SlideShare uma empresa Scribd logo
1 de 41
Baixar para ler offline
What You Don't Know About Privacy and
                       Security Can Hurt You
                                                               Cora M. Butler, JD, RN, CHC
                                                         Director, Business Development
                                                & Commercial Contract Administration
Notice: Primaris is not acting in any capacity as the Federally designated Quality Improvement Organization (QIO) for Missouri during this presentation. Data used in this presentation was not
obtained under the QIO contract Primaris holds with the Centers for Medicare & Medicaid Services (CMS). This presentation is not sanctioned or endorsed by CMS. The content of the webinars is
based on material available in the public domain. The presentation is intended for educational purposes only. Primaris is not responsible for, and expressly disclaims all liability for, damages of any
kind arising out of use, reference to, or reliance on any information contained herein. All presentation slides are the property of Primaris. No part of the presentation may be reproduced, stored in a
retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Primaris.




   MO-12-03-REC          June 2012
Presentation Goals

At the conclusion of this portion of the presentation, participants will be able to:
1. Identify the general requirements of the Risk Management Process
   contemplated by the HIPAA Security Regulations.
2. Identify the three categories of safeguards required by the HIPAA Security
   Regulations.
3. Discuss Required versus Addressable Implementation Standards.
4. Identify the factors that may be taken into account by a Covered Entity when
   determining the most appropriate approach to meeting the requirements of the
   HIPAA Security Regulations.
5. Discuss the types of documentation to be maintained by Covered Entity to
   demonstrate compliance.
Risk Management Process
  HIPAA Security Regulations (45 CFR Part 160, 162, 164(a) and 164(c)) apply to Covered
     Entities that transmit or maintain ePHI (Protected Health Information in an electronic
     form).
  Requires implementation of Security Management (Risk Management) “sufficient to reduce
     risks and vulnerabilities to a reasonable and appropriate level” (164.308(a)(1)(ii)(B))
Security Management Standards
 Administrative
  –   Designated Security Officer
  –   Periodic Risk Assessment and Risk Mitigation
  –   Workforce Training and Education
 Physical
  –   Protecting facility and other places where patient data is accessed
        –    Building Alarm Systems, Locked Offices, Screen Savers
 Technical
  –   Technical controls that help ensure the integrity, confidentiality and availability of PHI
        –    Strong, secure passwords; backed up data; virus scans; data encryption
 Organizational Requirements
  –   Breach notification policies and Business Associate Agreements
Security Management Process
  The first standard under Administrative Safeguards section is the Security
  Management Process. This standard requires covered entities to:
  “Implement policies and procedures to prevent, detect, contain and correct
  security violations.”
  The purpose of this standard is to establish the administrative processes and
  procedures that a covered entity will use to implement the security program in its
  environment. There are four implementation specifications in the Security
  Management Process standard.
   1.   Risk Analysis (Required)
   2.   Risk Management (Required)
   3.   Sanction Policy (Required)
   4.   Information System Activity Review (Required)
Risk Analysis
A periodic technical and non-technical evaluation:
      Based initially on the standards implemented under the security final rule;
      Based subsequently in response to environmental or operational changes affecting
       the security of electronic protected health information; and
      Establishes the extent to which an entity’s security policies and procedures meet
       the rule.
      Documentation of compliance must be maintained. At a minimum:

       1                  2                  3                  4                    5
 HIPAA Standard- Organizational       Procedures         Current            Determination
 Implementation Policy that           that Address       Environment        of Compliance
 Feature         Addresses
Screening Questions
Security Program
 Roles & Responsibilities
  –   Has your organization formally appointed a central point of
      contact for security coordination?
       –   If so, who, and what is their position within the
           organization?
       –   Responsibilities clearly documented?
             –   Job Descriptions
             –   Information Security Policy
Screening Questions
Security Program
 External Parties
  –   Do you work with third parties, such as IT service providers,
      that have access to your patient's information?
       –   Does your organization have Business Associate
           agreements in place with these third parties?
             –   REC                   –   EHR Vendor

             –   IT Vendor             –   Attorneys, Billing Company

       –   What controls does your organization have in place to
           monitor and assess flow of information to third parties?
             Workflows to track data
               movement
Screening Questions
Security Policy
 Information Security Policy & Procedures
  –   Do you have documented information security policies and
      procedures?
       –   Do you have a formal information classification
           procedure? Please describe it. In particular, how would
           patient data be categorized?
       –   Have formal acceptable use rules been established for
           assets (hardware and software)?
       –   Do you have formal processes in place for security policy
           maintenance and deviation?
Screening Questions
Risk Management & Compliance
 Risk Assessment
  –   Do you have a process that addresses: the identification and
      measurement of potential risks, mitigating controls, and the
      acceptance or transfer of the remaining risk after mitigation
      steps have been applied?

 Compliance with Legal Requirements - Identification of
 applicable legislation
  –   Does a process exist to identify new laws and regulations with
      IT security implications?
        –   Newsletters   –   Webinars      –   Associations
Screening Questions
Training & Awareness
 During Employment – Training, Education &
 Awareness
  –   Have your employees been provided formal information
      security training?
  –   Have policies been communicated to your employees?
  –   Are periodic security reminders provided?

       –   New Employee Orientation   –   Yearly Training

       –   Posters in Public Areas    –   Email Reminders
Screening Questions
Personnel Security
 Background Checks
  –   Does your organization perform background checks to
      examine and assess an employee’s or contractor’s work and
      criminal history?
       –   Credential Verification
       –   Criminal History
       –   References
Screening Questions
Personnel Security
 Prior to Employment - Terms and Conditions of
 Employment?
  –   Are your employees required to sign a non-disclosure
      agreement? If so, are employees required to sign the non-
      disclosure agreement annually?

 Termination or Change in Employment
  –   Do you have a formal process to manage the termination and
      or transfer of employees?
       –   All Equipment is Returned
       –   User ID's Disabled in EHR and Windows
       –   Badges and/or Keys Returned.
Screening Questions
Physical Security
 Secure Areas
  –   Do you have effective physical access controls in place that
      prevent unauthorized access to facilities and a facility
      security plan?
       –   Are there plans in place to handle/manage contingent
           events or circumstances ?
       –   Is there a facility security plan?
       –   How are physical access controls authorized?
       –   Are there policies and procedures to document repairs
           and modifications to physical components of the facility
           that are related to security?
Screening Questions
Network Security
 Application and Information Access Control - Sensitive
 System Isolation
  –   Describe your network configuration. Has your IT vendor
      provided information regarding how your EHR system is
      protected?
       –   Are systems and networks that host, process and or
           transfer sensitive information ‘protected’ from other
           systems and or networks?
       –   Are internal and external networks separated by firewalls
           with access policies and rules?
Screening Questions
Network Security
 Application and Information Access Control -
 Sensitive System Isolation (continued)
     –   Is there a standard approach for protecting
         network devices to prevent unauthorized access/
         network related attacks and data-theft?
           –   Firewall between public and private networks
           –   Internal VLAN
           –   Firewall Separation
           –   Separate WLAN Network
           –   Secure Patient Portal
Screening Questions
Network Security
 Encryption
     –   Is sensitive information transferred to external
         recipients?
     –   If so, are controls in place to protect sensitive information
         when transferred?
           –   Secure VPN Connection with EHR and/or IT Vendors
               or Email Encryption
Screening Questions
Network Security
 Vulnerability Assessment
     –   How often do you perform periodic vulnerability scans on
         your information technology systems, networks and
         supporting security systems?
          –   Internal               –   Third party                –    Automated
              Assessments                Assessments
 Monitoring
     –   Are third party connections to your network monitored
         and reviewed to confirm authorized access and
         appropriate usage?
          –   VPN Logs           –   Server Event Logs          –   EHR logging
          –   Automated Alerts   –   Regular Review of Logs or Reports
Screening Questions
Logical Access
 Identity & Access Management
  –   Do you have a formal access authorization process based on
      'least privilege‘ and need to know ?
             –   Role-based permissions
             –   Limited access based on specific responsibilities
             –   Network access request form
       –   How are systems and applications configured to restrict
           access only to authorized individuals?
             –   Use of unique ID's and passwords.
                 –   Minimum Password Length   –   History
                 –   Complexity                –   Change/Lockout
Screening Questions
Logical Access
 Identity & Access Management (continued)
     –   Is there a list maintained of authorized users with access
         to operating systems?
           –   Active Directory user lists, within EHR application
           –   Excel spreadsheet of users, HR file.
     –   Does a list of 'accepted mobile devices‘ exist based on
         testing?
           –   Are accepted mobile devices tested prior to
               production use?
Screening Questions
Logical Access
 Identity & Access Management (continued)
     –   Is sensitive information removed from, or encrypted
         within, documents and or websites before it is
         distributed?
           –   Use of Patient Portal for distribution
           –   De-identifying of sensitive information prior to being
               distributed
Screening Questions
Logical Access
 Identity & Access Management (continued)
     –   Is software installation restricted for desktops, laptops
         and servers?
           –   Restricted User access to workstations, Group Policy
               enforcement, Administrative privileges on servers
               limited?
                 –   automatic logoff of workstations?
                 –   EHR system?
     –   Is access to source application code restricted? If so,
         how?
     –   Is a list of authorized users maintained?
Screening Questions
Logical Access
 Identity Management
  –   Are user IDs for your system uniquely identifiable?
       –   Any shared accounts at all?
             –   Hard coded into applications
             –   Someone is sick or unavailable
             –   Emergency access to sensitive information
Screening Questions
Logical Access
   Entitlement Reviews
     –   Do you have a process to review user accounts and
         related access?
           –   Manual process of reviewing Human Resource
               records to user accounts in Active Directory and EHR
Screening Questions
Operations Management
 Antivirus
  –   Has antivirus software been deployed and installed on your
      computers and supporting systems?
       –   Product Installed   –   Centrally Managed            –   Updated Daily

 Security Monitoring
  –   Are systems and networks monitored for security events? If
      so, please describe this monitoring.
       –   Server and networking equipment logs monitored
           regularly.
              –   Servers                   –   Routers

              –   Switches                  –   Wireless AP‘s
Screening Questions
Operations Management
 Media Handling
  –   Do procedures exist to protect documents, computer media,
      from unauthorized disclosure, modification, removal, and
      destruction?
  –   Is sensitive data encrypted when stored on laptop, desktop
      and server hard drives, flash drives, backup tapes, etc.?
       –   Data at Rest - Is data encrypted?
              –   Backups              –   Mobile devices

              –   EHR server           –   SD Cards
Screening Questions
Operations Management
 Secure Disposal
  –   Are there security procedures for the decommissioning of IT
      equipment and IT storage devices which contain or process
      sensitive information?
       –   use of Shred-IT               –   Wiping
       –   Retire-IT                     –   NIST 800-88

 Segregation of Computing Environment
  –   Are development, test and production environments
      separated from operational IT environments to protect
      production applications from inadvertent changes or
      disruption?
Screening Questions
Operations Management
 Segregation of Duties
  –   Are duties separated, where appropriate, to reduce the
      opportunity for unauthorized modification, unintentional
      modification or misuse of the organization's IT assets?
       –   Front desk duties separated from accounting?
       –   Nurse duties separated from Doctor's?
Screening Questions
Operations Management
 Change Management
  –   Do formal change management procedures exist for
      networks, systems, desktops, software releases,
      deployments, and software vulnerability patching activities?
       –   Changes to the EHR?
       –   Changes to the workstations and servers?
       –   Appropriate testing, notification, and approval?
Screening Questions
Incident Management
 Process & Procedures
  –   How do you identify, respond to and mitigate suspected or
      known security incidents?
             –   Incident Form filled out as a response to an incident
       –   During the investigation of a security incident, is evidence
           properly collected and maintained?
             –   Chain of custody and other computer forensic
                 methodologies followed by internal and/or external
                 parties?
Screening Questions
Incident Management
 Process & Procedures (continued)
     –   Are incidents identified, investigated, and reported
         according to applicable legal requirements?
     –   How are incidents escalated and communicated?
           –   Documented process for escalation to management
               and even outside authorities.
Screening Questions
Business Continuity Management
 Disaster Recovery Plan & Backups
  –   Do you have a mechanism to back up critical IT systems and
      sensitive data? i.e. nightly, weekly, quarterly backups? Taken
      offsite?
       –   Have you had to restore files after a systems outage?
  –   Does a Disaster Recovery plan exist for the organization and
      does it consider interruption to, or failure of, critical IT
      systems?
       –   Are disaster recovery plans updated at least annually?
       –   If not, has the backup and restoration process been
           tested?
Existing Control Effectiveness   Exposure Potential   Likelihood    Impact   Risk Rating
Not Effective                    High                 Very Likely   High     High



People & Processes
   Asset Management Category- Security Policy
     –   Threat-Vulnerability Statement
          – Management has not set a clear policy direction in line
             with business objectives or demonstrated support for,
             and commitment to information security.
     –   Recommended Control Measures
               – Information security policy, approved by
                  management in accordance with business
                  requirements and all relevant laws and regulations.
     –   Existing Control
               – No existing IS Security Policy in place
Existing Control Effectiveness   Exposure Potential   Likelihood   Impact   Risk Rating
Partially Effective              Medium               Likely       High     Medium



People & Processes
    Asset Management Category- Personnel Security
      –   Threat-Vulnerability Statement
             –   Background verification checks are carried out and
                 management is aware of academic, professional, credit, or
                 criminal backgrounds of most employees, contractors and third
                 party computer system users.
      –   Recommended Control Measures
             –   Background verification checks on all candidates for
                 employment, contractors and third party computer system
                 users are carried out in accordance with regulations and ethics,
                 the classification of the information to be accessed, and the
                 perceived risks.
      –   Existing Control-References are verified for all employees
Existing Control Effectiveness   Exposure Potential   Likelihood   Impact   Risk Rating
Not Effective                    High                 Not Likely   High     Low



Technology
    Asset Management Category- Training and Awareness
      –   Threat-Vulnerability Statement
           – Applications and technology solutions are not correctly
              and securely used since a training curriculum for
              employees has not been established.
      –   Recommended Control Measures
           – A training curriculum for employees be established to
              educate and train users for correct and secure use of
              applications and technology solutions.
      –   Existing Control
           – The use of technology regarding a training curriculum is
              not currently being utilized.
Findings & Remediation
 High and Medium Risks Findings and Remediation
  –   Information around risks and related control options are not
      presented to management before management decisions
      are made.
       –   Risk Rating-High
  –   Existing Control Measures Applied
       –   No prior Risk Assessments conducted
       –   REC helping to provide a foundation by utilizing this
           Security Risk Assessment tool as a starting point.
Findings & Remediation
 High and Medium Risks Findings and Remediation
 (continued)
  –   Recommended Control Measures.
       –   Risk Assessments are conducted to identify, quantify,
           prioritize and manage risks through acceptance and
           objectives.
       –   Ensure the Risk Assessment is accurate with all the
           information that has been filled out as well as the risk
           ratings, that have also been completed based on the
           information provided
Findings & Remediation
 High and Medium Risks Findings and Remediation
 (continued)
  –   Recommended Control Measures.
       –   After verifying accuracy of the information, the Medium
           and High Risk items from the Findings-Remediation tab
           should be addressed by making the necessary business
           decisions on whether to mitigate, transfer, or accept the
           risks. It is recommended to mitigate risks that are easy to
           address
       –   It is important to continue the Risk Assessment process
           by assessing the additional risks to your facility.
ONC’s - Privacy & Security 10 Step Plan
           for Meaningful Use




http:/ / www.healthit.gov/ sites/ def ault/ f iles/ pdf / privacy/ privacy-a nd-s ecurity-guide.pdf
ONC’s - Guide to Privacy and Security of
            Health Information - Tools




http:/ / www.healthit.gov/ sites/ def ault/ f iles/ pdf / privacy/ privacy-a nd-s ecurity-guide.pdf
What You Don't Know About Privacy and
Security Can Hurt You




         QUESTIONS?

Mais conteúdo relacionado

Mais procurados

Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Aladdin Dandis
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessmentdata brackets
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001Hiran Kanishka
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentdata brackets
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security BackgroundNicholas Davis
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detailecarrow
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organizationDan Morrill
 

Mais procurados (19)

Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
 
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014Fraudulent Methods for Attacking Bank Networks and Prevention 2014
Fraudulent Methods for Attacking Bank Networks and Prevention 2014
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
HIPAA HiTech Security Assessment
HIPAA HiTech Security AssessmentHIPAA HiTech Security Assessment
HIPAA HiTech Security Assessment
 
Information security management iso27001
Information security management iso27001Information security management iso27001
Information security management iso27001
 
Cisa 2013 ch5
Cisa 2013 ch5Cisa 2013 ch5
Cisa 2013 ch5
 
Cisa 2013 ch4
Cisa 2013 ch4Cisa 2013 ch4
Cisa 2013 ch4
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
Cisa 2013 ch2
Cisa 2013 ch2Cisa 2013 ch2
Cisa 2013 ch2
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
Understanding the security_organization
Understanding the security_organizationUnderstanding the security_organization
Understanding the security_organization
 
Cisa 2013 ch3
Cisa 2013 ch3Cisa 2013 ch3
Cisa 2013 ch3
 

Destaque

ABCs of Million Hearts in Missouri by Dr. Janet Wright
ABCs of Million Hearts in Missouri by Dr. Janet WrightABCs of Million Hearts in Missouri by Dr. Janet Wright
ABCs of Million Hearts in Missouri by Dr. Janet Wrightlearfield
 
1 proposal mohealthybirths
1 proposal mohealthybirths1 proposal mohealthybirths
1 proposal mohealthybirthslearfield
 
Ctf presentation 5 8-13
Ctf presentation 5 8-13Ctf presentation 5 8-13
Ctf presentation 5 8-13learfield
 
Allabout interaction
Allabout interactionAllabout interaction
Allabout interactionlearfield
 
Education training 2012
Education training 2012Education training 2012
Education training 2012learfield
 
InterAction Portfolio
InterAction Portfolio InterAction Portfolio
InterAction Portfolio learfield
 
HIT Network Readiness Assessment
HIT Network Readiness AssessmentHIT Network Readiness Assessment
HIT Network Readiness Assessmentlearfield
 
Missouri Sustainability Toolkit
Missouri Sustainability ToolkitMissouri Sustainability Toolkit
Missouri Sustainability Toolkitlearfield
 
Hen 368 lecture 12 hospital market
Hen 368 lecture 12 hospital marketHen 368 lecture 12 hospital market
Hen 368 lecture 12 hospital marketGale Pooley
 

Destaque (9)

ABCs of Million Hearts in Missouri by Dr. Janet Wright
ABCs of Million Hearts in Missouri by Dr. Janet WrightABCs of Million Hearts in Missouri by Dr. Janet Wright
ABCs of Million Hearts in Missouri by Dr. Janet Wright
 
1 proposal mohealthybirths
1 proposal mohealthybirths1 proposal mohealthybirths
1 proposal mohealthybirths
 
Ctf presentation 5 8-13
Ctf presentation 5 8-13Ctf presentation 5 8-13
Ctf presentation 5 8-13
 
Allabout interaction
Allabout interactionAllabout interaction
Allabout interaction
 
Education training 2012
Education training 2012Education training 2012
Education training 2012
 
InterAction Portfolio
InterAction Portfolio InterAction Portfolio
InterAction Portfolio
 
HIT Network Readiness Assessment
HIT Network Readiness AssessmentHIT Network Readiness Assessment
HIT Network Readiness Assessment
 
Missouri Sustainability Toolkit
Missouri Sustainability ToolkitMissouri Sustainability Toolkit
Missouri Sustainability Toolkit
 
Hen 368 lecture 12 hospital market
Hen 368 lecture 12 hospital marketHen 368 lecture 12 hospital market
Hen 368 lecture 12 hospital market
 

Semelhante a The Basics of Security and Risk Analysis

FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales DeckEvan Francen
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2marchharvey
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael Priyanka Aash
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Third-party information security assessment checklist.pdf
Third-party information security assessment checklist.pdfThird-party information security assessment checklist.pdf
Third-party information security assessment checklist.pdfpriyanshamadhwal2
 
Third-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdfThird-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdfinfosecTrain
 
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭Infosec train
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practicesamiable_indian
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdfCyber Security Experts
 

Semelhante a The Basics of Security and Risk Analysis (20)

FRSecure Sales Deck
FRSecure Sales DeckFRSecure Sales Deck
FRSecure Sales Deck
 
HIPAA omnibus rule update
HIPAA omnibus rule updateHIPAA omnibus rule update
HIPAA omnibus rule update
 
Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2Equilibrium Security Methodology 030414 Final v2
Equilibrium Security Methodology 030414 Final v2
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Third-party information security assessment checklist.pdf
Third-party information security assessment checklist.pdfThird-party information security assessment checklist.pdf
Third-party information security assessment checklist.pdf
 
Third-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdfThird-party information security assessment Check list.pdf
Third-party information security assessment Check list.pdf
 
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭
𝐭𝐡𝐢𝐫𝐝-𝐩𝐚𝐫𝐭𝐲 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐚𝐬𝐬𝐞𝐬𝐬𝐦𝐞𝐧𝐭
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
 
Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Testing
TestingTesting
Testing
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdfCyber Audit | Cyber Crime | Network Security |  Cyber Security Audit- 2023.pdf
Cyber Audit | Cyber Crime | Network Security | Cyber Security Audit- 2023.pdf
 

Mais de learfield

RN-BSN Rural Nurse Initiative for Missouri
RN-BSN Rural Nurse Initiative for Missouri RN-BSN Rural Nurse Initiative for Missouri
RN-BSN Rural Nurse Initiative for Missouri learfield
 
MBQIP 2011 Missouri
MBQIP 2011 Missouri MBQIP 2011 Missouri
MBQIP 2011 Missouri learfield
 
Welcome to Grant Writing Basics
Welcome to Grant Writing Basics Welcome to Grant Writing Basics
Welcome to Grant Writing Basics learfield
 
Those Who Lead for RHC
Those Who Lead for RHCThose Who Lead for RHC
Those Who Lead for RHClearfield
 
Biographical Sketches
Biographical SketchesBiographical Sketches
Biographical Sketcheslearfield
 
Electronic Medication Reconciliation
Electronic Medication Reconciliation Electronic Medication Reconciliation
Electronic Medication Reconciliation learfield
 
Implementing Electronic Medical Records
Implementing Electronic Medical RecordsImplementing Electronic Medical Records
Implementing Electronic Medical Recordslearfield
 
MO HIT Assistance Center Rural Hospital presentation
MO HIT Assistance Center Rural Hospital presentationMO HIT Assistance Center Rural Hospital presentation
MO HIT Assistance Center Rural Hospital presentationlearfield
 
SCIP HF Results
SCIP HF ResultsSCIP HF Results
SCIP HF Resultslearfield
 
CMH Medication Reconciliation Journey 2011
CMH  Medication Reconciliation Journey 2011CMH  Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011learfield
 
CMH Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011CMH Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011learfield
 
SHIP Overview
SHIP Overview SHIP Overview
SHIP Overview learfield
 
Psp 5 minute informational presentation snapshot updated feb 16, 2011
Psp 5 minute informational presentation snapshot updated feb 16, 2011Psp 5 minute informational presentation snapshot updated feb 16, 2011
Psp 5 minute informational presentation snapshot updated feb 16, 2011learfield
 
2010 retention presentation
2010 retention presentation2010 retention presentation
2010 retention presentationlearfield
 
STEMI Regulations Part 2
STEMI Regulations Part 2STEMI Regulations Part 2
STEMI Regulations Part 2learfield
 
Ship october webinar
Ship october webinarShip october webinar
Ship october webinarlearfield
 
Hitech ehr incentive programs
Hitech ehr incentive programsHitech ehr incentive programs
Hitech ehr incentive programslearfield
 
MO-HITECH Presentation
MO-HITECH PresentationMO-HITECH Presentation
MO-HITECH Presentationlearfield
 
The meaning of meaningful use 2010 05-14 missouri rural hospital hit conference
The meaning of meaningful use 2010 05-14 missouri rural hospital hit conferenceThe meaning of meaningful use 2010 05-14 missouri rural hospital hit conference
The meaning of meaningful use 2010 05-14 missouri rural hospital hit conferencelearfield
 

Mais de learfield (20)

RN-BSN Rural Nurse Initiative for Missouri
RN-BSN Rural Nurse Initiative for Missouri RN-BSN Rural Nurse Initiative for Missouri
RN-BSN Rural Nurse Initiative for Missouri
 
MBQIP 2011 Missouri
MBQIP 2011 Missouri MBQIP 2011 Missouri
MBQIP 2011 Missouri
 
Welcome to Grant Writing Basics
Welcome to Grant Writing Basics Welcome to Grant Writing Basics
Welcome to Grant Writing Basics
 
Those Who Lead for RHC
Those Who Lead for RHCThose Who Lead for RHC
Those Who Lead for RHC
 
Biographical Sketches
Biographical SketchesBiographical Sketches
Biographical Sketches
 
Electronic Medication Reconciliation
Electronic Medication Reconciliation Electronic Medication Reconciliation
Electronic Medication Reconciliation
 
Implementing Electronic Medical Records
Implementing Electronic Medical RecordsImplementing Electronic Medical Records
Implementing Electronic Medical Records
 
MO HIT Assistance Center Rural Hospital presentation
MO HIT Assistance Center Rural Hospital presentationMO HIT Assistance Center Rural Hospital presentation
MO HIT Assistance Center Rural Hospital presentation
 
SCIP HF Results
SCIP HF ResultsSCIP HF Results
SCIP HF Results
 
CMH Medication Reconciliation Journey 2011
CMH  Medication Reconciliation Journey 2011CMH  Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011
 
CMH Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011CMH Medication Reconciliation Journey 2011
CMH Medication Reconciliation Journey 2011
 
NHSC 101
NHSC 101 NHSC 101
NHSC 101
 
SHIP Overview
SHIP Overview SHIP Overview
SHIP Overview
 
Psp 5 minute informational presentation snapshot updated feb 16, 2011
Psp 5 minute informational presentation snapshot updated feb 16, 2011Psp 5 minute informational presentation snapshot updated feb 16, 2011
Psp 5 minute informational presentation snapshot updated feb 16, 2011
 
2010 retention presentation
2010 retention presentation2010 retention presentation
2010 retention presentation
 
STEMI Regulations Part 2
STEMI Regulations Part 2STEMI Regulations Part 2
STEMI Regulations Part 2
 
Ship october webinar
Ship october webinarShip october webinar
Ship october webinar
 
Hitech ehr incentive programs
Hitech ehr incentive programsHitech ehr incentive programs
Hitech ehr incentive programs
 
MO-HITECH Presentation
MO-HITECH PresentationMO-HITECH Presentation
MO-HITECH Presentation
 
The meaning of meaningful use 2010 05-14 missouri rural hospital hit conference
The meaning of meaningful use 2010 05-14 missouri rural hospital hit conferenceThe meaning of meaningful use 2010 05-14 missouri rural hospital hit conference
The meaning of meaningful use 2010 05-14 missouri rural hospital hit conference
 

Último

Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 

Último (20)

Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 

The Basics of Security and Risk Analysis

  • 1. What You Don't Know About Privacy and Security Can Hurt You Cora M. Butler, JD, RN, CHC Director, Business Development & Commercial Contract Administration Notice: Primaris is not acting in any capacity as the Federally designated Quality Improvement Organization (QIO) for Missouri during this presentation. Data used in this presentation was not obtained under the QIO contract Primaris holds with the Centers for Medicare & Medicaid Services (CMS). This presentation is not sanctioned or endorsed by CMS. The content of the webinars is based on material available in the public domain. The presentation is intended for educational purposes only. Primaris is not responsible for, and expressly disclaims all liability for, damages of any kind arising out of use, reference to, or reliance on any information contained herein. All presentation slides are the property of Primaris. No part of the presentation may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Primaris. MO-12-03-REC June 2012
  • 2. Presentation Goals At the conclusion of this portion of the presentation, participants will be able to: 1. Identify the general requirements of the Risk Management Process contemplated by the HIPAA Security Regulations. 2. Identify the three categories of safeguards required by the HIPAA Security Regulations. 3. Discuss Required versus Addressable Implementation Standards. 4. Identify the factors that may be taken into account by a Covered Entity when determining the most appropriate approach to meeting the requirements of the HIPAA Security Regulations. 5. Discuss the types of documentation to be maintained by Covered Entity to demonstrate compliance.
  • 3. Risk Management Process HIPAA Security Regulations (45 CFR Part 160, 162, 164(a) and 164(c)) apply to Covered Entities that transmit or maintain ePHI (Protected Health Information in an electronic form). Requires implementation of Security Management (Risk Management) “sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level” (164.308(a)(1)(ii)(B))
  • 4. Security Management Standards Administrative – Designated Security Officer – Periodic Risk Assessment and Risk Mitigation – Workforce Training and Education Physical – Protecting facility and other places where patient data is accessed – Building Alarm Systems, Locked Offices, Screen Savers Technical – Technical controls that help ensure the integrity, confidentiality and availability of PHI – Strong, secure passwords; backed up data; virus scans; data encryption Organizational Requirements – Breach notification policies and Business Associate Agreements
  • 5. Security Management Process The first standard under Administrative Safeguards section is the Security Management Process. This standard requires covered entities to: “Implement policies and procedures to prevent, detect, contain and correct security violations.” The purpose of this standard is to establish the administrative processes and procedures that a covered entity will use to implement the security program in its environment. There are four implementation specifications in the Security Management Process standard. 1. Risk Analysis (Required) 2. Risk Management (Required) 3. Sanction Policy (Required) 4. Information System Activity Review (Required)
  • 6. Risk Analysis A periodic technical and non-technical evaluation:  Based initially on the standards implemented under the security final rule;  Based subsequently in response to environmental or operational changes affecting the security of electronic protected health information; and  Establishes the extent to which an entity’s security policies and procedures meet the rule.  Documentation of compliance must be maintained. At a minimum: 1 2 3 4 5 HIPAA Standard- Organizational Procedures Current Determination Implementation Policy that that Address Environment of Compliance Feature Addresses
  • 7. Screening Questions Security Program Roles & Responsibilities – Has your organization formally appointed a central point of contact for security coordination? – If so, who, and what is their position within the organization? – Responsibilities clearly documented? – Job Descriptions – Information Security Policy
  • 8. Screening Questions Security Program External Parties – Do you work with third parties, such as IT service providers, that have access to your patient's information? – Does your organization have Business Associate agreements in place with these third parties? – REC – EHR Vendor – IT Vendor – Attorneys, Billing Company – What controls does your organization have in place to monitor and assess flow of information to third parties? Workflows to track data movement
  • 9. Screening Questions Security Policy Information Security Policy & Procedures – Do you have documented information security policies and procedures? – Do you have a formal information classification procedure? Please describe it. In particular, how would patient data be categorized? – Have formal acceptable use rules been established for assets (hardware and software)? – Do you have formal processes in place for security policy maintenance and deviation?
  • 10. Screening Questions Risk Management & Compliance Risk Assessment – Do you have a process that addresses: the identification and measurement of potential risks, mitigating controls, and the acceptance or transfer of the remaining risk after mitigation steps have been applied? Compliance with Legal Requirements - Identification of applicable legislation – Does a process exist to identify new laws and regulations with IT security implications? – Newsletters – Webinars – Associations
  • 11. Screening Questions Training & Awareness During Employment – Training, Education & Awareness – Have your employees been provided formal information security training? – Have policies been communicated to your employees? – Are periodic security reminders provided? – New Employee Orientation – Yearly Training – Posters in Public Areas – Email Reminders
  • 12. Screening Questions Personnel Security Background Checks – Does your organization perform background checks to examine and assess an employee’s or contractor’s work and criminal history? – Credential Verification – Criminal History – References
  • 13. Screening Questions Personnel Security Prior to Employment - Terms and Conditions of Employment? – Are your employees required to sign a non-disclosure agreement? If so, are employees required to sign the non- disclosure agreement annually? Termination or Change in Employment – Do you have a formal process to manage the termination and or transfer of employees? – All Equipment is Returned – User ID's Disabled in EHR and Windows – Badges and/or Keys Returned.
  • 14. Screening Questions Physical Security Secure Areas – Do you have effective physical access controls in place that prevent unauthorized access to facilities and a facility security plan? – Are there plans in place to handle/manage contingent events or circumstances ? – Is there a facility security plan? – How are physical access controls authorized? – Are there policies and procedures to document repairs and modifications to physical components of the facility that are related to security?
  • 15. Screening Questions Network Security Application and Information Access Control - Sensitive System Isolation – Describe your network configuration. Has your IT vendor provided information regarding how your EHR system is protected? – Are systems and networks that host, process and or transfer sensitive information ‘protected’ from other systems and or networks? – Are internal and external networks separated by firewalls with access policies and rules?
  • 16. Screening Questions Network Security Application and Information Access Control - Sensitive System Isolation (continued) – Is there a standard approach for protecting network devices to prevent unauthorized access/ network related attacks and data-theft? – Firewall between public and private networks – Internal VLAN – Firewall Separation – Separate WLAN Network – Secure Patient Portal
  • 17. Screening Questions Network Security Encryption – Is sensitive information transferred to external recipients? – If so, are controls in place to protect sensitive information when transferred? – Secure VPN Connection with EHR and/or IT Vendors or Email Encryption
  • 18. Screening Questions Network Security Vulnerability Assessment – How often do you perform periodic vulnerability scans on your information technology systems, networks and supporting security systems? – Internal – Third party – Automated Assessments Assessments Monitoring – Are third party connections to your network monitored and reviewed to confirm authorized access and appropriate usage? – VPN Logs – Server Event Logs – EHR logging – Automated Alerts – Regular Review of Logs or Reports
  • 19. Screening Questions Logical Access Identity & Access Management – Do you have a formal access authorization process based on 'least privilege‘ and need to know ? – Role-based permissions – Limited access based on specific responsibilities – Network access request form – How are systems and applications configured to restrict access only to authorized individuals? – Use of unique ID's and passwords. – Minimum Password Length – History – Complexity – Change/Lockout
  • 20. Screening Questions Logical Access Identity & Access Management (continued) – Is there a list maintained of authorized users with access to operating systems? – Active Directory user lists, within EHR application – Excel spreadsheet of users, HR file. – Does a list of 'accepted mobile devices‘ exist based on testing? – Are accepted mobile devices tested prior to production use?
  • 21. Screening Questions Logical Access Identity & Access Management (continued) – Is sensitive information removed from, or encrypted within, documents and or websites before it is distributed? – Use of Patient Portal for distribution – De-identifying of sensitive information prior to being distributed
  • 22. Screening Questions Logical Access Identity & Access Management (continued) – Is software installation restricted for desktops, laptops and servers? – Restricted User access to workstations, Group Policy enforcement, Administrative privileges on servers limited? – automatic logoff of workstations? – EHR system? – Is access to source application code restricted? If so, how? – Is a list of authorized users maintained?
  • 23. Screening Questions Logical Access Identity Management – Are user IDs for your system uniquely identifiable? – Any shared accounts at all? – Hard coded into applications – Someone is sick or unavailable – Emergency access to sensitive information
  • 24. Screening Questions Logical Access Entitlement Reviews – Do you have a process to review user accounts and related access? – Manual process of reviewing Human Resource records to user accounts in Active Directory and EHR
  • 25. Screening Questions Operations Management Antivirus – Has antivirus software been deployed and installed on your computers and supporting systems? – Product Installed – Centrally Managed – Updated Daily Security Monitoring – Are systems and networks monitored for security events? If so, please describe this monitoring. – Server and networking equipment logs monitored regularly. – Servers – Routers – Switches – Wireless AP‘s
  • 26. Screening Questions Operations Management Media Handling – Do procedures exist to protect documents, computer media, from unauthorized disclosure, modification, removal, and destruction? – Is sensitive data encrypted when stored on laptop, desktop and server hard drives, flash drives, backup tapes, etc.? – Data at Rest - Is data encrypted? – Backups – Mobile devices – EHR server – SD Cards
  • 27. Screening Questions Operations Management Secure Disposal – Are there security procedures for the decommissioning of IT equipment and IT storage devices which contain or process sensitive information? – use of Shred-IT – Wiping – Retire-IT – NIST 800-88 Segregation of Computing Environment – Are development, test and production environments separated from operational IT environments to protect production applications from inadvertent changes or disruption?
  • 28. Screening Questions Operations Management Segregation of Duties – Are duties separated, where appropriate, to reduce the opportunity for unauthorized modification, unintentional modification or misuse of the organization's IT assets? – Front desk duties separated from accounting? – Nurse duties separated from Doctor's?
  • 29. Screening Questions Operations Management Change Management – Do formal change management procedures exist for networks, systems, desktops, software releases, deployments, and software vulnerability patching activities? – Changes to the EHR? – Changes to the workstations and servers? – Appropriate testing, notification, and approval?
  • 30. Screening Questions Incident Management Process & Procedures – How do you identify, respond to and mitigate suspected or known security incidents? – Incident Form filled out as a response to an incident – During the investigation of a security incident, is evidence properly collected and maintained? – Chain of custody and other computer forensic methodologies followed by internal and/or external parties?
  • 31. Screening Questions Incident Management Process & Procedures (continued) – Are incidents identified, investigated, and reported according to applicable legal requirements? – How are incidents escalated and communicated? – Documented process for escalation to management and even outside authorities.
  • 32. Screening Questions Business Continuity Management Disaster Recovery Plan & Backups – Do you have a mechanism to back up critical IT systems and sensitive data? i.e. nightly, weekly, quarterly backups? Taken offsite? – Have you had to restore files after a systems outage? – Does a Disaster Recovery plan exist for the organization and does it consider interruption to, or failure of, critical IT systems? – Are disaster recovery plans updated at least annually? – If not, has the backup and restoration process been tested?
  • 33. Existing Control Effectiveness Exposure Potential Likelihood Impact Risk Rating Not Effective High Very Likely High High People & Processes Asset Management Category- Security Policy – Threat-Vulnerability Statement – Management has not set a clear policy direction in line with business objectives or demonstrated support for, and commitment to information security. – Recommended Control Measures – Information security policy, approved by management in accordance with business requirements and all relevant laws and regulations. – Existing Control – No existing IS Security Policy in place
  • 34. Existing Control Effectiveness Exposure Potential Likelihood Impact Risk Rating Partially Effective Medium Likely High Medium People & Processes Asset Management Category- Personnel Security – Threat-Vulnerability Statement – Background verification checks are carried out and management is aware of academic, professional, credit, or criminal backgrounds of most employees, contractors and third party computer system users. – Recommended Control Measures – Background verification checks on all candidates for employment, contractors and third party computer system users are carried out in accordance with regulations and ethics, the classification of the information to be accessed, and the perceived risks. – Existing Control-References are verified for all employees
  • 35. Existing Control Effectiveness Exposure Potential Likelihood Impact Risk Rating Not Effective High Not Likely High Low Technology Asset Management Category- Training and Awareness – Threat-Vulnerability Statement – Applications and technology solutions are not correctly and securely used since a training curriculum for employees has not been established. – Recommended Control Measures – A training curriculum for employees be established to educate and train users for correct and secure use of applications and technology solutions. – Existing Control – The use of technology regarding a training curriculum is not currently being utilized.
  • 36. Findings & Remediation High and Medium Risks Findings and Remediation – Information around risks and related control options are not presented to management before management decisions are made. – Risk Rating-High – Existing Control Measures Applied – No prior Risk Assessments conducted – REC helping to provide a foundation by utilizing this Security Risk Assessment tool as a starting point.
  • 37. Findings & Remediation High and Medium Risks Findings and Remediation (continued) – Recommended Control Measures. – Risk Assessments are conducted to identify, quantify, prioritize and manage risks through acceptance and objectives. – Ensure the Risk Assessment is accurate with all the information that has been filled out as well as the risk ratings, that have also been completed based on the information provided
  • 38. Findings & Remediation High and Medium Risks Findings and Remediation (continued) – Recommended Control Measures. – After verifying accuracy of the information, the Medium and High Risk items from the Findings-Remediation tab should be addressed by making the necessary business decisions on whether to mitigate, transfer, or accept the risks. It is recommended to mitigate risks that are easy to address – It is important to continue the Risk Assessment process by assessing the additional risks to your facility.
  • 39. ONC’s - Privacy & Security 10 Step Plan for Meaningful Use http:/ / www.healthit.gov/ sites/ def ault/ f iles/ pdf / privacy/ privacy-a nd-s ecurity-guide.pdf
  • 40. ONC’s - Guide to Privacy and Security of Health Information - Tools http:/ / www.healthit.gov/ sites/ def ault/ f iles/ pdf / privacy/ privacy-a nd-s ecurity-guide.pdf
  • 41. What You Don't Know About Privacy and Security Can Hurt You QUESTIONS?