SlideShare une entreprise Scribd logo
1  sur  11
I Volunteered To Do This?  Eric Cowperthwaite Providence Health & Services SOURCE Seattle, June 16, 2011
About Providence 27 hospitals located in 5 states Over 160 other facilities, including Physician clinics, long term care, laboratories, billing & debt collection A health plan with over 400,000 members A liberal arts university, private high school, several daycares $8 billion in annual revenue and $9 billion in assets $500 million in annual community benefit 7200 acute and long term care beds More than 7 million primary care and acute outpatient visits Tier 2 PCI Merchant with more than 2 million annual transactions 40,000 end points (PC, laptop, tablet) and 5,000 servers Among the 5 largest Catholic Healthcare Systems in the nation Patient records on approx 10 million people on the west coast
Tapes, laptops and viruses … Oh My Jan 1, 2006 – tapes containing data on more than 380,000 patients are stolen. Tapes are not encrypted Feb, 2006 – 3 laptops containing data on more than 1,000 patients are stolen. Laptops are not encrypted Mar, 2006 – a hospital goes to “downtime procedures” due to malware infections in 80% of PC’s and laptops. A/V software is 2 versions old and signatures out of date.  Feb – Apr, 2006 – EDS SPPS conducts gap analysis, forensics, etc. and recommends to the Board the institution of a formal Information Security program, including hiring a security executive May 15, 2006 – Eric Cowperthwaite’s first day at Providence Jun – Sep, 2006 - HHS is onsite, investigating Providence actions and interviewing employees.
Reflecting on being a CSO in a Crisis I was approached 3 times, third time a friend told me they were serious The Board and senior execs were serious Middle management viewed the crisis as a drain on budget and resources Going from crisis to sustained maturity is a 3 to 5 year journey Make darn sure that your soon to be new employer wants to solve their problem, even if they don’t know what it is yet Security staff has to be absolutely top notch, in both terms of hard and soft skills You have to be prepared for a lot of hard knocks and dynamically changing your plans and programs to adapt to reality
Worst Imaginable Environment Every business unit is responsible for it’s own IT – 10 CIOs 80% of my employees are professionals, I have 40,000 college degrees to deal with Financial accountability is decentralized Healthcare is used to delivering locally Everything is viewed as negotiable
Understanding the Business Failing to understand the needs of the business means a new CSO will lead them through the remainder of the crisis  Lower healthcare costs Healthcare costs rising faster than inflation National political debate Massive pressure to “transform” healthcare Increased Quality Improve outcomes Reduce infections, injuries and mortality in hospitals Standardize healthcare so everyone gets the same quality of care Community Benefit – continuing to provide for the poor & vulnerable Managing operating expenses – Good stewardship of our resources
What Did We Do? Established a formal Information Security program, with visibility all the way to the Board of Directors Created an executive position to lead that program, i.e. the CSO Reviewed and analyzed policy and standards Established a security controls framework Joint Commission for Accreditation of Healthcare Organizations PCI DSS HIPAA Security & Privacy Rules National Institute of Standards & Technology ISO 27001:2 Implemented new and improved security controls, for example: All at rest data encrypted on devices that are mobile (tapes, laptops, phones, etc) Data loss prevention Co-sourced security management controls (i.e. SIEM, firewalls, IDS/IPS)
What Did Our Regulators Do? HHS received multiple complaints that we had violated the Privacy and Security rules Class Action lawsuit filed in Oregon All lawsuits were dismissed, including appeals by the plaintiffs We were very transparent with the OR & WA Attorney Generals No AG found that Providence had caused harm or broken state laws HHS and Providence signed a Resolution Agreement on 7/15/08 3 years, established specific control and reporting requirements No FTC Consent Decree Providence CISO established as Agreement Monitor $100,000 administrative fee Providence did not admit to a violation of HIPAA or other law or regulation
Building Security Sustainability We started with Multiple point solutions Too many vendors Too much cost and not enough controls Managed by security Principles Fit for purpose Managed by appropriate IT operations organizations Reduce the number of vendors to manage Select vendors with suites or broad product offerings Reduce cost, both product acquisition and operations Governance vs. Operations Separate GRC, ITSec, InfoSec functions
Next: Enterprise Risk Management Today we are building Enterprise Risk Management All security operations is managed within appropriate parts of the business Technical security controls are delivered by the CIO, not the CISO Line of business delivers administrative controls, education, awareness  The CISO delivers Governance, Risk Management & Compliance Chief Risk Officer is independent of the business operations Reports to the Chair of the Board’s Audit Committee CISO, CPO, Insurance, Internal Audit, Compliance all report to the CRO We started this path about 9 months ago Already we are seeing far higher business engagement
That’s The End Questions?  I’ll answer the ones I can

Contenu connexe

Tendances

Electronic health records
Electronic health recordsElectronic health records
Electronic health recordsJocelyn Garcia
 
EMR Presentation - The Time is Now
EMR Presentation - The Time is NowEMR Presentation - The Time is Now
EMR Presentation - The Time is Nowsbenson1
 
Himss Revenue Cycle Task Force Panel Presentation[1]
Himss Revenue Cycle Task Force Panel Presentation[1]Himss Revenue Cycle Task Force Panel Presentation[1]
Himss Revenue Cycle Task Force Panel Presentation[1]William Kirsh, DO, MPH
 
Overview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy SanyalOverview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy SanyalSanjoy Sanyal
 
Emr powerpoint for IPM
Emr powerpoint for IPMEmr powerpoint for IPM
Emr powerpoint for IPMAnna Tonnu
 
PSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS CommunityPSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS CommunityPSOW
 
Preventative Malpractice Insurance_02
Preventative Malpractice Insurance_02Preventative Malpractice Insurance_02
Preventative Malpractice Insurance_02medicaljustice
 
Media presentation (social impact of technology)ppt
Media presentation (social impact of technology)pptMedia presentation (social impact of technology)ppt
Media presentation (social impact of technology)pptChelsieClingen
 
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSUsmanYakubuMaaruf
 
Software Blue
Software BlueSoftware Blue
Software BluePradeep
 
Medical Billing Service a Top Concern for Many Physicians
  Medical Billing Service a Top Concern for Many Physicians  Medical Billing Service a Top Concern for Many Physicians
Medical Billing Service a Top Concern for Many Physicianssamanth425
 
Remaking The Electronic Health Record
Remaking The Electronic Health RecordRemaking The Electronic Health Record
Remaking The Electronic Health Recordmlkrgr
 
KP in American Healthcare System
KP in American Healthcare SystemKP in American Healthcare System
KP in American Healthcare Systemmarcnellen
 
Making Sense of Health Information Systems
Making Sense of Health Information SystemsMaking Sense of Health Information Systems
Making Sense of Health Information SystemsKaiser Permanente
 
Cuban American Medical Society Presentation[1]
 Cuban American Medical Society Presentation[1] Cuban American Medical Society Presentation[1]
Cuban American Medical Society Presentation[1]William Kirsh, DO, MPH
 
Sentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI applicationSentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI applicationWilliam Kirsh, DO, MPH
 
Hitech Act and How It Impacts EHR
Hitech Act and How It Impacts EHRHitech Act and How It Impacts EHR
Hitech Act and How It Impacts EHRPALIO
 

Tendances (20)

Ghana Medical Banking Institute
Ghana Medical Banking InstituteGhana Medical Banking Institute
Ghana Medical Banking Institute
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
EMR Presentation - The Time is Now
EMR Presentation - The Time is NowEMR Presentation - The Time is Now
EMR Presentation - The Time is Now
 
Himss Revenue Cycle Task Force Panel Presentation[1]
Himss Revenue Cycle Task Force Panel Presentation[1]Himss Revenue Cycle Task Force Panel Presentation[1]
Himss Revenue Cycle Task Force Panel Presentation[1]
 
Overview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy SanyalOverview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy Sanyal
 
Emr powerpoint for IPM
Emr powerpoint for IPMEmr powerpoint for IPM
Emr powerpoint for IPM
 
PSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS CommunityPSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS Community
 
Preventative Malpractice Insurance_02
Preventative Malpractice Insurance_02Preventative Malpractice Insurance_02
Preventative Malpractice Insurance_02
 
Media presentation (social impact of technology)ppt
Media presentation (social impact of technology)pptMedia presentation (social impact of technology)ppt
Media presentation (social impact of technology)ppt
 
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
 
Software Blue
Software BlueSoftware Blue
Software Blue
 
Vitas Presentation Version 2
Vitas Presentation Version 2Vitas Presentation Version 2
Vitas Presentation Version 2
 
Medical Billing Service a Top Concern for Many Physicians
  Medical Billing Service a Top Concern for Many Physicians  Medical Billing Service a Top Concern for Many Physicians
Medical Billing Service a Top Concern for Many Physicians
 
Remaking The Electronic Health Record
Remaking The Electronic Health RecordRemaking The Electronic Health Record
Remaking The Electronic Health Record
 
KP in American Healthcare System
KP in American Healthcare SystemKP in American Healthcare System
KP in American Healthcare System
 
Health Bit Webinar 612010
Health Bit Webinar 612010Health Bit Webinar 612010
Health Bit Webinar 612010
 
Making Sense of Health Information Systems
Making Sense of Health Information SystemsMaking Sense of Health Information Systems
Making Sense of Health Information Systems
 
Cuban American Medical Society Presentation[1]
 Cuban American Medical Society Presentation[1] Cuban American Medical Society Presentation[1]
Cuban American Medical Society Presentation[1]
 
Sentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI applicationSentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI application
 
Hitech Act and How It Impacts EHR
Hitech Act and How It Impacts EHRHitech Act and How It Impacts EHR
Hitech Act and How It Impacts EHR
 

En vedette

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitAlan Quayle
 
Conversion
ConversionConversion
Conversionneicher
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015mauimarketing
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessDr David Probert
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCloudIDSummit
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 

En vedette (9)

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Conversion
ConversionConversion
Conversion
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control Convergence
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 

Similaire à Keynote

2016 IBM Interconnect - medical devices transformation
2016 IBM Interconnect  - medical devices transformation2016 IBM Interconnect  - medical devices transformation
2016 IBM Interconnect - medical devices transformationElizabeth Koumpan
 
Introduction to EMR
Introduction to EMRIntroduction to EMR
Introduction to EMRHal Amens
 
How a healthcare management system (hms) is improving hospitals and clinics
How a healthcare management system (hms) is improving hospitals and clinicsHow a healthcare management system (hms) is improving hospitals and clinics
How a healthcare management system (hms) is improving hospitals and clinicsShelly Megan
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
Healthcare Thinktank Roundtable
Healthcare Thinktank RoundtableHealthcare Thinktank Roundtable
Healthcare Thinktank RoundtableNick van Terheyden
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Data-driven Healthcare for Providers
Data-driven Healthcare for ProvidersData-driven Healthcare for Providers
Data-driven Healthcare for ProvidersLindaWatson19
 
Data driven Healthcare for Providers
Data driven Healthcare for ProvidersData driven Healthcare for Providers
Data driven Healthcare for ProvidersAmit Mishra
 
What Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice ModelsWhat Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice Modelsmjmcgaunn
 
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Erik Ginalick
 
Willowglade - Investment Brief 2016
Willowglade - Investment Brief  2016Willowglade - Investment Brief  2016
Willowglade - Investment Brief 2016capservegroup
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR SystemHal Amens
 

Similaire à Keynote (20)

2016 IBM Interconnect - medical devices transformation
2016 IBM Interconnect  - medical devices transformation2016 IBM Interconnect  - medical devices transformation
2016 IBM Interconnect - medical devices transformation
 
Sharing EHRs - The Canadian Experience
Sharing EHRs - The Canadian ExperienceSharing EHRs - The Canadian Experience
Sharing EHRs - The Canadian Experience
 
Introduction to EMR
Introduction to EMRIntroduction to EMR
Introduction to EMR
 
EMR Intro
EMR IntroEMR Intro
EMR Intro
 
How a healthcare management system (hms) is improving hospitals and clinics
How a healthcare management system (hms) is improving hospitals and clinicsHow a healthcare management system (hms) is improving hospitals and clinics
How a healthcare management system (hms) is improving hospitals and clinics
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Healthcare Thinktank Roundtable
Healthcare Thinktank RoundtableHealthcare Thinktank Roundtable
Healthcare Thinktank Roundtable
 
Kaiser Permanente HealthConnect - EHR and SNOMED
Kaiser Permanente HealthConnect - EHR and SNOMEDKaiser Permanente HealthConnect - EHR and SNOMED
Kaiser Permanente HealthConnect - EHR and SNOMED
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Data-driven Healthcare for Providers
Data-driven Healthcare for ProvidersData-driven Healthcare for Providers
Data-driven Healthcare for Providers
 
Data driven Healthcare for Providers
Data driven Healthcare for ProvidersData driven Healthcare for Providers
Data driven Healthcare for Providers
 
What Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice ModelsWhat Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice Models
 
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
 
Caredojo
CaredojoCaredojo
Caredojo
 
Caredojo
CaredojoCaredojo
Caredojo
 
Willowglade - Investment Brief 2016
Willowglade - Investment Brief  2016Willowglade - Investment Brief  2016
Willowglade - Investment Brief 2016
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR System
 
Risk management in Healthcare on Cloud
Risk management in Healthcare on CloudRisk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
 
Revenue Cycle Management
Revenue Cycle ManagementRevenue Cycle Management
Revenue Cycle Management
 
Insights success the 10 fastest growing healthcare solutions provider compani...
Insights success the 10 fastest growing healthcare solutions provider compani...Insights success the 10 fastest growing healthcare solutions provider compani...
Insights success the 10 fastest growing healthcare solutions provider compani...
 

Plus de Source Conference

iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on AndroidSource Conference
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICSource Conference
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsSource Conference
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesSource Conference
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecuritySource Conference
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration TestersSource Conference
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSource Conference
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSource Conference
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserSource Conference
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItSource Conference
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of AnonymousSource Conference
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Source Conference
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary plantingSource Conference
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudSource Conference
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?Source Conference
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawSource Conference
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendSource Conference
 

Plus de Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Keynote

  • 1. I Volunteered To Do This? Eric Cowperthwaite Providence Health & Services SOURCE Seattle, June 16, 2011
  • 2. About Providence 27 hospitals located in 5 states Over 160 other facilities, including Physician clinics, long term care, laboratories, billing & debt collection A health plan with over 400,000 members A liberal arts university, private high school, several daycares $8 billion in annual revenue and $9 billion in assets $500 million in annual community benefit 7200 acute and long term care beds More than 7 million primary care and acute outpatient visits Tier 2 PCI Merchant with more than 2 million annual transactions 40,000 end points (PC, laptop, tablet) and 5,000 servers Among the 5 largest Catholic Healthcare Systems in the nation Patient records on approx 10 million people on the west coast
  • 3. Tapes, laptops and viruses … Oh My Jan 1, 2006 – tapes containing data on more than 380,000 patients are stolen. Tapes are not encrypted Feb, 2006 – 3 laptops containing data on more than 1,000 patients are stolen. Laptops are not encrypted Mar, 2006 – a hospital goes to “downtime procedures” due to malware infections in 80% of PC’s and laptops. A/V software is 2 versions old and signatures out of date. Feb – Apr, 2006 – EDS SPPS conducts gap analysis, forensics, etc. and recommends to the Board the institution of a formal Information Security program, including hiring a security executive May 15, 2006 – Eric Cowperthwaite’s first day at Providence Jun – Sep, 2006 - HHS is onsite, investigating Providence actions and interviewing employees.
  • 4. Reflecting on being a CSO in a Crisis I was approached 3 times, third time a friend told me they were serious The Board and senior execs were serious Middle management viewed the crisis as a drain on budget and resources Going from crisis to sustained maturity is a 3 to 5 year journey Make darn sure that your soon to be new employer wants to solve their problem, even if they don’t know what it is yet Security staff has to be absolutely top notch, in both terms of hard and soft skills You have to be prepared for a lot of hard knocks and dynamically changing your plans and programs to adapt to reality
  • 5. Worst Imaginable Environment Every business unit is responsible for it’s own IT – 10 CIOs 80% of my employees are professionals, I have 40,000 college degrees to deal with Financial accountability is decentralized Healthcare is used to delivering locally Everything is viewed as negotiable
  • 6. Understanding the Business Failing to understand the needs of the business means a new CSO will lead them through the remainder of the crisis Lower healthcare costs Healthcare costs rising faster than inflation National political debate Massive pressure to “transform” healthcare Increased Quality Improve outcomes Reduce infections, injuries and mortality in hospitals Standardize healthcare so everyone gets the same quality of care Community Benefit – continuing to provide for the poor & vulnerable Managing operating expenses – Good stewardship of our resources
  • 7. What Did We Do? Established a formal Information Security program, with visibility all the way to the Board of Directors Created an executive position to lead that program, i.e. the CSO Reviewed and analyzed policy and standards Established a security controls framework Joint Commission for Accreditation of Healthcare Organizations PCI DSS HIPAA Security & Privacy Rules National Institute of Standards & Technology ISO 27001:2 Implemented new and improved security controls, for example: All at rest data encrypted on devices that are mobile (tapes, laptops, phones, etc) Data loss prevention Co-sourced security management controls (i.e. SIEM, firewalls, IDS/IPS)
  • 8. What Did Our Regulators Do? HHS received multiple complaints that we had violated the Privacy and Security rules Class Action lawsuit filed in Oregon All lawsuits were dismissed, including appeals by the plaintiffs We were very transparent with the OR & WA Attorney Generals No AG found that Providence had caused harm or broken state laws HHS and Providence signed a Resolution Agreement on 7/15/08 3 years, established specific control and reporting requirements No FTC Consent Decree Providence CISO established as Agreement Monitor $100,000 administrative fee Providence did not admit to a violation of HIPAA or other law or regulation
  • 9. Building Security Sustainability We started with Multiple point solutions Too many vendors Too much cost and not enough controls Managed by security Principles Fit for purpose Managed by appropriate IT operations organizations Reduce the number of vendors to manage Select vendors with suites or broad product offerings Reduce cost, both product acquisition and operations Governance vs. Operations Separate GRC, ITSec, InfoSec functions
  • 10. Next: Enterprise Risk Management Today we are building Enterprise Risk Management All security operations is managed within appropriate parts of the business Technical security controls are delivered by the CIO, not the CISO Line of business delivers administrative controls, education, awareness The CISO delivers Governance, Risk Management & Compliance Chief Risk Officer is independent of the business operations Reports to the Chair of the Board’s Audit Committee CISO, CPO, Insurance, Internal Audit, Compliance all report to the CRO We started this path about 9 months ago Already we are seeing far higher business engagement
  • 11. That’s The End Questions? I’ll answer the ones I can