SlideShare a Scribd company logo
1 of 32
Download to read offline
© 2021 Health Catalyst
Cloud Cybersecurity:
Strategies for Managing Vendor Risk
Kevin Scharnhorst, CISSP, CISM
Chief Information Security Officer, Health Catalyst
February 10, 2021
Agenda
Cloud Shared Responsibility Model
In a cloud vendor/ partner relationship, who has responsibility
for what? Who is ultimately accountable for a security
compromise or breach?
Vendor Risk Evaluation
With so many cloud vendors to choose from, what factors go
into a final decision? What risks do you consider? What risk
management strategies should be considered?
Security Policy and Procedures
Where do you start with building a Security Program? What
standards does your organization align to? What regulatory
frameworks need to be considered?
Compliance
What considerations should be given to compliance? What
audits and certifications can help? Are there strategies to
consider with alignment to vendor audits and certifications?
The Journey
What You’ll Learn
Improvement is continuous. What does the outlook look like for
organizations beginning the journey at various maturity levels?
What’s At Risk?
We will look at a historical view of past and current breaches
that establish the importance of a shared security model
between organizations and their vendors.
What is at Risk?
23 19.1
127.7
35.7
222.5
16.2 22.9 17.3
91.98
85.61
169.07
36.6
197.61
471.23
164.68
300.5
157
321
446
656
498
662
419 447
614
783 781
1093
1632
1257
1473
1108
0
200
400
600
800
1000
1200
1400
1600
1800
2
0
0
5
2
0
0
6
2
0
0
7
2
0
0
8
2
0
0
9
2
0
1
0
2
0
1
1
2
0
1
2
2
0
1
3
2
0
1
4
2
0
1
5
2
0
1
6
2
0
1
7
2
0
1
8
2
0
1
9
2
0
2
0
Data
breaches
&
records
exposed
in
millions
Data Beaches and Records Exposed Over Years
Millions of Records Exposed Data Breaches
Graph sourced from Identity Theft Resource Center, January 2021
Statistics and predictions for 2021 from Cybersecurity Ventures
• More than 93% of healthcare
organizations experienced a data
breach between 2017 and 2020.
• More than 57% have had more
than 5 data breaches during the
same time frame.
• Predictions for 2021 estimate
breaches at a pace of 2-3x more
than 2020.
• Ransomware attacks are
predicted to grow by 5x in 2021.
U.S. Annual Data Breaches and Exposed Records 2005–2020
(Millions)
4
Breaches with greater than 30,000 records
World’s Biggest Data Breaches & Hacks
Graph sourced from https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks
5
Breaches with greater than 30,000 records
World’s Biggest Data Breaches Within Healthcare in 2020
Graph sourced from https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks
6
That is the goal, but…
If you and your vendor, suffered
a material data breach, could
you together logically defend
your combined cybersecurity
practices to a very emotional
audience?
The Ultimate Goal is to Stay Out of the Bad Headlines
7
The Cloud Shared Responsibility Model
Image source from researchgate.net
• Confidentiality – Keeping sensitive information
private (PHI, PII, IP, etc). The goal being to
prevent or minimize unauthorized access to data.
• Integrity – Protects the reliability and correctness
of data. To be maintained, objects must retain
their veracity and be intentionally modified by
only authorized subjects.
• Availability – Authorized subjects are granted
timely and uninterrupted access to systems,
networks and data needed to perform daily
tasks.
The CIA Triad Is the Overarching Shared Goal and Objective
9
Types of Cloud Services
Applications
Database
O/S
Virtualization
Servers
Storage
Networking
Infrastructure
Hardware
Data
Client
On-Premise
Infrastructure
Hardware
Applications
Database
O/S
Virtualization
Servers
Storage
Networking
Data
Client
Vendor
IaaS
Virtualization
Servers
Storage
Networking
Infrastructure
Hardware
Applications
Database
O/S
Data
Client
Vendor
PaaS
Applications
Database
O/S
Virtualization
Servers
Storage
Networking
Infrastructure
Hardware
Data
Vendor
SaaS
10
SaaS
PaaS
IaaS
Web
Applications
Analytic
Accelerators
Dashboards
Networking
Storage
Virtualization
Servers
Analytic Engine
Metadata
Data
Security
Machine Learning
A Closer Look with the Health Catalyst Data Operating System (DOSTM)
11
• Health Catalyst Data Operating System
(DOSTM) is offered as a Platform as a Service
(PaaS) moving to SaaS.
• Relies on a shared security model where all
layers above the Operating System (OS) level
involves the partner to manage some
aspect.
• On premise components such as source
systems, IPSec tunnels, point of contact, etc.
are responsibilities not depicted that are
retained by the customer.
An Overview of the Cloud Shared Responsibility Model Using DOSTM
12
Security Policy and Procedures
• To build a comprehensive Information Security
Management Program (or system) (ISMS) that
considers layered security controls, you must
FIRST know your business and its assets you wish
to protect.
• Once identified, consider a strategy for how you
will classify or label those assets.
• What vulnerabilities exist that are a threat to the
assets you want to protect? Who is responsible to
protect it? Who is accountable to protect them?
• Risk management is at the core of a good
Information Security Program.
Know Your “What” and “Why” Before You Consider “How”
14
What Is the Risk (R) ?
Inventory
Vulnerabilities
Threats
Exposure
Compensating Controls
ƒ ( )
R = Likelihood X Business Impact
Confidentiality
Integrity
Availability
15
• Security policies and standards are
arguably the most important aspect of any
security program.
• When written and communicated
correctly, it informs staff, vendors and
contractors of acceptable conduct within
the work environment.
• Process documentation provides
instruction for how compliance is achieved
and evidenced.
Compliance Examines An Organization’s Security Processes
16
• Security is a clear set of technical systems and
tools and processes which are put in place to
protect and defend the organization’s
information and technology assets.
• Always consider the people, processes and
technologies that are involved with your assets.
• When Compliance and Security align in a
systematic and controlled way, that is the first
step toward reducing risk.
Security Aims To Protect Information and Technology Assets
17
The Challenge in Achieving Perfect Balance
• Information agility and security are inversely
proportional, opposing forces.
• Maximizing one, minimizes the other.
• Finding the perfect balance between the two
is an art, not a science.
• Where a clear decision between the two does
not exist, let your risk appetite inform.
• When your organization and vendor cannot
align, let your regulatory compliance
frameworks guide the path forward.
18
Compliance
What regulatory frameworks apply to your organization? Select all the apply.
• HIPAA – 85.71%
• PCI DSS – 34.29%
• GDPR – 25.71%
• State Based Data Privacy framework (CCPA) – 28.57%
• Unknown – 14.29%
Poll Question #1
20
Considering your vendors, what is the MOST IMPORTANT certifications you consider?
• SOC 2 – 14.29%
• HITRUST CSF – 34.29%
• ISO 27001/2 – 14.29%
• My organization’s own risk assessment process – 11.43%
• Unsure – 25.71%
Poll Question #2
21
Common Compliance Frameworks
22
Image Source - Image source - https://mindmajix.com/cyber-security-frameworks
Well-known Cyber Security Frameworks
23
Compliance Audits and Certifications
SOC Reports are Service Organization Control Reports that deal with managing
financial or personal information at a company. There are three different SOC
Reports. SOC 1 and SOC 2 are different types with SOC 1 applying to financial
information controls, while SOC 2 compliance and certification covers personal
user information. SOC 3 Reports are publicly accessible, so they do not include
confidential information about the company. These reports apply for a specific
period, and new reports consider any earlier findings.
The American Institute for Chartered Public Accountants (AICPA) defined them
as part of SSAE 18.
https://phoenixnap.com/blog/security-vs-compliance
24
Compliance Audits and Certifications
ISO 27001/2 certifications are globally recognized, standards-based approach to
security that outlines requirements for an organization’s Information Security
Management System (ISMS).
The HITRUST CSF leverages nationally and internationally accepted standards
including ISO, NIST, PCI and HIPAA to ensure a comprehensive set of baseline security
controls. The CSF normalizes these security requirements and provides clarity and
consistency, reducing the burden of compliance with the varied requirements that
apply to organizations.
Measures the compliance with HIPAA and offers the assurance that the organization
has a HIPAA-compliance program with adequate measures for saving, accessing, and
sharing individual medicaland personal information.
25
Vendor Risk Evaluation
• Non-Disclosure Agreements (NDAs)
• Business Associate Agreements (BAAs)
• Data Use Agreements (DUAs)
• Service Level Agreements (SLAs)
• Operational Level Agreements (OLAs)
• Compliance Audits and Certifications
Vendor / Partner Considerations
27
• Internal GRC teams audit and assess
organizational risks
• Independent third-party auditors offer external
perspective and offer credibility.
• Perform compliance and risk assessment on your
vendor supply chain
• Value certifications that overlap between vendor
and your organization
Internal, External and Vendor Risk Assessments
28
Coming Back Full Circle….
• Where are your shared responsibilities?
• Do your and your vendors compliance
frameworks align?
• Do your certification strategies align to
hopefully minimize your own efforts for
certifications?
• How will you assess alignment and track
shared risk (misalignment)?
29
Image Source - https://quotefancy.com/
The Journey is Continuous….Embrace It
30
If you would like to learn more about Health Catalyst products and services, please answer
this poll question:
• Yes
• No
Poll Question #3
31
Questions?
Kevin Scharnhorst, CISSP, CISM
Chief Information Security Officer, Health Catalyst
kevin.scharnhorst@healthcatalyst.com

More Related Content

What's hot

Top 10 canada health innovations 2011
Top 10 canada health innovations 2011Top 10 canada health innovations 2011
Top 10 canada health innovations 2011hosnah
 
Healthcare Dashboard Group 3
Healthcare Dashboard Group 3Healthcare Dashboard Group 3
Healthcare Dashboard Group 3Jordan Kessler
 
Transform Your Labor Cost Management Strategy: Introducing the Health Catalys...
Transform Your Labor Cost Management Strategy: Introducing the Health Catalys...Transform Your Labor Cost Management Strategy: Introducing the Health Catalys...
Transform Your Labor Cost Management Strategy: Introducing the Health Catalys...Health Catalyst
 
Health Catalyst Launches COVID-19 Patient Data Repository to Speed Vaccine De...
Health Catalyst Launches COVID-19 Patient Data Repository to Speed Vaccine De...Health Catalyst Launches COVID-19 Patient Data Repository to Speed Vaccine De...
Health Catalyst Launches COVID-19 Patient Data Repository to Speed Vaccine De...Health Catalyst
 
Accelerate Data-Driven Healthcare Improvement: 5 Tenets
Accelerate Data-Driven Healthcare Improvement: 5 TenetsAccelerate Data-Driven Healthcare Improvement: 5 Tenets
Accelerate Data-Driven Healthcare Improvement: 5 TenetsHealth Catalyst
 
The Next Revolution in Healthcare: Why the New MSSP Revisions Matter Now More...
The Next Revolution in Healthcare: Why the New MSSP Revisions Matter Now More...The Next Revolution in Healthcare: Why the New MSSP Revisions Matter Now More...
The Next Revolution in Healthcare: Why the New MSSP Revisions Matter Now More...Health Catalyst
 
Current Status of Healthcare Analytics
Current Status of Healthcare AnalyticsCurrent Status of Healthcare Analytics
Current Status of Healthcare AnalyticsJames Young
 
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...Health Catalyst
 
What the ONC's Proposed Rule on Information Blocking Means for Your Work
What the ONC's Proposed Rule on Information Blocking Means for Your WorkWhat the ONC's Proposed Rule on Information Blocking Means for Your Work
What the ONC's Proposed Rule on Information Blocking Means for Your WorkHealth Catalyst
 
The Foundations of Success in Population Health Management
The Foundations of Success in Population Health ManagementThe Foundations of Success in Population Health Management
The Foundations of Success in Population Health ManagementHealth Catalyst
 
Healthcare Information Technology: IBM Health Integration Framework
Healthcare Information Technology: IBM Health Integration FrameworkHealthcare Information Technology: IBM Health Integration Framework
Healthcare Information Technology: IBM Health Integration FrameworkIBM HealthCare
 
A 360° view of value-based healthcare: how to position your facility for success
A 360° view of value-based healthcare: how to position your facility for successA 360° view of value-based healthcare: how to position your facility for success
A 360° view of value-based healthcare: how to position your facility for successSourceMed
 
How to Drive ROI from Your Healthcare Projects: Practical Tools, Templates, a...
How to Drive ROI from Your Healthcare Projects: Practical Tools, Templates, a...How to Drive ROI from Your Healthcare Projects: Practical Tools, Templates, a...
How to Drive ROI from Your Healthcare Projects: Practical Tools, Templates, a...Health Catalyst
 
Why Health Systems Must Use Data Science to Improve Outcomes
Why Health Systems Must Use Data Science to Improve OutcomesWhy Health Systems Must Use Data Science to Improve Outcomes
Why Health Systems Must Use Data Science to Improve OutcomesHealth Catalyst
 
A Five-Step Audit for Peak Charge Capture Performance
A Five-Step Audit for Peak Charge Capture PerformanceA Five-Step Audit for Peak Charge Capture Performance
A Five-Step Audit for Peak Charge Capture PerformanceHealth Catalyst
 
Healthcare Analytics Market Categorization
Healthcare Analytics Market CategorizationHealthcare Analytics Market Categorization
Healthcare Analytics Market CategorizationDale Sanders
 
Alteryx Investor Presentation 080217
Alteryx Investor Presentation 080217Alteryx Investor Presentation 080217
Alteryx Investor Presentation 080217alteryxinvestor
 
Using Advanced Analytics for Value-based Healthcare Delivery
Using Advanced Analytics for Value-based Healthcare DeliveryUsing Advanced Analytics for Value-based Healthcare Delivery
Using Advanced Analytics for Value-based Healthcare DeliveryMichael Joseph
 
TCS Healthcare Presentation 05 07 09
TCS Healthcare Presentation  05 07 09TCS Healthcare Presentation  05 07 09
TCS Healthcare Presentation 05 07 09techcouncil
 
A Reference Architecture for Digital Health: The Health Catalyst Data Operati...
A Reference Architecture for Digital Health: The Health Catalyst Data Operati...A Reference Architecture for Digital Health: The Health Catalyst Data Operati...
A Reference Architecture for Digital Health: The Health Catalyst Data Operati...Health Catalyst
 

What's hot (20)

Top 10 canada health innovations 2011
Top 10 canada health innovations 2011Top 10 canada health innovations 2011
Top 10 canada health innovations 2011
 
Healthcare Dashboard Group 3
Healthcare Dashboard Group 3Healthcare Dashboard Group 3
Healthcare Dashboard Group 3
 
Transform Your Labor Cost Management Strategy: Introducing the Health Catalys...
Transform Your Labor Cost Management Strategy: Introducing the Health Catalys...Transform Your Labor Cost Management Strategy: Introducing the Health Catalys...
Transform Your Labor Cost Management Strategy: Introducing the Health Catalys...
 
Health Catalyst Launches COVID-19 Patient Data Repository to Speed Vaccine De...
Health Catalyst Launches COVID-19 Patient Data Repository to Speed Vaccine De...Health Catalyst Launches COVID-19 Patient Data Repository to Speed Vaccine De...
Health Catalyst Launches COVID-19 Patient Data Repository to Speed Vaccine De...
 
Accelerate Data-Driven Healthcare Improvement: 5 Tenets
Accelerate Data-Driven Healthcare Improvement: 5 TenetsAccelerate Data-Driven Healthcare Improvement: 5 Tenets
Accelerate Data-Driven Healthcare Improvement: 5 Tenets
 
The Next Revolution in Healthcare: Why the New MSSP Revisions Matter Now More...
The Next Revolution in Healthcare: Why the New MSSP Revisions Matter Now More...The Next Revolution in Healthcare: Why the New MSSP Revisions Matter Now More...
The Next Revolution in Healthcare: Why the New MSSP Revisions Matter Now More...
 
Current Status of Healthcare Analytics
Current Status of Healthcare AnalyticsCurrent Status of Healthcare Analytics
Current Status of Healthcare Analytics
 
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
Why a Build-Your-Own Healthcare Data Platform Will Fall Short and What to Do ...
 
What the ONC's Proposed Rule on Information Blocking Means for Your Work
What the ONC's Proposed Rule on Information Blocking Means for Your WorkWhat the ONC's Proposed Rule on Information Blocking Means for Your Work
What the ONC's Proposed Rule on Information Blocking Means for Your Work
 
The Foundations of Success in Population Health Management
The Foundations of Success in Population Health ManagementThe Foundations of Success in Population Health Management
The Foundations of Success in Population Health Management
 
Healthcare Information Technology: IBM Health Integration Framework
Healthcare Information Technology: IBM Health Integration FrameworkHealthcare Information Technology: IBM Health Integration Framework
Healthcare Information Technology: IBM Health Integration Framework
 
A 360° view of value-based healthcare: how to position your facility for success
A 360° view of value-based healthcare: how to position your facility for successA 360° view of value-based healthcare: how to position your facility for success
A 360° view of value-based healthcare: how to position your facility for success
 
How to Drive ROI from Your Healthcare Projects: Practical Tools, Templates, a...
How to Drive ROI from Your Healthcare Projects: Practical Tools, Templates, a...How to Drive ROI from Your Healthcare Projects: Practical Tools, Templates, a...
How to Drive ROI from Your Healthcare Projects: Practical Tools, Templates, a...
 
Why Health Systems Must Use Data Science to Improve Outcomes
Why Health Systems Must Use Data Science to Improve OutcomesWhy Health Systems Must Use Data Science to Improve Outcomes
Why Health Systems Must Use Data Science to Improve Outcomes
 
A Five-Step Audit for Peak Charge Capture Performance
A Five-Step Audit for Peak Charge Capture PerformanceA Five-Step Audit for Peak Charge Capture Performance
A Five-Step Audit for Peak Charge Capture Performance
 
Healthcare Analytics Market Categorization
Healthcare Analytics Market CategorizationHealthcare Analytics Market Categorization
Healthcare Analytics Market Categorization
 
Alteryx Investor Presentation 080217
Alteryx Investor Presentation 080217Alteryx Investor Presentation 080217
Alteryx Investor Presentation 080217
 
Using Advanced Analytics for Value-based Healthcare Delivery
Using Advanced Analytics for Value-based Healthcare DeliveryUsing Advanced Analytics for Value-based Healthcare Delivery
Using Advanced Analytics for Value-based Healthcare Delivery
 
TCS Healthcare Presentation 05 07 09
TCS Healthcare Presentation  05 07 09TCS Healthcare Presentation  05 07 09
TCS Healthcare Presentation 05 07 09
 
A Reference Architecture for Digital Health: The Health Catalyst Data Operati...
A Reference Architecture for Digital Health: The Health Catalyst Data Operati...A Reference Architecture for Digital Health: The Health Catalyst Data Operati...
A Reference Architecture for Digital Health: The Health Catalyst Data Operati...
 

Similar to Cloud Cybersecurity: Strategies for Managing Vendor Risk

Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018Open Security Summit
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainShawn Brown
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsSkoda Minotti
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteGlobus
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security TwistSecurity Innovation
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdfJose R
 

Similar to Cloud Cybersecurity: Strategies for Managing Vendor Risk (20)

Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018w-cyber-risk-modeling Owasp cyber risk quantification 2018
w-cyber-risk-modeling Owasp cyber risk quantification 2018
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychain
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
Enabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest KeynoteEnabling Science with Trust and Security – Guest Keynote
Enabling Science with Trust and Security – Guest Keynote
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 

More from Health Catalyst

Looking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesLooking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesHealth Catalyst
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology InsightsHealth Catalyst
 
Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborHealth Catalyst
 
2024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 32024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 3Health Catalyst
 
2024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 22024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 2Health Catalyst
 
2024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 12024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 1Health Catalyst
 
What’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondWhat’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondHealth Catalyst
 
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementAutomated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementHealth Catalyst
 
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule UpdatesHealth Catalyst
 
What's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleWhat's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleHealth Catalyst
 
Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Health Catalyst
 
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfVitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfHealth Catalyst
 
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsDriving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsHealth Catalyst
 
Tech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingTech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingHealth Catalyst
 
2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set UpdatesHealth Catalyst
 
How Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHow Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHealth Catalyst
 
COVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsCOVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsHealth Catalyst
 
Automated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientAutomated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientHealth Catalyst
 
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxA Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxHealth Catalyst
 
Self-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceSelf-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceHealth Catalyst
 

More from Health Catalyst (20)

Looking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesLooking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare Issues
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights
 
Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and Labor
 
2024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 32024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 3
 
2024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 22024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 2
 
2024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 12024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 1
 
What’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondWhat’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and Beyond
 
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementAutomated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
 
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
 
What's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleWhat's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final Rule
 
Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2
 
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfVitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
 
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsDriving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
 
Tech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingTech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average Outsourcing
 
2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates
 
How Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHow Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital Technology
 
COVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsCOVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency Ends
 
Automated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientAutomated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and Patient
 
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxA Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
 
Self-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceSelf-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business Intelligence
 

Recently uploaded

VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Sheetaleventcompany
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Niamh verma
 
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...Gfnyt
 
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Sheetaleventcompany
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...Gfnyt.com
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171Call Girls Service Gurgaon
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...indiancallgirl4rent
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...Gfnyt.com
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availablegragmanisha42
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...seemahedar019
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabadgragmanisha42
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591adityaroy0215
 

Recently uploaded (20)

VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
Punjab❤️Call girls in Mohali ☎️7435815124☎️ Call Girl service in Mohali☎️ Moh...
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
 
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
 
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
 

Cloud Cybersecurity: Strategies for Managing Vendor Risk

  • 1. © 2021 Health Catalyst Cloud Cybersecurity: Strategies for Managing Vendor Risk Kevin Scharnhorst, CISSP, CISM Chief Information Security Officer, Health Catalyst February 10, 2021
  • 2. Agenda Cloud Shared Responsibility Model In a cloud vendor/ partner relationship, who has responsibility for what? Who is ultimately accountable for a security compromise or breach? Vendor Risk Evaluation With so many cloud vendors to choose from, what factors go into a final decision? What risks do you consider? What risk management strategies should be considered? Security Policy and Procedures Where do you start with building a Security Program? What standards does your organization align to? What regulatory frameworks need to be considered? Compliance What considerations should be given to compliance? What audits and certifications can help? Are there strategies to consider with alignment to vendor audits and certifications? The Journey What You’ll Learn Improvement is continuous. What does the outlook look like for organizations beginning the journey at various maturity levels? What’s At Risk? We will look at a historical view of past and current breaches that establish the importance of a shared security model between organizations and their vendors.
  • 3. What is at Risk?
  • 4. 23 19.1 127.7 35.7 222.5 16.2 22.9 17.3 91.98 85.61 169.07 36.6 197.61 471.23 164.68 300.5 157 321 446 656 498 662 419 447 614 783 781 1093 1632 1257 1473 1108 0 200 400 600 800 1000 1200 1400 1600 1800 2 0 0 5 2 0 0 6 2 0 0 7 2 0 0 8 2 0 0 9 2 0 1 0 2 0 1 1 2 0 1 2 2 0 1 3 2 0 1 4 2 0 1 5 2 0 1 6 2 0 1 7 2 0 1 8 2 0 1 9 2 0 2 0 Data breaches & records exposed in millions Data Beaches and Records Exposed Over Years Millions of Records Exposed Data Breaches Graph sourced from Identity Theft Resource Center, January 2021 Statistics and predictions for 2021 from Cybersecurity Ventures • More than 93% of healthcare organizations experienced a data breach between 2017 and 2020. • More than 57% have had more than 5 data breaches during the same time frame. • Predictions for 2021 estimate breaches at a pace of 2-3x more than 2020. • Ransomware attacks are predicted to grow by 5x in 2021. U.S. Annual Data Breaches and Exposed Records 2005–2020 (Millions) 4
  • 5. Breaches with greater than 30,000 records World’s Biggest Data Breaches & Hacks Graph sourced from https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks 5
  • 6. Breaches with greater than 30,000 records World’s Biggest Data Breaches Within Healthcare in 2020 Graph sourced from https://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks 6
  • 7. That is the goal, but… If you and your vendor, suffered a material data breach, could you together logically defend your combined cybersecurity practices to a very emotional audience? The Ultimate Goal is to Stay Out of the Bad Headlines 7
  • 8. The Cloud Shared Responsibility Model
  • 9. Image source from researchgate.net • Confidentiality – Keeping sensitive information private (PHI, PII, IP, etc). The goal being to prevent or minimize unauthorized access to data. • Integrity – Protects the reliability and correctness of data. To be maintained, objects must retain their veracity and be intentionally modified by only authorized subjects. • Availability – Authorized subjects are granted timely and uninterrupted access to systems, networks and data needed to perform daily tasks. The CIA Triad Is the Overarching Shared Goal and Objective 9
  • 10. Types of Cloud Services Applications Database O/S Virtualization Servers Storage Networking Infrastructure Hardware Data Client On-Premise Infrastructure Hardware Applications Database O/S Virtualization Servers Storage Networking Data Client Vendor IaaS Virtualization Servers Storage Networking Infrastructure Hardware Applications Database O/S Data Client Vendor PaaS Applications Database O/S Virtualization Servers Storage Networking Infrastructure Hardware Data Vendor SaaS 10
  • 12. • Health Catalyst Data Operating System (DOSTM) is offered as a Platform as a Service (PaaS) moving to SaaS. • Relies on a shared security model where all layers above the Operating System (OS) level involves the partner to manage some aspect. • On premise components such as source systems, IPSec tunnels, point of contact, etc. are responsibilities not depicted that are retained by the customer. An Overview of the Cloud Shared Responsibility Model Using DOSTM 12
  • 13. Security Policy and Procedures
  • 14. • To build a comprehensive Information Security Management Program (or system) (ISMS) that considers layered security controls, you must FIRST know your business and its assets you wish to protect. • Once identified, consider a strategy for how you will classify or label those assets. • What vulnerabilities exist that are a threat to the assets you want to protect? Who is responsible to protect it? Who is accountable to protect them? • Risk management is at the core of a good Information Security Program. Know Your “What” and “Why” Before You Consider “How” 14
  • 15. What Is the Risk (R) ? Inventory Vulnerabilities Threats Exposure Compensating Controls ƒ ( ) R = Likelihood X Business Impact Confidentiality Integrity Availability 15
  • 16. • Security policies and standards are arguably the most important aspect of any security program. • When written and communicated correctly, it informs staff, vendors and contractors of acceptable conduct within the work environment. • Process documentation provides instruction for how compliance is achieved and evidenced. Compliance Examines An Organization’s Security Processes 16
  • 17. • Security is a clear set of technical systems and tools and processes which are put in place to protect and defend the organization’s information and technology assets. • Always consider the people, processes and technologies that are involved with your assets. • When Compliance and Security align in a systematic and controlled way, that is the first step toward reducing risk. Security Aims To Protect Information and Technology Assets 17
  • 18. The Challenge in Achieving Perfect Balance • Information agility and security are inversely proportional, opposing forces. • Maximizing one, minimizes the other. • Finding the perfect balance between the two is an art, not a science. • Where a clear decision between the two does not exist, let your risk appetite inform. • When your organization and vendor cannot align, let your regulatory compliance frameworks guide the path forward. 18
  • 20. What regulatory frameworks apply to your organization? Select all the apply. • HIPAA – 85.71% • PCI DSS – 34.29% • GDPR – 25.71% • State Based Data Privacy framework (CCPA) – 28.57% • Unknown – 14.29% Poll Question #1 20
  • 21. Considering your vendors, what is the MOST IMPORTANT certifications you consider? • SOC 2 – 14.29% • HITRUST CSF – 34.29% • ISO 27001/2 – 14.29% • My organization’s own risk assessment process – 11.43% • Unsure – 25.71% Poll Question #2 21
  • 23. Image Source - Image source - https://mindmajix.com/cyber-security-frameworks Well-known Cyber Security Frameworks 23
  • 24. Compliance Audits and Certifications SOC Reports are Service Organization Control Reports that deal with managing financial or personal information at a company. There are three different SOC Reports. SOC 1 and SOC 2 are different types with SOC 1 applying to financial information controls, while SOC 2 compliance and certification covers personal user information. SOC 3 Reports are publicly accessible, so they do not include confidential information about the company. These reports apply for a specific period, and new reports consider any earlier findings. The American Institute for Chartered Public Accountants (AICPA) defined them as part of SSAE 18. https://phoenixnap.com/blog/security-vs-compliance 24
  • 25. Compliance Audits and Certifications ISO 27001/2 certifications are globally recognized, standards-based approach to security that outlines requirements for an organization’s Information Security Management System (ISMS). The HITRUST CSF leverages nationally and internationally accepted standards including ISO, NIST, PCI and HIPAA to ensure a comprehensive set of baseline security controls. The CSF normalizes these security requirements and provides clarity and consistency, reducing the burden of compliance with the varied requirements that apply to organizations. Measures the compliance with HIPAA and offers the assurance that the organization has a HIPAA-compliance program with adequate measures for saving, accessing, and sharing individual medicaland personal information. 25
  • 27. • Non-Disclosure Agreements (NDAs) • Business Associate Agreements (BAAs) • Data Use Agreements (DUAs) • Service Level Agreements (SLAs) • Operational Level Agreements (OLAs) • Compliance Audits and Certifications Vendor / Partner Considerations 27
  • 28. • Internal GRC teams audit and assess organizational risks • Independent third-party auditors offer external perspective and offer credibility. • Perform compliance and risk assessment on your vendor supply chain • Value certifications that overlap between vendor and your organization Internal, External and Vendor Risk Assessments 28
  • 29. Coming Back Full Circle…. • Where are your shared responsibilities? • Do your and your vendors compliance frameworks align? • Do your certification strategies align to hopefully minimize your own efforts for certifications? • How will you assess alignment and track shared risk (misalignment)? 29
  • 30. Image Source - https://quotefancy.com/ The Journey is Continuous….Embrace It 30
  • 31. If you would like to learn more about Health Catalyst products and services, please answer this poll question: • Yes • No Poll Question #3 31
  • 32. Questions? Kevin Scharnhorst, CISSP, CISM Chief Information Security Officer, Health Catalyst kevin.scharnhorst@healthcatalyst.com