Poor Information o Messaging around cloud technology is often inaccurate, complex, and not tailored to the audience. Leading to hesitancy and confusion, rather than excitement and adoption • Ambivalence o “Cloud” represents leading-edge technology, the problem is that the word “cloud” has become associated with so many different solutions, products, apps, and offerings that people tend to disregard the value • Lack of Trust o Security is not the issue with cloud; trust is.
  • 11. © 2014 Silverline – Confidential Do Not Distribute • Applications designed for end-users delivered over the web • Examples – Salesforce, Workday, Concur Software as a Service (SaaS) “Consume the Cloud” • A set of tools and services designed to make coding and deploying those applications quick and efficient • Examples – Force.com, Google App Engine Platform as a Service (PaaS) “Leverage the Cloud” • The hardware and software that powers it all – servers, storage, networks, operating systems • Examples – Amazon Web Services, Azure, Rackspace Infrastructure as a Service (IaaS) “Be a Cloud” *Rackspace.com - “Whitepaper: Understanding the Cloud Computing Stack: SaaS, PaaS, IaaS” *Blogs.technet.com – Cho’s Theories of Cloud Computing”
  • 12. © 2014 Silverline – Confidential Do Not Distribute Multi-tenant Shared infrastructure and costs Utility model Service provider hosted Single-tenant No shared infrastructure Higher, yet fixed cost Greater flexibility Highest level of security Hosted at provider or enterprise Composition of multiple cloud environments (public/private) Public 40% *TechTarget's fall 2013 Cloud Pulse survey Private 22% Hybrid 38%
  • 13. © 2014 Silverline – Confidential Do Not Distribute • Defining secure infrastructure models • Lack of trust between participants in cloud ecosystems • Bridging the gap between existing internal security standards and those governing off-premise services. • Loss of governance • Responsibility ambiguity – deployment model plays a role • Isolation failure – mechanisms separating storage/memory/ routing • Vendor lock-in • Compounded malicious behavior • Service unavailability *Symantec – “The Secure Cloud: Best Practices for Cloud Adoption *Cloud Standards Customer Council – Security for Cloud Computing – 10 Steps to Ensure Success
  • 14. © 2014 Silverline – Confidential Do Not Distribute *2014 Microsoft - Security Trends in Healthcare Conduct system-wide data backups that are regularly tested Do not use standardized data classification Have a disaster recovery program Do not have asset management policies and conduct asset discovery manually Have ineffective controls for removing access when employees leave or are reassigned Have immature security policies
  • 15. © 2014 Silverline – Confidential Do Not Distribute *Eran Feigenbaum – Director of Security for GoogleApps 30% Using the Cloud *Computerworld.com – “Cloud security concerns are overblown experts say”, Intermap Survey Cloud-wary = 40% Cloud-wise = 15%
  • 16. © 2014 Silverline – Confidential Do Not Distribute *Symantec – “The Secure Cloud: Best Practices for Cloud Adoption Infrastructure: How can you ensure that your infrastructure providers have appropriate security and disaster recovery policies and stick to them? Identity: How can you enforce rigorous authentication across multiple interconnected systems without adversely affecting flexibility and productivity? Information: How can you classify and protect sensitive information, and ensure compliance with policies and regulations?
  • 17. © 2014 Silverline – Confidential Do Not Distribute Preventative Corrective Detective *Wikipedia Set in place to prevent any purposeful attack on a cloud system. Much like a warning sign on a fence or property, these controls do not reduce the vulnerability of the system Upgrade the strength of the system by managing and safeguarding vulnerabilities. They cover the attack and reduce the damage and violation when an attack occurs Used to reduce the effect of an attack. Take action as an attack is occurring. Used to detect any attacks that may be occurring in the system. In the event of an attack, the detective control will signal the preventative or corrective controls Deterrent
  • 18. © 2014 Silverline – Confidential Do Not Distribute • Conduct a full risk and compliance assessment, including processes o Interoperability and portability o Compliance – business continuity, data recovery, logs/audit trails o Vendor risk o Supply chain and ecosystem o Infrastructure and operations quality • Secure your own information, people, identities, and roles o User privileges o Authentication o Endpoint security (where applicable) o Encryption (where applicable) • Implement a strong governance framework • Embrace a security-by-design approach • Implement an active monitoring solution *Symantec – “The Secure Cloud: Best Practices for Cloud Adoption *Cloud Standards Customer Council – Security for Cloud Computing – 10 Steps to Ensure Success • Evaluate security controls on physical infrastructure and facilities
  • 19. © 2014 Silverline – Confidential Do Not Distribute • SMS Identify Confirmation • IP Range Restrictions • Two-factor authentication options (outside of username/pw) • Secure employee systems o Updated browsers o Email filters o Device protection • SAS 70 Type II, SysTrust, and ISO 27001 • Enhanced password policies • Secure sessions • Session timeout thresholds • Transparency of instances • Governance (employees, security staff, counsel, assessments, policies) • Incorporation into development process *Salesforce.com Data Database Security Host Security Network Security Physical Security Operational Security
  • 20. © 2014 Silverline – Confidential Do Not Distribute *Salesforce.com
  • 21. © 2014 Silverline – Confidential Do Not Distribute • “Final Rule” – BAAs and SLAs are critical! • Security and privacy controls • Define an exit strategy • HIPAA ready/certified vs. HIPAA compliant/audited • Industry background of vendor – regulatory environment • Understand encryption of health information – LCD for encryption • Ensure data segregation, especially PHI – physical/electronic proximity • Understand the cloud delivery model – public/private/hybrid • Evaluate breach monitoring • MU informing HIPAA - CMS vs. Office of Civil Rights (OCR) *HealthITSecurity – How HIPAA affects Healthcare cloud computing decisions *HIPAA Considerations in Evaluating Cloud Computing – Ober | Kaler
  • 22. © 2014 Silverline – Confidential Do Not Distribute