SlideShare uma empresa Scribd logo
1 de 43
Security & Privacy Panel
Moderator: Jeff Livesay
MiHIN Associate Director
Security – by the numbers - redux
• Same as last year: I say a number and the
person who guesses what the number refers
to receives a door prize….
43 39 33 18
This year‟s numbers are:
The percentage of
ALL 2011 security breaches in
ALL industries globally that began
in healthcare
43
Source: Symantec 2012
The percentage of healthcare
security breaches that begin in
practices of size 1-10 providers
39
Source: HITRUST U.S. Healthcare Data Breach Trends Dec 2012
$1.50
per CC#
(PCI)
$3
per SS#
(PII)
$50
per medical record
(PHI)
Source: Digital Health Conference Panel, NYC 2012
33
The Black Market value ratio of
Personal Health Information (PHI)
to Personal Credit Information (PCI)
• The number of prioritized recommendations made
in the Cyber-Security White Paper to:
• Michigan‟s Health Information Technology
Commission in February 2013
• Governor Snyder‟s Cyber Initiative Task Force in
March 2013
18 MiHIN
White Paper
Half of these recommendations already
have efforts underway in Michigan
Why are Security and Privacy so
important in healthcare?
Ensuring the Security of Electronic Health Records:
http://www.youtube.com/watch?feature=player
_embedded&v=BxSFS9faxI4#
Introducing today‟s panelists
• Dan Lohrmann, Michigan Chief Security Officer, Deputy
Director, Michigan Dept. of Technology, Management &
Budget Cybersecurity & Infrastructure Protection
• Brian Seggie, Chief Security Officer, MiHIN
• Carrie Waggoner: Privacy Specialist, Office of Legal
Affairs, Michigan Dept. of Community Health
• Allan Foster, President, Kantara Initiative; Community
VP, ForgeRock
• Jeremy Rowley, Associate General Counsel, Digicert
Use of material by permission only.
Michigan Department of Technology, Management & Budget
Healthcare Information
Protecting Your Data
Dan Lohrmann, Michigan Chief Security Officer
June 6, 2013
Use of material by permission only.
Global Cyber Threats . . .
10
Use of material by permission only.
DHS Open Source Report
(www.dhs.gov/national-infrastructure-protection-plan)
11
Use of material by permission only.
For Example . . .
12
Use of material by permission only.
New Targets
Use of material by permission only.
Healthcare Information – Insider Threat
Louisiana . . . 7 Arrested for creating fake IDs using
patient information
Florida . . . ER Clerk accessed records
to sell for profit
Texas . . . State employee used
immunization information to apply
for credit cards
Source: Health Info Security January 2013
Use of material by permission only.
4 Critical Errors
#1 – Presuming that HIPAA
Compliance is Security
#2 – Basing Security on Systems
Rather than the Critical Data
#3 – Ineffective Awareness
Program
#4 – Failure to Control Access to
Information
Source: IT World, June 2009
Use of material by permission only.
Top 3 Threats to Healthcare Security
#1 – Malware: Computers need to be hardened with
appropriate security configurations. Anti-virus and anti-
spyware are not enough!
#2 – Automatic Log-off: Workers leave workstations without
logging off, often in public areas. Automated log-off procedure
a must!
#3 – Removable Media: USB devices enable removal of
sensitive information with the click of a mouse. Know what’s
on your network!
Source: Information Management Magazine Feb 2006
Trust Frameworks:
Our communities shape the future of Digital Identity
Allan Foster (ForgeRock), Board of Trustee President
MiNIH 2013
18
Kantara Initiative: Overview
Values
Kantara Initiative - Trust Frameworks: A Global Context
Organizations, Industry and
Governments join Kantara because
we value:
• Trust
Operating Accreditation, Approval
and Certification programs
• Privacy
Developing privacy respecting
solutions.
• Security
Developing high security solutions
and practices
• Community
Bridging technology and policy
requirements
Trustees:
Trustees At Large:
• Government of Canada
• Terena
19
Kantara Initiative: Overview
Federation, Compliance, and Interoperability
Kantara Initiative - Trust Frameworks: A Global Context
Members join Kantara because we
build trust and harmonization by
developing compliance criteria based
on requirements of end-users, relying
parties and identity providers.
Organizations become APPROVED
because we operate compliance
programs for multiple solutions that
fit a variety of requirements and
jurisdictions.
Kantara Builds Bridges
*Non-Profit 501c6
20
Kantara Initiative: Review
Landscape
Kantara Initiative - Trust Frameworks: A Global Context
Healthcare organizations join Kantara to leverage our community and Approval
services (NIST, ICAM , etc) to advance their organizational goals.
• Healthcare provider‟s identity is tied to each clinical and administrative system
they use.
• Single sign-on solutions exist for some large organizations. These solutions do
not necessarily scale beyond the walls of the organization.
• „Extended‟ environment, point-to-point integration and agreements must exist
between organizations in order to provide system access to individuals.
• Traditional fee-for-service healthcare delivery had little or no need for a nation
wide interoperable, federated identity ecosystem.
• Incentive models are changing with the advent of Accountable Care
Organizations and Community-based healthcare delivery.
21
Kantara Initiative: Overview
What does a Trust Framework look like?
Kantara Initiative - Trust Frameworks: A Global Context
Trust
Input
Requirements
in to Kantara
Kantara and
end-user
stakeholders
develop criteria
for assessment
Kantara
Accredited
Assessors
perform
assessments
Relying Parties
&
End-Users
Criteria for IdP /
CSP Assessment
to verify Trust
22
Trust Framework Model
Kantara Initiative - Trust Frameworks: A Global Context
Registration
Verification
Assessment
Certification
Process
Trust Status
Listing Service
Interested
Parties
Trust Status Listing Service,
Registry, White List
Kantara Trust Framework:
Component Services
23Kantara Initiative - Trust Frameworks: A Global Context
Credential
Service
Provider
Identity
Proofing /
Verification
Organizational
Trust
Credential
Issuance /
Management
Responding to industry
experts Kantara
members create path to
component service
recognition.
Component Services:
• Identity Proofing /
Verification
• Credential Issuance
and Management
Kantara Trust Framework:
Accredited Assessors and Approved CSPs
Kantara Accredited to LoA 1-4
24Kantara Initiative - Trust Frameworks: A Global Context
Kantara Approved to LoA 3 non-crpyto
Verizon Universal Identity Service (VUIS)*
* ICAM Trust Framework Approval
IDPV Component Recognition
Norton Credential Service Provider
*ICAM Trust Framework Approval (Conditional)
Shaping the Future of Digital Identity
Thanks!!
• @kantaranews
• kantarainitiative.org
• kantarainitiative.org/membership/
• kantarainitiative.org/listinfo/community
• bit.ly/Kantara_Assurance
• Support@kantarainitiative.org
25Kantara Initiative - Trust Frameworks: A Global Context
The Other Side of Security
Brian Seggie
MiHIN Chief Security Officer
With all of the investments in Security…
• Technical solutions have been deployed
Firewalls, Intrusion Prevention Systems, Data Loss Prevention
• Standards have been developed
FIPS 140, NIST 800, ISO 27001/2
• Compliance structures have been built
ISC, SANS, COBIT
• Regulations have been passed
HIPAA/HITECH, PCI-DSS, SOX, GLBA
why are we still insecure?
The Other Side of Security
• Attitude
• Confusion
• Important data not identified
• Complexity
• Understaffing
Attitude – Denial of the Threat
“There are only two types of companies: those
that have been hacked, and those that will be.”
- FBI Director Robert Mueller, 2012
“There are only two categories of companies …
those that know they’ve been compromised and
those that don’t know it yet.”
- US Attorney General, 2013
and more recently…
Confusion
IT staff and other users do not
know what is expected of them
Identify what is important
Where should you focus your limited resources?
Complexity
Too many dissimilar systems and security policies
of organizations use network security
devices from multiple vendors
reported a security breach, system
outage, or both, due to complex policies
Source: Algosec 2012 survey
95%
50%
Understaffed IT Departments
• Shortcuts taken to just “keep the lights on”
• Hit-and-miss management of infrastructure
“More than two-thirds of the world's CSOs
report that their current information security
operations are understaffed, and that it's
compromising their company's security.”
Source: Frost & Sullivan for ISC(2) 2012
Thank you
Everyone here has or
will be compromised,
how will you respond
when it does?
Direct, Privacy, and Interstate
Communication
Presented by Jeremy Rowley
DigiCert, Inc.
 Report to Congress on Foreign Economic Collection and Industrial
Espionage from the Office of the National Counterintelligence Executive
Office: “The massive R&D costs for new [Healthcare] products in these
sectors, up to $1 billion for a single drug, the possibility of earning
monopoly profits from a popular new pharmaceutical, and the growing
need for medical care by aging populations in China, Russia, and elsewhere
are likely to drive interest in collecting valuable US healthcare,
pharmaceutical, and related information.”
 The HIMSS Privacy and Security Committee goal: "By 2014, all entities who
use, send, or store health information meet requirements for
confidentiality, integrity, availability and accountability based on sound risk
management practices, using recognized standards and protocols."
 NHIN Project Statement: “A project to create the set of standards and
services that, with a policy framework, enable simple, directed, routed,
scalable transport over the Internet to be used for secure and meaningful
exchange between known participants in support of meaningful use”
36
DirectTrust Project
37
DirectTrust Communication
 Single solution that secures communication to patients, public health,
and other providers
 Built on existing PKI and uses existing systems
• Identity, Digital Signatures, Encryption
• Widely used and nationwide adoption by the HISPs
 Athena, Cerner, McKesson, covisint, eClincalWorks, MiHIN
 ONC endorsed and compliant with guidance released in May 2013
 Meets Direct requirements
• Simple – Push-based transport system
• Secure – Encrypted and verifiable messages
• Scalable – No need for a central network authority
• Standards-based – uses s/MIME established protocols
 Uses HISPs to handle infrastructure and provide communication
• Arranges identity verification
• Manages digital certificates
• Maintains integrity of trust and security framework
• Responsible for complying with regulations
38
DirectTrust Interstate Participants
CA
•Cross-certification with FBCA
•Accredited trust anchor
•Certificate Issuance
RA
•Identity Verification to NIST LOA3/Medium
•Accredited practices
HISP
•Gatekeeper for participation
•Certificate management and facilitation of communication between the parties
•Verified individual and organizational ientity
HCO
•Transacts health care information
•Verified representative responsible for certificates and communication
Patients
•Provides health care information
•Communication with the HCO
• Organization verified using government documents
• In-person or remote proofing using a government ID
• Address verification
• FBCA medium assurance verification
NIST LOA3
• Organization verified using government documents
• In-person proofing using government IDs
• Declaration of Identity
• 30 days of issuance
Medium
39
Verification Requirements
40
Interstate Direct Exchange
41
Tools
 Single portals are already available and easy to implement
 Founding member, co-chair of Certificate Policies & Practices
Working Group, DirectTrust
 First CA to issue Direct-compliant FBCA certificates
 Direct Med CA included in Transitional Trust Anchor Bundle
 Already supporting HISPs, HIEs and HCOs
 Feel free to contact me at jeremy.rowley@digicert.com
42
DigiCert
Questions?
Contact Us:
Jeff Livesay
Associate Director
livesay@mihin.org
Brian Seggie
Security Director and Chief Security Officer
seggie@mihin.org
For more information:
security@mihin.org

Mais conteúdo relacionado

Mais procurados

Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerDuane Blackburn
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALIJNSA Journal
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)KP Naidu
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...Health IT Conference – iHT2
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...Health IT Conference – iHT2
 
Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)Amy Stowers
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 

Mais procurados (20)

Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
Identity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained EnablerIdentity Intelligence: From Reactionary Support to Sustained Enabler
Identity Intelligence: From Reactionary Support to Sustained Enabler
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
 
Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)Managing Personally Identifiable Information (PII)
Managing Personally Identifiable Information (PII)
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
 
Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 

Destaque (14)

Touch screen with feelings-T-PaD
Touch screen with feelings-T-PaDTouch screen with feelings-T-PaD
Touch screen with feelings-T-PaD
 
Seminar report of optical ethernet
Seminar report of optical ethernetSeminar report of optical ethernet
Seminar report of optical ethernet
 
Next Generation Computer
Next Generation ComputerNext Generation Computer
Next Generation Computer
 
Speed sensor
Speed sensorSpeed sensor
Speed sensor
 
Wirless charging of mobile phones
Wirless charging of mobile phonesWirless charging of mobile phones
Wirless charging of mobile phones
 
Energy Saving fan .ppt
Energy Saving   fan .ppt Energy Saving   fan .ppt
Energy Saving fan .ppt
 
AIR POWERED ENGINE PPT
AIR POWERED ENGINE PPTAIR POWERED ENGINE PPT
AIR POWERED ENGINE PPT
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
brain computer-interfaces PPT
 brain computer-interfaces PPT brain computer-interfaces PPT
brain computer-interfaces PPT
 
Pill camera presentation
Pill camera presentationPill camera presentation
Pill camera presentation
 
artificial eye
artificial eyeartificial eye
artificial eye
 
Bubble Power
Bubble PowerBubble Power
Bubble Power
 
Pill camera
Pill cameraPill camera
Pill camera
 
E textile by ashish dua
E textile by ashish duaE textile by ashish dua
E textile by ashish dua
 

Semelhante a Panel Cyber Security and Privacy without Carrie Waggoner

Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdframsetl
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planCameron Forbes Over
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and SecurityPYA, P.C.
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...Health IT Conference – iHT2
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Privacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesPrivacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesZakCooper1
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...Levi Shapiro
 
Critical Care: The Importance of Stronger Authentication in Health Care
Critical Care: The Importance of Stronger Authentication in Health CareCritical Care: The Importance of Stronger Authentication in Health Care
Critical Care: The Importance of Stronger Authentication in Health CareFIDO Alliance
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 

Semelhante a Panel Cyber Security and Privacy without Carrie Waggoner (20)

Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Final presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit planFinal presentation january iia cybersecurity securing your 2016 audit plan
Final presentation january iia cybersecurity securing your 2016 audit plan
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Privacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesPrivacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slides
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Critical Care: The Importance of Stronger Authentication in Health Care
Critical Care: The Importance of Stronger Authentication in Health CareCritical Care: The Importance of Stronger Authentication in Health Care
Critical Care: The Importance of Stronger Authentication in Health Care
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

Mais de mihinpr

MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15mihinpr
 
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15mihinpr
 
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15mihinpr
 
MiHIN ADT ONC Presentation v10 02-02-15
MiHIN ADT ONC Presentation v10 02-02-15MiHIN ADT ONC Presentation v10 02-02-15
MiHIN ADT ONC Presentation v10 02-02-15mihinpr
 
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14mihinpr
 
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14mihinpr
 
Connecting Patients, Providers and Payers John Halamka Keynote
Connecting Patients, Providers and Payers John Halamka KeynoteConnecting Patients, Providers and Payers John Halamka Keynote
Connecting Patients, Providers and Payers John Halamka Keynotemihinpr
 
A Vision for Creating a Connected State Subra Sripada
A Vision for Creating a Connected State Subra SripadaA Vision for Creating a Connected State Subra Sripada
A Vision for Creating a Connected State Subra Sripadamihinpr
 
Panel: Understanding Michigan's HIE Landscape
Panel: Understanding Michigan's HIE LandscapePanel: Understanding Michigan's HIE Landscape
Panel: Understanding Michigan's HIE Landscapemihinpr
 
Panel Interstate and Other State HIE HIT
Panel Interstate and Other State HIE HITPanel Interstate and Other State HIE HIT
Panel Interstate and Other State HIE HITmihinpr
 
Panel: Transitions of Care and ADT (without Rachel Sherman)
Panel: Transitions of Care and ADT (without Rachel Sherman)Panel: Transitions of Care and ADT (without Rachel Sherman)
Panel: Transitions of Care and ADT (without Rachel Sherman)mihinpr
 
State of Michigan HIE Update (without Tina Scott)
State of Michigan HIE Update (without Tina Scott)State of Michigan HIE Update (without Tina Scott)
State of Michigan HIE Update (without Tina Scott)mihinpr
 
Health IT and Public Policy Issues Dr. Rich Hodge
Health IT and Public Policy Issues Dr. Rich HodgeHealth IT and Public Policy Issues Dr. Rich Hodge
Health IT and Public Policy Issues Dr. Rich Hodgemihinpr
 
A Consistent Nationwide Data Matching Strategy Donna Roach & Nancy Walker
A Consistent Nationwide Data Matching Strategy Donna Roach & Nancy WalkerA Consistent Nationwide Data Matching Strategy Donna Roach & Nancy Walker
A Consistent Nationwide Data Matching Strategy Donna Roach & Nancy Walkermihinpr
 
Jennifer Horowitz EHR Adoption in Michigan & Nationwide
Jennifer Horowitz EHR Adoption in Michigan & NationwideJennifer Horowitz EHR Adoption in Michigan & Nationwide
Jennifer Horowitz EHR Adoption in Michigan & Nationwidemihinpr
 
Panel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet KingPanel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet Kingmihinpr
 
Dr. Charles Friedman Transcending HIE
Dr. Charles Friedman Transcending HIEDr. Charles Friedman Transcending HIE
Dr. Charles Friedman Transcending HIEmihinpr
 
Doug Dietzman National HIE Landscape
Doug Dietzman National HIE LandscapeDoug Dietzman National HIE Landscape
Doug Dietzman National HIE Landscapemihinpr
 
Brian Balow HIPAA Final Rule
Brian Balow HIPAA Final RuleBrian Balow HIPAA Final Rule
Brian Balow HIPAA Final Rulemihinpr
 
Carrie Waggoner Cyber Security Panel
Carrie Waggoner Cyber Security PanelCarrie Waggoner Cyber Security Panel
Carrie Waggoner Cyber Security Panelmihinpr
 

Mais de mihinpr (20)

MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15MiHIN 101 Overview v4 04-08-15
MiHIN 101 Overview v4 04-08-15
 
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
MiHIN Statewide Consumer Directory Overview - Direct Workgroup v4 03-09-15
 
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
MiHIN Health Provider Directory Demo Slides with CQMRR v43 02 18-15
 
MiHIN ADT ONC Presentation v10 02-02-15
MiHIN ADT ONC Presentation v10 02-02-15MiHIN ADT ONC Presentation v10 02-02-15
MiHIN ADT ONC Presentation v10 02-02-15
 
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
MiHIN Direct Webinar for EHR Intelligence v10 11 12-14
 
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
MiHIN Overview - Health Information Exchange Meet and Greet v7 10 22-14
 
Connecting Patients, Providers and Payers John Halamka Keynote
Connecting Patients, Providers and Payers John Halamka KeynoteConnecting Patients, Providers and Payers John Halamka Keynote
Connecting Patients, Providers and Payers John Halamka Keynote
 
A Vision for Creating a Connected State Subra Sripada
A Vision for Creating a Connected State Subra SripadaA Vision for Creating a Connected State Subra Sripada
A Vision for Creating a Connected State Subra Sripada
 
Panel: Understanding Michigan's HIE Landscape
Panel: Understanding Michigan's HIE LandscapePanel: Understanding Michigan's HIE Landscape
Panel: Understanding Michigan's HIE Landscape
 
Panel Interstate and Other State HIE HIT
Panel Interstate and Other State HIE HITPanel Interstate and Other State HIE HIT
Panel Interstate and Other State HIE HIT
 
Panel: Transitions of Care and ADT (without Rachel Sherman)
Panel: Transitions of Care and ADT (without Rachel Sherman)Panel: Transitions of Care and ADT (without Rachel Sherman)
Panel: Transitions of Care and ADT (without Rachel Sherman)
 
State of Michigan HIE Update (without Tina Scott)
State of Michigan HIE Update (without Tina Scott)State of Michigan HIE Update (without Tina Scott)
State of Michigan HIE Update (without Tina Scott)
 
Health IT and Public Policy Issues Dr. Rich Hodge
Health IT and Public Policy Issues Dr. Rich HodgeHealth IT and Public Policy Issues Dr. Rich Hodge
Health IT and Public Policy Issues Dr. Rich Hodge
 
A Consistent Nationwide Data Matching Strategy Donna Roach & Nancy Walker
A Consistent Nationwide Data Matching Strategy Donna Roach & Nancy WalkerA Consistent Nationwide Data Matching Strategy Donna Roach & Nancy Walker
A Consistent Nationwide Data Matching Strategy Donna Roach & Nancy Walker
 
Jennifer Horowitz EHR Adoption in Michigan & Nationwide
Jennifer Horowitz EHR Adoption in Michigan & NationwideJennifer Horowitz EHR Adoption in Michigan & Nationwide
Jennifer Horowitz EHR Adoption in Michigan & Nationwide
 
Panel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet KingPanel: Achieving Interoperability Dr. John Loonsk & Janet King
Panel: Achieving Interoperability Dr. John Loonsk & Janet King
 
Dr. Charles Friedman Transcending HIE
Dr. Charles Friedman Transcending HIEDr. Charles Friedman Transcending HIE
Dr. Charles Friedman Transcending HIE
 
Doug Dietzman National HIE Landscape
Doug Dietzman National HIE LandscapeDoug Dietzman National HIE Landscape
Doug Dietzman National HIE Landscape
 
Brian Balow HIPAA Final Rule
Brian Balow HIPAA Final RuleBrian Balow HIPAA Final Rule
Brian Balow HIPAA Final Rule
 
Carrie Waggoner Cyber Security Panel
Carrie Waggoner Cyber Security PanelCarrie Waggoner Cyber Security Panel
Carrie Waggoner Cyber Security Panel
 

Último

College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceNehru place Escorts
 
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girl Lucknow Mallika 7001305949 Independent Escort Service Lucknow
Call Girl Lucknow Mallika 7001305949 Independent Escort Service LucknowCall Girl Lucknow Mallika 7001305949 Independent Escort Service Lucknow
Call Girl Lucknow Mallika 7001305949 Independent Escort Service Lucknownarwatsonia7
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service LucknowVIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknownarwatsonia7
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfMedicoseAcademics
 
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy Girlsnehamumbai
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaPooja Gupta
 
Pharmaceutical Marketting: Unit-5, Pricing
Pharmaceutical Marketting: Unit-5, PricingPharmaceutical Marketting: Unit-5, Pricing
Pharmaceutical Marketting: Unit-5, PricingArunagarwal328757
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipurparulsinha
 
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment BookingCall Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Bookingnarwatsonia7
 
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original PhotosBook Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photosnarwatsonia7
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformKweku Zurek
 
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...rajnisinghkjn
 
Hematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsHematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsMedicoseAcademics
 
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service MumbaiLow Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Call Girls Thane Just Call 9910780858 Get High Class Call Girls Service
Call Girls Thane Just Call 9910780858 Get High Class Call Girls ServiceCall Girls Thane Just Call 9910780858 Get High Class Call Girls Service
Call Girls Thane Just Call 9910780858 Get High Class Call Girls Servicesonalikaur4
 
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original PhotosCall Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photosnarwatsonia7
 

Último (20)

College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
 
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girl Lucknow Mallika 7001305949 Independent Escort Service Lucknow
Call Girl Lucknow Mallika 7001305949 Independent Escort Service LucknowCall Girl Lucknow Mallika 7001305949 Independent Escort Service Lucknow
Call Girl Lucknow Mallika 7001305949 Independent Escort Service Lucknow
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
 
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service LucknowVIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
 
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hebbal Just Call 7001305949 Top Class Call Girl Service Available
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
 
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy GirlsCall Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
Call Girls In Andheri East Call 9920874524 Book Hot And Sexy Girls
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
 
Pharmaceutical Marketting: Unit-5, Pricing
Pharmaceutical Marketting: Unit-5, PricingPharmaceutical Marketting: Unit-5, Pricing
Pharmaceutical Marketting: Unit-5, Pricing
 
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
 
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment BookingCall Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
Call Girl Koramangala | 7001305949 At Low Cost Cash Payment Booking
 
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original PhotosBook Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
Book Call Girls in Yelahanka - For 7001305949 Cheap & Best with original Photos
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy Platform
 
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
Noida Sector 135 Call Girls ( 9873940964 ) Book Hot And Sexy Girls In A Few C...
 
Hematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes FunctionsHematology and Immunology - Leukocytes Functions
Hematology and Immunology - Leukocytes Functions
 
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service MumbaiLow Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
 
Call Girls Thane Just Call 9910780858 Get High Class Call Girls Service
Call Girls Thane Just Call 9910780858 Get High Class Call Girls ServiceCall Girls Thane Just Call 9910780858 Get High Class Call Girls Service
Call Girls Thane Just Call 9910780858 Get High Class Call Girls Service
 
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original PhotosCall Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
Call Girl Service Bidadi - For 7001305949 Cheap & Best with original Photos
 

Panel Cyber Security and Privacy without Carrie Waggoner

  • 1. Security & Privacy Panel Moderator: Jeff Livesay MiHIN Associate Director
  • 2. Security – by the numbers - redux • Same as last year: I say a number and the person who guesses what the number refers to receives a door prize…. 43 39 33 18 This year‟s numbers are:
  • 3. The percentage of ALL 2011 security breaches in ALL industries globally that began in healthcare 43 Source: Symantec 2012
  • 4. The percentage of healthcare security breaches that begin in practices of size 1-10 providers 39 Source: HITRUST U.S. Healthcare Data Breach Trends Dec 2012
  • 5. $1.50 per CC# (PCI) $3 per SS# (PII) $50 per medical record (PHI) Source: Digital Health Conference Panel, NYC 2012 33 The Black Market value ratio of Personal Health Information (PHI) to Personal Credit Information (PCI)
  • 6. • The number of prioritized recommendations made in the Cyber-Security White Paper to: • Michigan‟s Health Information Technology Commission in February 2013 • Governor Snyder‟s Cyber Initiative Task Force in March 2013 18 MiHIN White Paper Half of these recommendations already have efforts underway in Michigan
  • 7. Why are Security and Privacy so important in healthcare? Ensuring the Security of Electronic Health Records: http://www.youtube.com/watch?feature=player _embedded&v=BxSFS9faxI4#
  • 8. Introducing today‟s panelists • Dan Lohrmann, Michigan Chief Security Officer, Deputy Director, Michigan Dept. of Technology, Management & Budget Cybersecurity & Infrastructure Protection • Brian Seggie, Chief Security Officer, MiHIN • Carrie Waggoner: Privacy Specialist, Office of Legal Affairs, Michigan Dept. of Community Health • Allan Foster, President, Kantara Initiative; Community VP, ForgeRock • Jeremy Rowley, Associate General Counsel, Digicert
  • 9. Use of material by permission only. Michigan Department of Technology, Management & Budget Healthcare Information Protecting Your Data Dan Lohrmann, Michigan Chief Security Officer June 6, 2013
  • 10. Use of material by permission only. Global Cyber Threats . . . 10
  • 11. Use of material by permission only. DHS Open Source Report (www.dhs.gov/national-infrastructure-protection-plan) 11
  • 12. Use of material by permission only. For Example . . . 12
  • 13. Use of material by permission only. New Targets
  • 14. Use of material by permission only. Healthcare Information – Insider Threat Louisiana . . . 7 Arrested for creating fake IDs using patient information Florida . . . ER Clerk accessed records to sell for profit Texas . . . State employee used immunization information to apply for credit cards Source: Health Info Security January 2013
  • 15. Use of material by permission only. 4 Critical Errors #1 – Presuming that HIPAA Compliance is Security #2 – Basing Security on Systems Rather than the Critical Data #3 – Ineffective Awareness Program #4 – Failure to Control Access to Information Source: IT World, June 2009
  • 16. Use of material by permission only. Top 3 Threats to Healthcare Security #1 – Malware: Computers need to be hardened with appropriate security configurations. Anti-virus and anti- spyware are not enough! #2 – Automatic Log-off: Workers leave workstations without logging off, often in public areas. Automated log-off procedure a must! #3 – Removable Media: USB devices enable removal of sensitive information with the click of a mouse. Know what’s on your network! Source: Information Management Magazine Feb 2006
  • 17. Trust Frameworks: Our communities shape the future of Digital Identity Allan Foster (ForgeRock), Board of Trustee President MiNIH 2013
  • 18. 18 Kantara Initiative: Overview Values Kantara Initiative - Trust Frameworks: A Global Context Organizations, Industry and Governments join Kantara because we value: • Trust Operating Accreditation, Approval and Certification programs • Privacy Developing privacy respecting solutions. • Security Developing high security solutions and practices • Community Bridging technology and policy requirements Trustees: Trustees At Large: • Government of Canada • Terena
  • 19. 19 Kantara Initiative: Overview Federation, Compliance, and Interoperability Kantara Initiative - Trust Frameworks: A Global Context Members join Kantara because we build trust and harmonization by developing compliance criteria based on requirements of end-users, relying parties and identity providers. Organizations become APPROVED because we operate compliance programs for multiple solutions that fit a variety of requirements and jurisdictions. Kantara Builds Bridges *Non-Profit 501c6
  • 20. 20 Kantara Initiative: Review Landscape Kantara Initiative - Trust Frameworks: A Global Context Healthcare organizations join Kantara to leverage our community and Approval services (NIST, ICAM , etc) to advance their organizational goals. • Healthcare provider‟s identity is tied to each clinical and administrative system they use. • Single sign-on solutions exist for some large organizations. These solutions do not necessarily scale beyond the walls of the organization. • „Extended‟ environment, point-to-point integration and agreements must exist between organizations in order to provide system access to individuals. • Traditional fee-for-service healthcare delivery had little or no need for a nation wide interoperable, federated identity ecosystem. • Incentive models are changing with the advent of Accountable Care Organizations and Community-based healthcare delivery.
  • 21. 21 Kantara Initiative: Overview What does a Trust Framework look like? Kantara Initiative - Trust Frameworks: A Global Context Trust Input Requirements in to Kantara Kantara and end-user stakeholders develop criteria for assessment Kantara Accredited Assessors perform assessments Relying Parties & End-Users Criteria for IdP / CSP Assessment to verify Trust
  • 22. 22 Trust Framework Model Kantara Initiative - Trust Frameworks: A Global Context Registration Verification Assessment Certification Process Trust Status Listing Service Interested Parties Trust Status Listing Service, Registry, White List
  • 23. Kantara Trust Framework: Component Services 23Kantara Initiative - Trust Frameworks: A Global Context Credential Service Provider Identity Proofing / Verification Organizational Trust Credential Issuance / Management Responding to industry experts Kantara members create path to component service recognition. Component Services: • Identity Proofing / Verification • Credential Issuance and Management
  • 24. Kantara Trust Framework: Accredited Assessors and Approved CSPs Kantara Accredited to LoA 1-4 24Kantara Initiative - Trust Frameworks: A Global Context Kantara Approved to LoA 3 non-crpyto Verizon Universal Identity Service (VUIS)* * ICAM Trust Framework Approval IDPV Component Recognition Norton Credential Service Provider *ICAM Trust Framework Approval (Conditional)
  • 25. Shaping the Future of Digital Identity Thanks!! • @kantaranews • kantarainitiative.org • kantarainitiative.org/membership/ • kantarainitiative.org/listinfo/community • bit.ly/Kantara_Assurance • Support@kantarainitiative.org 25Kantara Initiative - Trust Frameworks: A Global Context
  • 26. The Other Side of Security Brian Seggie MiHIN Chief Security Officer
  • 27. With all of the investments in Security… • Technical solutions have been deployed Firewalls, Intrusion Prevention Systems, Data Loss Prevention • Standards have been developed FIPS 140, NIST 800, ISO 27001/2 • Compliance structures have been built ISC, SANS, COBIT • Regulations have been passed HIPAA/HITECH, PCI-DSS, SOX, GLBA why are we still insecure?
  • 28. The Other Side of Security • Attitude • Confusion • Important data not identified • Complexity • Understaffing
  • 29. Attitude – Denial of the Threat “There are only two types of companies: those that have been hacked, and those that will be.” - FBI Director Robert Mueller, 2012 “There are only two categories of companies … those that know they’ve been compromised and those that don’t know it yet.” - US Attorney General, 2013 and more recently…
  • 30. Confusion IT staff and other users do not know what is expected of them
  • 31. Identify what is important Where should you focus your limited resources?
  • 32. Complexity Too many dissimilar systems and security policies of organizations use network security devices from multiple vendors reported a security breach, system outage, or both, due to complex policies Source: Algosec 2012 survey 95% 50%
  • 33. Understaffed IT Departments • Shortcuts taken to just “keep the lights on” • Hit-and-miss management of infrastructure “More than two-thirds of the world's CSOs report that their current information security operations are understaffed, and that it's compromising their company's security.” Source: Frost & Sullivan for ISC(2) 2012
  • 34. Thank you Everyone here has or will be compromised, how will you respond when it does?
  • 35. Direct, Privacy, and Interstate Communication Presented by Jeremy Rowley DigiCert, Inc.
  • 36.  Report to Congress on Foreign Economic Collection and Industrial Espionage from the Office of the National Counterintelligence Executive Office: “The massive R&D costs for new [Healthcare] products in these sectors, up to $1 billion for a single drug, the possibility of earning monopoly profits from a popular new pharmaceutical, and the growing need for medical care by aging populations in China, Russia, and elsewhere are likely to drive interest in collecting valuable US healthcare, pharmaceutical, and related information.”  The HIMSS Privacy and Security Committee goal: "By 2014, all entities who use, send, or store health information meet requirements for confidentiality, integrity, availability and accountability based on sound risk management practices, using recognized standards and protocols."  NHIN Project Statement: “A project to create the set of standards and services that, with a policy framework, enable simple, directed, routed, scalable transport over the Internet to be used for secure and meaningful exchange between known participants in support of meaningful use” 36 DirectTrust Project
  • 37. 37 DirectTrust Communication  Single solution that secures communication to patients, public health, and other providers  Built on existing PKI and uses existing systems • Identity, Digital Signatures, Encryption • Widely used and nationwide adoption by the HISPs  Athena, Cerner, McKesson, covisint, eClincalWorks, MiHIN  ONC endorsed and compliant with guidance released in May 2013  Meets Direct requirements • Simple – Push-based transport system • Secure – Encrypted and verifiable messages • Scalable – No need for a central network authority • Standards-based – uses s/MIME established protocols  Uses HISPs to handle infrastructure and provide communication • Arranges identity verification • Manages digital certificates • Maintains integrity of trust and security framework • Responsible for complying with regulations
  • 38. 38 DirectTrust Interstate Participants CA •Cross-certification with FBCA •Accredited trust anchor •Certificate Issuance RA •Identity Verification to NIST LOA3/Medium •Accredited practices HISP •Gatekeeper for participation •Certificate management and facilitation of communication between the parties •Verified individual and organizational ientity HCO •Transacts health care information •Verified representative responsible for certificates and communication Patients •Provides health care information •Communication with the HCO
  • 39. • Organization verified using government documents • In-person or remote proofing using a government ID • Address verification • FBCA medium assurance verification NIST LOA3 • Organization verified using government documents • In-person proofing using government IDs • Declaration of Identity • 30 days of issuance Medium 39 Verification Requirements
  • 41. 41 Tools  Single portals are already available and easy to implement
  • 42.  Founding member, co-chair of Certificate Policies & Practices Working Group, DirectTrust  First CA to issue Direct-compliant FBCA certificates  Direct Med CA included in Transitional Trust Anchor Bundle  Already supporting HISPs, HIEs and HCOs  Feel free to contact me at jeremy.rowley@digicert.com 42 DigiCert
  • 43. Questions? Contact Us: Jeff Livesay Associate Director livesay@mihin.org Brian Seggie Security Director and Chief Security Officer seggie@mihin.org For more information: security@mihin.org

Notas do Editor

  1. Current LandscapeFaxes – slow inconvenient and expensiveElectronic communication – not secureMeaningful Use stages demand something betterDirectTrust.org – endorsed by the ONC on May 24, 2013http://www.healthit.gov/buzz-blog/electronic-health-and-medical-records/directtrust-builds-transparency-confidence-direct-exchange/
  2. Simple – Messages are containers of health information, connects through universal addressing using simple push of informationSecure – Encryption and express trust relationship, users can verify the message is complete and free from tamperingScalable - Security agents are responsible for providing servicesStandards – SMTP-based secure emails that comply with RFC5322