SlideShare une entreprise Scribd logo
1  sur  22
Moderator: Pam Matthews, RN, MBA, CPHIMS, FHIMSS, Vice President, Education & 
Business Development, CHIME 
Neal Ganguly, MBA, 
FCHIME, FHIMSS, CHCIO 
VP & CIO 
JFK Health System 
Username 
Password 
A CHIME Leadership Education and Development Forum in collaboration with iHT2 
#LEAD14 
Case Studies from the Field 
________ 
Putting Cyber Security Strategies into Action 
Miroslav Belote 
Director of IT – Infrastructure 
and Information Security 
Officer 
JFK Health System 
Sponsors: 
Nassar Nizami 
CISO 
Yale-New Haven Health 
System
Case Studies from the Field 
________ 
Putting Cyber Security Strategies into Action 
● Speaker: Nassar Nizami, CISO, Yale-New Haven Health System ● 
A CHIME Leadership Education and Development Forum in collaboration with iHT2 
#LEAD14
Yale New Haven Health System 
Who We Are 
• Four Member Delivery Network 
• Multiple Clinical Affiliations 
• Affiliated with Yale University 
• Destination Hospital for Patients Throughout the 
United States 
• Currently Going Through an Affiliation and 
Acquisition Period
Enterprise-Wide Clinical Systems
Application Inventory 
• Inventory of applications in a spreadsheet with key information 
• Information we are interested in 
Information 
we require
External Data Flow
Data Loss Prevention 
Email 
Desktop/ 
Laptops 
Web 
File shares 
Cloud 
Mobile 
Devices
Exact Data Match 
• Patten based matches 
• Common 
• xxx-xx-xxx 
• Potential SSN 
• False Positives 
• Exact Data Match 
• Match on known and indexed data 
• First Name, Last Name, MRN from EMR 
• First Name, Last Name,, Employee ID 
from HR system 
• False positives decrease 
significantly
Desktop/Laptop 
• Client installed on desktops and 
laptops 
• Scans for 
• Files copied to removable 
media 
• Internet traffic 
• Local drive scan 
• Pattern based matching (HIPAA 
Policies) 
• Data scanned when copied to 
removable media
Desktop 
Challenges 
Computer Slow 
Down 
Hardware 
Refresh 
Complete Desktop 
Scan 
Selective Scan 
Good Support for 
Windows OS 
Support Lacking for 
non-Windows OS
Web 
• Dedicated servers for HTTP 
• ~80% of our overall traffic 
• Dedicated servers to scan select protocols like FTP, IRC etc. 
• Traditionally not been a problem area 
• Ended up blocking many protocols 
• Challenges: 
• Encrypted traffic is tough to scan 
• Solution requires robust proxy server infrastructure and 
proper certificate deployment
Email 
• Policy requires that the emails with PHI or sensitive information must be 
encrypted manually 
• Keyword in subject line 
• Require prior approval 
• All outbound emails are scanned for PHI 
• Encrypted if PHI is found 
EDM 
HIPAA 
Lexicons 
Internet 
Internal 
Network 
• Challenges: 
• Images, especially screen shots 
• PDF files scanned as images 
• Encrypted attachments 
• False positives 
• Marketing & HR
File Shares 
• Started with ad-hoc scanning 
– First 2-3 years 
• Periodic since last year 
– Scanning has improved 
• Several terabytes in a couple of days
File Share Management 
• File share permission and auditing tool 
– Who has access to what shares? 
• Thousands of shares 
– Many more folders and sub-folders 
• Integrated with DLP 
– Flags folders with sensitive information 
– Extremely helpful in prioritizing
Governance & Timeline 
• Acquired solution 
• Implemented Email & Web 
– Email was a quick win 
• Desktop – four years for 80% coverage 
• Committee to direct implementation
Cloud & Mobile Devices 
• Hosted emails, Office365, 
Box.net etc. 
• No good solution 
• Some vendors offer 
basic DLP capabilities 
• Scanning maybe 
possible if data 
orginiates from 
corporate network 
• No good solution 
• Computing capability 
• Different OS 
• Limited access to API 
• VPN back to corporate 
• Slow 
• Can be bypassed
Lessons Learned 
User Communication Skilled Team Multiple Servers 
Part of Solution Slowness
Lessons Learned 
• User communication 
• Dedicated & skilled team 
– Takes time to understand false positives 
• Scalability 
– Plan for multiple servers with lots of processing power 
• DLP alone is not effective tool against someone 
who is trying to bypass controls 
– Part of a solution 
• Desktop client may cause slowness
Next Steps/Wish List 
• Notification to management 
• Active blocking of network protocols 
• Incorporate SSL 
– Technically challenging 
• Apple computers 
• Mobile device integration 
• Cloud based storage 
• Involve business*
reference
Facts & Figures 
• Medical staff 5675 
• Employees 18,345 
• Total Licensed Beds 2130 
• Inpatient Discharges 93,923 
• Outpatient Visits 1,397,632 
• Total Assets $3.6 billion 
• Net Revenue $2.6 billion
Q & A 
Contact Information 
Nassar Nizami 
A CHIME Leadership Education and Development Forum in collaboration with iHT2

Contenu connexe

Tendances

Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
John Secondari
 
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOETeam NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Edward Ehnow
 
Key challanges information management
Key challanges information managementKey challanges information management
Key challanges information management
Employee
 

Tendances (11)

ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
GWAVA Keynote
GWAVA KeynoteGWAVA Keynote
GWAVA Keynote
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOETeam NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
 
Key challanges information management
Key challanges information managementKey challanges information management
Key challanges information management
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 

Similaire à CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security Strategies into Action"

Sabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseSabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large Enterprise
Orchestra Networks
 

Similaire à CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security Strategies into Action" (20)

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
 
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
 
Agility for big data
Agility for big data Agility for big data
Agility for big data
 
Sabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseSabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large Enterprise
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
[AIIM17] Facilitating Business Process Improvement in Information Management...
[AIIM17]  Facilitating Business Process Improvement in Information Management...[AIIM17]  Facilitating Business Process Improvement in Information Management...
[AIIM17] Facilitating Business Process Improvement in Information Management...
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
Online LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 WebinarOnline LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 Webinar
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
Chapter01
Chapter01Chapter01
Chapter01
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
 
OSU Big Data Conference, Oklahoma City
OSU Big Data Conference, Oklahoma CityOSU Big Data Conference, Oklahoma City
OSU Big Data Conference, Oklahoma City
 
Informs Conference, Huntington Beach
Informs Conference, Huntington BeachInforms Conference, Huntington Beach
Informs Conference, Huntington Beach
 
Office 365 and using SharePoint Online
Office 365 and using SharePoint OnlineOffice 365 and using SharePoint Online
Office 365 and using SharePoint Online
 
Data warehouseold
Data warehouseoldData warehouseold
Data warehouseold
 

Plus de Health IT Conference – iHT2

Plus de Health IT Conference – iHT2 (20)

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Dernier (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security Strategies into Action"

  • 1. Moderator: Pam Matthews, RN, MBA, CPHIMS, FHIMSS, Vice President, Education & Business Development, CHIME Neal Ganguly, MBA, FCHIME, FHIMSS, CHCIO VP & CIO JFK Health System Username Password A CHIME Leadership Education and Development Forum in collaboration with iHT2 #LEAD14 Case Studies from the Field ________ Putting Cyber Security Strategies into Action Miroslav Belote Director of IT – Infrastructure and Information Security Officer JFK Health System Sponsors: Nassar Nizami CISO Yale-New Haven Health System
  • 2. Case Studies from the Field ________ Putting Cyber Security Strategies into Action ● Speaker: Nassar Nizami, CISO, Yale-New Haven Health System ● A CHIME Leadership Education and Development Forum in collaboration with iHT2 #LEAD14
  • 3. Yale New Haven Health System Who We Are • Four Member Delivery Network • Multiple Clinical Affiliations • Affiliated with Yale University • Destination Hospital for Patients Throughout the United States • Currently Going Through an Affiliation and Acquisition Period
  • 5. Application Inventory • Inventory of applications in a spreadsheet with key information • Information we are interested in Information we require
  • 7. Data Loss Prevention Email Desktop/ Laptops Web File shares Cloud Mobile Devices
  • 8. Exact Data Match • Patten based matches • Common • xxx-xx-xxx • Potential SSN • False Positives • Exact Data Match • Match on known and indexed data • First Name, Last Name, MRN from EMR • First Name, Last Name,, Employee ID from HR system • False positives decrease significantly
  • 9. Desktop/Laptop • Client installed on desktops and laptops • Scans for • Files copied to removable media • Internet traffic • Local drive scan • Pattern based matching (HIPAA Policies) • Data scanned when copied to removable media
  • 10. Desktop Challenges Computer Slow Down Hardware Refresh Complete Desktop Scan Selective Scan Good Support for Windows OS Support Lacking for non-Windows OS
  • 11. Web • Dedicated servers for HTTP • ~80% of our overall traffic • Dedicated servers to scan select protocols like FTP, IRC etc. • Traditionally not been a problem area • Ended up blocking many protocols • Challenges: • Encrypted traffic is tough to scan • Solution requires robust proxy server infrastructure and proper certificate deployment
  • 12. Email • Policy requires that the emails with PHI or sensitive information must be encrypted manually • Keyword in subject line • Require prior approval • All outbound emails are scanned for PHI • Encrypted if PHI is found EDM HIPAA Lexicons Internet Internal Network • Challenges: • Images, especially screen shots • PDF files scanned as images • Encrypted attachments • False positives • Marketing & HR
  • 13. File Shares • Started with ad-hoc scanning – First 2-3 years • Periodic since last year – Scanning has improved • Several terabytes in a couple of days
  • 14. File Share Management • File share permission and auditing tool – Who has access to what shares? • Thousands of shares – Many more folders and sub-folders • Integrated with DLP – Flags folders with sensitive information – Extremely helpful in prioritizing
  • 15. Governance & Timeline • Acquired solution • Implemented Email & Web – Email was a quick win • Desktop – four years for 80% coverage • Committee to direct implementation
  • 16. Cloud & Mobile Devices • Hosted emails, Office365, Box.net etc. • No good solution • Some vendors offer basic DLP capabilities • Scanning maybe possible if data orginiates from corporate network • No good solution • Computing capability • Different OS • Limited access to API • VPN back to corporate • Slow • Can be bypassed
  • 17. Lessons Learned User Communication Skilled Team Multiple Servers Part of Solution Slowness
  • 18. Lessons Learned • User communication • Dedicated & skilled team – Takes time to understand false positives • Scalability – Plan for multiple servers with lots of processing power • DLP alone is not effective tool against someone who is trying to bypass controls – Part of a solution • Desktop client may cause slowness
  • 19. Next Steps/Wish List • Notification to management • Active blocking of network protocols • Incorporate SSL – Technically challenging • Apple computers • Mobile device integration • Cloud based storage • Involve business*
  • 21. Facts & Figures • Medical staff 5675 • Employees 18,345 • Total Licensed Beds 2130 • Inpatient Discharges 93,923 • Outpatient Visits 1,397,632 • Total Assets $3.6 billion • Net Revenue $2.6 billion
  • 22. Q & A Contact Information Nassar Nizami A CHIME Leadership Education and Development Forum in collaboration with iHT2