SlideShare a Scribd company logo
1 of 44
Download to read offline
IT governance and monitoring of operational
         and legal risks in hospitals
                     Mr. William Grollier,
                IT Systems & Security Officer,
       CHU (University Hospital Center) - Nice, France.
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Nice CHU in a nutshell




 22 departments
 5 hospitals
 1.700 beds
 ~60.000 patients hospitalized per year, ~180.000 visits
  per year
 8.000 employees
 240 servers and 3700 workstations running 100
  healthcare applications
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Founding principles behind IT governance
  and risks management

              • The legal risk is the consequence of operational risk
  Legal




              • The operational risk is more and more induced by IT risks
Operational


              • IT risks strongly relate to:
                • The availability and the performance of IT systems
                • The integrity and the confidentiality of data
    IT
                • The compliance with IT standards and policies
• Legal obligations
                                             Legal Risk
                                                          • Hospital Authority
                                                            responsibilities
                                                          • Financial impact




                                  Ops Risk

•   Services interoperability
•   Diagnostic reliability
•   Data corruption and leakage
•   Procedures Efficiency                                 IT Risk

                        • Poorly managed H/W, S/W infrastructure
                        • Weak protection and non compliant
                          behaviors
                        • Heterogeneity of HC applications
                        • HC IT services unavailability
Poorly managed H/W S/W infrastructure

  IT impact                   Operational                 Management
                                Impact                      Impact



•Waste of time             •Non interoperability        •Poor ROI of existing
                                                        infrastructure
•Complexity                •Poor QoS
                                                        •Additional
•Disruption due to                                      management costs
unwanted applications




    Requirement :
              Continuously monitor the PC standardization compliance
Weak protection and non compliant behaviors

 IT impact                    Operational                   Management
                                Impact                        Impact


•Disruption                  •Data                         •Penal impact
                                 •Corrupted
•Time wasted                     •Loss                     •Reputation
                                 •Cannot be accessed
•Repair cost                     or updated                •Financial loss

                             •Information leakage



   Requirement :
               Continuously monitor the security policy compliance
Heterogeneity of the HC applications
                                                              Management
    IT impact                  Operational                      Impact
                                 Impact


•Expensive maintenance        • Non interoperable         •   Penal responsibility
                              versions
•Application malfunctioning                               •   Reputation
                              •Data corruption
•QoS degradation                                          •   Cost and poor ROI
                              •Wrong diagnostics




      Requirement :
               Continuously monitor the HC applications compliance level
HC IT service unavailability

                                 Operational                Management
   IT impact
                                   Impact                     Impact


•Malfunctioning              •   Data unavailable         •Penal consequences
applications
                             •   Unaccessible images      •Reputation
•Poor availaility and
performnance                 •   Corrupted diagnostic     •Poor ROI

•Saturated bandwidth         •   Systems inefficiency



     Requirement :
               Continuously monitor the Quality of Services and users impact
Approach



    90% of
   incidents
 have internal   20% of basic good
     origin       practices resolve
                     80% of the        Security and Qos
                     problems            are a matter of
                                      proper governance,
                                       competences and
                                         taking control
                                      rather than a matter
                                            of means
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
IT governance monitoring @ work




               PC standardization compliance


                Security policy effectiveness



              HC applications compliance level



             Quality of Service and user support
Well managed H/W S/W infrastructure
          PC standardization compliance monitoring
Well managed H/W S/W infrastructure
          PC standardization compliance monitoring
Well managed H/W S/W infrastructure
          PC standardization compliance monitoring
Well managed H/W S/W infrastructure
          PC standardization compliance monitoring
Strong protection and compliant behaviors
         Security policy compliance and effectiveness monitoring
Strong protection and compliant behaviors
         Security policy compliance and effectiveness monitoring
Strong protection and compliant behaviors
         Security policy compliance and effectiveness monitoring
Shared or stolen user code identification (1/3)

         Security policy compliance and effectiveness monitoring
User codes connected on several machines
over a period of 30 minutes (2/3)
Security policy compliance and effectiveness monitoring
User codes connected simultaneously on
                                 several machines (3/3)
Security policy compliance and effectiveness monitoring
HC IT services availability

               Quality of Service monitoring
HC IT services availability

               Quality of Service monitoring
HC IT services availability

               Quality of Service monitoring
HC IT services availability

               Quality of Service monitoring
HC IT services availability

               Quality of Service monitoring
HC IT Services Support
Dynamic workstation monitoring
Troubleshoting (1/3)
Dynamic workstation monitoring
Troubelshooting (2/3)
Dynamic workstation monitoring
Troubleshooting (3/3)




         Program installed at 6:00 AM - New binary detected
Suspicious exe searches - query
Identified binaries executed over a period
of time (retrieve Hash codes from library)
Comparing binaries’s signature using
NEXThink library
Detection of system32.exe, Version 0.0.0.0, Ran
from a USB
Monitoring IT risks governance
drastically reduces ops and legal risks

Legal
• The legal risk is the consequence of
  operational risk



     Operational
     • The operational risk is more and more
       induced by IT risk



           IT risks
           • Availability and the performance of IT systems
           • Integrity and the confidentiality of data
           • Compliance with IT standards and policy
HC IT Services Governance Life Cycle




   Assess gap          Execute
                                          Monitor to
     against         and Monitor
                                          Maintain on
   target and         progress to
                                            target
   plan action       reach target



         •Risk Detection and Security Compliance
        •World class Quality of Service and Support
       •Cost effective HC infrastructure maintenance
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Solution benefits

       IT
              Cost of ownership: super fast deployment, lightweight, zero coding
              Non intrusive, zero infrastructure performance impact
              360°IT governance in one unified environment
              On Demand diagnosis
              OOTB, Investigation, Reporting, Alerting, Library
              Extensible to backend monitoring solutions

       Operations and Management
              G.R.C.: desktop configuration and usage compliance
              World class support / user satisfaction
              360°view over the QoS / impact analyses in real time
              Financial: infrastructure rationalization based on real usage
              Consistent PMSI repo*

* http://fr.wikipedia.org/wiki/Programme_de_m%C3%A9dicalisation_des_syst%C3%A8mes_d%27information
Agenda

 CHU-Nice in a nutshell
 IT governance and risks management principles
 IT governance monitoring initiatives @ work
 Solution benefits
 Deployment phases and next steps
Project phases

 End point Assessment Baseline (evaluation)
    Installation and deployment: 1 day
    Information collection: 3 weeks without work
    Configuration: 2 days

 Full deployment
    New dashboards creation and deployment
    Reporting and alerting

 NEXT Steps
    New dashboards, reports, alerts
    Integration to backend monitoring platforms to enable end-to-end
     monitoring
Thank you!


Contact:
Francois D’Haegeleer
francois.dhaegeleer@nexthink.com
+33 6 14 10 04 91

More Related Content

What's hot

3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementEnergySec
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.IGN MANTRA
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance EnergyTech2015
 
NCI Network Engineering
NCI Network EngineeringNCI Network Engineering
NCI Network EngineeringChris Young
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseAnton Chuvakin
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesJohn Gilligan
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable SolarWinds
 
Dependable Operations
Dependable OperationsDependable Operations
Dependable OperationsLiming Zhu
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...AlienVault
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton ResumeJesse Hinton
 

What's hot (20)

3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Rapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk ManagementRapid Risk Assessment: A New Approach to Risk Management
Rapid Risk Assessment: A New Approach to Risk Management
 
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
ISO 27001 2013 Introduction Study Case IGN Mantra, 2nd Day, 3rd Session.
 
8. operations security
8. operations security8. operations security
8. operations security
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance Irv Badr: Managing Risk Safety and Security Compliance
Irv Badr: Managing Risk Safety and Security Compliance
 
NCI Network Engineering
NCI Network EngineeringNCI Network Engineering
NCI Network Engineering
 
FIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident ResponseFIRST 2006 Full-day Tutorial on Logs for Incident Response
FIRST 2006 Full-day Tutorial on Logs for Incident Response
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
SIG-NOC Tools Survey 2015
SIG-NOC Tools Survey 2015SIG-NOC Tools Survey 2015
SIG-NOC Tools Survey 2015
 
Cybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best PracticesCybersecurity: Challenges, Initiatives, and Best Practices
Cybersecurity: Challenges, Initiatives, and Best Practices
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable
 
Dependable Operations
Dependable OperationsDependable Operations
Dependable Operations
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera... SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
 
Muneer Balqadi
Muneer BalqadiMuneer Balqadi
Muneer Balqadi
 
Jesse Hinton Resume
Jesse Hinton ResumeJesse Hinton Resume
Jesse Hinton Resume
 
6 Physical Security
6 Physical Security6 Physical Security
6 Physical Security
 

Viewers also liked

Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...Heather Leson
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy ProgramSamir Pawaskar
 
LEPC: Social media and disasters
LEPC: Social media and disastersLEPC: Social media and disasters
LEPC: Social media and disastersDuty Officer
 
Disasters and Management
Disasters and ManagementDisasters and Management
Disasters and ManagementNancy Schwartz
 
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...Reynaldo Joson
 
M Cartner: Mass Casualties and Real Disasters
M Cartner: Mass Casualties and Real DisastersM Cartner: Mass Casualties and Real Disasters
M Cartner: Mass Casualties and Real DisastersSMACC Conference
 
Leadership At Times Of Crises
Leadership At Times Of CrisesLeadership At Times Of Crises
Leadership At Times Of CrisesReginaPhelps
 
Gerard Fennessy: Anaphylaxis - the dying breaths
Gerard Fennessy: Anaphylaxis - the dying breathsGerard Fennessy: Anaphylaxis - the dying breaths
Gerard Fennessy: Anaphylaxis - the dying breathsSMACC Conference
 
Disaster management in india
Disaster management in indiaDisaster management in india
Disaster management in indiaNikhil Gaikwad
 
Disaster Management Initiatives in India
Disaster Management Initiatives in IndiaDisaster Management Initiatives in India
Disaster Management Initiatives in IndiaALNAP
 
Disaster management
Disaster managementDisaster management
Disaster managementSCGH ED CME
 
Evolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterEvolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterNicholas Kman, MD, FACEP
 
Principles of disaster management
Principles of disaster managementPrinciples of disaster management
Principles of disaster managementSCGH ED CME
 
Disaster management principles
Disaster management principlesDisaster management principles
Disaster management principlesSCGH ED CME
 
Disaster Management and Health
Disaster Management and HealthDisaster Management and Health
Disaster Management and HealthAswin KP
 

Viewers also liked (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
Social Media and New Technologies - Qatar Red Crescent Society Disaster Manag...
 
Qatar's NIA Policy Program
Qatar's NIA Policy ProgramQatar's NIA Policy Program
Qatar's NIA Policy Program
 
Building a Citizen Engaged Research Project
Building a Citizen Engaged Research ProjectBuilding a Citizen Engaged Research Project
Building a Citizen Engaged Research Project
 
LEPC: Social media and disasters
LEPC: Social media and disastersLEPC: Social media and disasters
LEPC: Social media and disasters
 
Disasters and Management
Disasters and ManagementDisasters and Management
Disasters and Management
 
15db dm
15db dm15db dm
15db dm
 
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
National Training on Safe Hospitals - Sri Lanka - Module 1 Session 2 - 14Sept...
 
M Cartner: Mass Casualties and Real Disasters
M Cartner: Mass Casualties and Real DisastersM Cartner: Mass Casualties and Real Disasters
M Cartner: Mass Casualties and Real Disasters
 
Leadership At Times Of Crises
Leadership At Times Of CrisesLeadership At Times Of Crises
Leadership At Times Of Crises
 
Gerard Fennessy: Anaphylaxis - the dying breaths
Gerard Fennessy: Anaphylaxis - the dying breathsGerard Fennessy: Anaphylaxis - the dying breaths
Gerard Fennessy: Anaphylaxis - the dying breaths
 
Policy and Insititutional Arrangement for Disaster Management
Policy and Insititutional Arrangement for Disaster ManagementPolicy and Insititutional Arrangement for Disaster Management
Policy and Insititutional Arrangement for Disaster Management
 
Disaster management in india
Disaster management in indiaDisaster management in india
Disaster management in india
 
Disaster Management Initiatives in India
Disaster Management Initiatives in IndiaDisaster Management Initiatives in India
Disaster Management Initiatives in India
 
Disaster management
Disaster managementDisaster management
Disaster management
 
Evolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterEvolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disaster
 
Principles of disaster management
Principles of disaster managementPrinciples of disaster management
Principles of disaster management
 
Disaster management principles
Disaster management principlesDisaster management principles
Disaster management principles
 
Disaster Management and Health
Disaster Management and HealthDisaster Management and Health
Disaster Management and Health
 
Environmental Disasters
Environmental DisastersEnvironmental Disasters
Environmental Disasters
 

Similar to William Grollier - CHU Nice - IT Governance in hospitals

Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems Jeffrey Paulette
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfNaveenKumar470500
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Schneider Electric
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudVISI
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital servicesNetDef
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanjiFeisal Nanji
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsPrecisely
 

Similar to William Grollier - CHU Nice - IT Governance in hospitals (20)

Internal Controls Over Information Systems
Internal Controls Over Information Systems Internal Controls Over Information Systems
Internal Controls Over Information Systems
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
Moving Enterprise Applications to the Cloud
Moving Enterprise Applications to the CloudMoving Enterprise Applications to the Cloud
Moving Enterprise Applications to the Cloud
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital services
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Himss 2011 securing health information in the cloud -- feisal nanji
Himss 2011    securing health information in the cloud -- feisal nanjiHimss 2011    securing health information in the cloud -- feisal nanji
Himss 2011 securing health information in the cloud -- feisal nanji
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Accelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i SystemsAccelerating Regulatory Compliance for IBM i Systems
Accelerating Regulatory Compliance for IBM i Systems
 
Pci Req
Pci ReqPci Req
Pci Req
 

More from Roald Sieberath

Présentation MediPath fr
Présentation MediPath frPrésentation MediPath fr
Présentation MediPath frRoald Sieberath
 
Cetic table ronde WeHealth-27042011
Cetic table ronde WeHealth-27042011Cetic table ronde WeHealth-27042011
Cetic table ronde WeHealth-27042011Roald Sieberath
 
Table ronde WeHealth Introduction
Table ronde WeHealth IntroductionTable ronde WeHealth Introduction
Table ronde WeHealth IntroductionRoald Sieberath
 
smart solutions healthcare MIC
smart solutions healthcare MICsmart solutions healthcare MIC
smart solutions healthcare MICRoald Sieberath
 
Cetic opportunites eHealth MIC
Cetic opportunites eHealth MICCetic opportunites eHealth MIC
Cetic opportunites eHealth MICRoald Sieberath
 
Cloud and health white paper
Cloud and health white paperCloud and health white paper
Cloud and health white paperRoald Sieberath
 
Laurens Touwen - Zorg Binnen Bereik
Laurens Touwen -  Zorg Binnen BereikLaurens Touwen -  Zorg Binnen Bereik
Laurens Touwen - Zorg Binnen BereikRoald Sieberath
 
Jan de Sitter - IT & health care delivery
Jan de Sitter - IT & health care deliveryJan de Sitter - IT & health care delivery
Jan de Sitter - IT & health care deliveryRoald Sieberath
 
Gilberte Deltour - home nurse experience
Gilberte Deltour -  home nurse experienceGilberte Deltour -  home nurse experience
Gilberte Deltour - home nurse experienceRoald Sieberath
 
Frank Robben - e-health platform
Frank Robben - e-health platformFrank Robben - e-health platform
Frank Robben - e-health platformRoald Sieberath
 
Trevor Single - Telecare & Telehealth in the UK
Trevor Single - Telecare & Telehealth in the UKTrevor Single - Telecare & Telehealth in the UK
Trevor Single - Telecare & Telehealth in the UKRoald Sieberath
 
Jan Van Emelen - MLOZ e-health
Jan Van Emelen - MLOZ e-healthJan Van Emelen - MLOZ e-health
Jan Van Emelen - MLOZ e-healthRoald Sieberath
 
Dirk De Wachter - how to feel more at home even in hospital
Dirk De Wachter - how to feel more at home even in hospitalDirk De Wachter - how to feel more at home even in hospital
Dirk De Wachter - how to feel more at home even in hospitalRoald Sieberath
 
WeHealth - bourse à projets
WeHealth - bourse à projetsWeHealth - bourse à projets
WeHealth - bourse à projetsRoald Sieberath
 

More from Roald Sieberath (15)

Presentation Polymedis
Presentation PolymedisPresentation Polymedis
Presentation Polymedis
 
Présentation MediPath fr
Présentation MediPath frPrésentation MediPath fr
Présentation MediPath fr
 
Cetic table ronde WeHealth-27042011
Cetic table ronde WeHealth-27042011Cetic table ronde WeHealth-27042011
Cetic table ronde WeHealth-27042011
 
Table ronde WeHealth Introduction
Table ronde WeHealth IntroductionTable ronde WeHealth Introduction
Table ronde WeHealth Introduction
 
smart solutions healthcare MIC
smart solutions healthcare MICsmart solutions healthcare MIC
smart solutions healthcare MIC
 
Cetic opportunites eHealth MIC
Cetic opportunites eHealth MICCetic opportunites eHealth MIC
Cetic opportunites eHealth MIC
 
Cloud and health white paper
Cloud and health white paperCloud and health white paper
Cloud and health white paper
 
Laurens Touwen - Zorg Binnen Bereik
Laurens Touwen -  Zorg Binnen BereikLaurens Touwen -  Zorg Binnen Bereik
Laurens Touwen - Zorg Binnen Bereik
 
Jan de Sitter - IT & health care delivery
Jan de Sitter - IT & health care deliveryJan de Sitter - IT & health care delivery
Jan de Sitter - IT & health care delivery
 
Gilberte Deltour - home nurse experience
Gilberte Deltour -  home nurse experienceGilberte Deltour -  home nurse experience
Gilberte Deltour - home nurse experience
 
Frank Robben - e-health platform
Frank Robben - e-health platformFrank Robben - e-health platform
Frank Robben - e-health platform
 
Trevor Single - Telecare & Telehealth in the UK
Trevor Single - Telecare & Telehealth in the UKTrevor Single - Telecare & Telehealth in the UK
Trevor Single - Telecare & Telehealth in the UK
 
Jan Van Emelen - MLOZ e-health
Jan Van Emelen - MLOZ e-healthJan Van Emelen - MLOZ e-health
Jan Van Emelen - MLOZ e-health
 
Dirk De Wachter - how to feel more at home even in hospital
Dirk De Wachter - how to feel more at home even in hospitalDirk De Wachter - how to feel more at home even in hospital
Dirk De Wachter - how to feel more at home even in hospital
 
WeHealth - bourse à projets
WeHealth - bourse à projetsWeHealth - bourse à projets
WeHealth - bourse à projets
 

Recently uploaded

Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...narwatsonia7
 
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceNehru place Escorts
 
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000aliya bhat
 
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service MumbaiVIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...Miss joya
 
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...Miss joya
 
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️saminamagar
 
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersBook Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersnarwatsonia7
 
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safenarwatsonia7
 
Call Girls Thane Just Call 9910780858 Get High Class Call Girls Service
Call Girls Thane Just Call 9910780858 Get High Class Call Girls ServiceCall Girls Thane Just Call 9910780858 Get High Class Call Girls Service
Call Girls Thane Just Call 9910780858 Get High Class Call Girls Servicesonalikaur4
 
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Miss joya
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfMedicoseAcademics
 
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...narwatsonia7
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaPooja Gupta
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 

Recently uploaded (20)

sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Servicesauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
 
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
Russian Call Girl Brookfield - 7001305949 Escorts Service 50% Off with Cash O...
 
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort ServiceCollege Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
College Call Girls Vyasarpadi Whatsapp 7001305949 Independent Escort Service
 
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
 
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service MumbaiVIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
VIP Call Girls Mumbai Arpita 9910780858 Independent Escort Service Mumbai
 
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
Call Girls ITPL Just Call 7001305949 Top Class Call Girl Service Available
 
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
 
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
 
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️call girls in munirka  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
call girls in munirka DELHI 🔝 >༒9540349809 🔝 genuine Escort Service 🔝✔️✔️
 
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbersBook Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
Book Call Girls in Kasavanahalli - 7001305949 with real photos and phone numbers
 
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
 
Call Girls Thane Just Call 9910780858 Get High Class Call Girls Service
Call Girls Thane Just Call 9910780858 Get High Class Call Girls ServiceCall Girls Thane Just Call 9910780858 Get High Class Call Girls Service
Call Girls Thane Just Call 9910780858 Get High Class Call Girls Service
 
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jayanagar Just Call 7001305949 Top Class Call Girl Service Available
 
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
 
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdfHemostasis Physiology and Clinical correlations by Dr Faiza.pdf
Hemostasis Physiology and Clinical correlations by Dr Faiza.pdf
 
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
 

William Grollier - CHU Nice - IT Governance in hospitals

  • 1. IT governance and monitoring of operational and legal risks in hospitals Mr. William Grollier, IT Systems & Security Officer, CHU (University Hospital Center) - Nice, France.
  • 2. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 3. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 4. Nice CHU in a nutshell  22 departments  5 hospitals  1.700 beds  ~60.000 patients hospitalized per year, ~180.000 visits per year  8.000 employees  240 servers and 3700 workstations running 100 healthcare applications
  • 5. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 6. Founding principles behind IT governance and risks management • The legal risk is the consequence of operational risk Legal • The operational risk is more and more induced by IT risks Operational • IT risks strongly relate to: • The availability and the performance of IT systems • The integrity and the confidentiality of data IT • The compliance with IT standards and policies
  • 7. • Legal obligations Legal Risk • Hospital Authority responsibilities • Financial impact Ops Risk • Services interoperability • Diagnostic reliability • Data corruption and leakage • Procedures Efficiency IT Risk • Poorly managed H/W, S/W infrastructure • Weak protection and non compliant behaviors • Heterogeneity of HC applications • HC IT services unavailability
  • 8. Poorly managed H/W S/W infrastructure IT impact Operational Management Impact Impact •Waste of time •Non interoperability •Poor ROI of existing infrastructure •Complexity •Poor QoS •Additional •Disruption due to management costs unwanted applications Requirement : Continuously monitor the PC standardization compliance
  • 9. Weak protection and non compliant behaviors IT impact Operational Management Impact Impact •Disruption •Data •Penal impact •Corrupted •Time wasted •Loss •Reputation •Cannot be accessed •Repair cost or updated •Financial loss •Information leakage Requirement : Continuously monitor the security policy compliance
  • 10. Heterogeneity of the HC applications Management IT impact Operational Impact Impact •Expensive maintenance • Non interoperable • Penal responsibility versions •Application malfunctioning • Reputation •Data corruption •QoS degradation • Cost and poor ROI •Wrong diagnostics Requirement : Continuously monitor the HC applications compliance level
  • 11. HC IT service unavailability Operational Management IT impact Impact Impact •Malfunctioning • Data unavailable •Penal consequences applications • Unaccessible images •Reputation •Poor availaility and performnance • Corrupted diagnostic •Poor ROI •Saturated bandwidth • Systems inefficiency Requirement : Continuously monitor the Quality of Services and users impact
  • 12. Approach 90% of incidents have internal 20% of basic good origin practices resolve 80% of the Security and Qos problems are a matter of proper governance, competences and taking control rather than a matter of means
  • 13. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 14. IT governance monitoring @ work PC standardization compliance Security policy effectiveness HC applications compliance level Quality of Service and user support
  • 15. Well managed H/W S/W infrastructure PC standardization compliance monitoring
  • 16. Well managed H/W S/W infrastructure PC standardization compliance monitoring
  • 17. Well managed H/W S/W infrastructure PC standardization compliance monitoring
  • 18. Well managed H/W S/W infrastructure PC standardization compliance monitoring
  • 19. Strong protection and compliant behaviors Security policy compliance and effectiveness monitoring
  • 20. Strong protection and compliant behaviors Security policy compliance and effectiveness monitoring
  • 21. Strong protection and compliant behaviors Security policy compliance and effectiveness monitoring
  • 22. Shared or stolen user code identification (1/3) Security policy compliance and effectiveness monitoring
  • 23. User codes connected on several machines over a period of 30 minutes (2/3) Security policy compliance and effectiveness monitoring
  • 24. User codes connected simultaneously on several machines (3/3) Security policy compliance and effectiveness monitoring
  • 25. HC IT services availability Quality of Service monitoring
  • 26. HC IT services availability Quality of Service monitoring
  • 27. HC IT services availability Quality of Service monitoring
  • 28. HC IT services availability Quality of Service monitoring
  • 29. HC IT services availability Quality of Service monitoring
  • 30. HC IT Services Support
  • 33. Dynamic workstation monitoring Troubleshooting (3/3) Program installed at 6:00 AM - New binary detected
  • 35. Identified binaries executed over a period of time (retrieve Hash codes from library)
  • 36. Comparing binaries’s signature using NEXThink library
  • 37. Detection of system32.exe, Version 0.0.0.0, Ran from a USB
  • 38. Monitoring IT risks governance drastically reduces ops and legal risks Legal • The legal risk is the consequence of operational risk Operational • The operational risk is more and more induced by IT risk IT risks • Availability and the performance of IT systems • Integrity and the confidentiality of data • Compliance with IT standards and policy
  • 39. HC IT Services Governance Life Cycle Assess gap Execute Monitor to against and Monitor Maintain on target and progress to target plan action reach target •Risk Detection and Security Compliance •World class Quality of Service and Support •Cost effective HC infrastructure maintenance
  • 40. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 41. Solution benefits  IT  Cost of ownership: super fast deployment, lightweight, zero coding  Non intrusive, zero infrastructure performance impact  360°IT governance in one unified environment  On Demand diagnosis  OOTB, Investigation, Reporting, Alerting, Library  Extensible to backend monitoring solutions  Operations and Management  G.R.C.: desktop configuration and usage compliance  World class support / user satisfaction  360°view over the QoS / impact analyses in real time  Financial: infrastructure rationalization based on real usage  Consistent PMSI repo* * http://fr.wikipedia.org/wiki/Programme_de_m%C3%A9dicalisation_des_syst%C3%A8mes_d%27information
  • 42. Agenda  CHU-Nice in a nutshell  IT governance and risks management principles  IT governance monitoring initiatives @ work  Solution benefits  Deployment phases and next steps
  • 43. Project phases  End point Assessment Baseline (evaluation)  Installation and deployment: 1 day  Information collection: 3 weeks without work  Configuration: 2 days  Full deployment  New dashboards creation and deployment  Reporting and alerting  NEXT Steps  New dashboards, reports, alerts  Integration to backend monitoring platforms to enable end-to-end monitoring