Data Loss Prevention and HIPAA. Kit Robinson Director kit.robinson@vontu.com



Similar documents
Symantec DLP Overview. Jonathan Jesse ITS Partners

HIPAA and HITECH Compliance for Cloud Applications

The Impact of HIPAA and HITECH

HIPAA 101. March 18, 2015 Webinar

SecurityMetrics Business Associate HIPAA compliance program

HIPAA In The Workplace. What Every Employee Should Know and Remember


Information Security Program CHARTER

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

My Docs Online HIPAA Compliance

Sustainable Compliance: A System for Ongoing Audit Readiness

Business Associate Management Methodology

Web Protection for Your Business, Customers and Data

HCCA Compliance Institute 2013 Privacy & Security

Sendmail and PostX: Simplifying HIPAA Compliance. Providing healthcare organizations with secure outbound, inbound and internal

ALERT LOGIC FOR HIPAA COMPLIANCE

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Protecting Personal Information: The Massachusetts Data Security Regulation (201 CMR 17.00)

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Overview of the HIPAA Security Rule

INFORMATION PROTECTION

HIPAA Happenings in Hospital Systems. Donna J Brock, RHIT System HIM Audit & Privacy Coordinator

Getting Hip to the HIPAA and HITECH Act Compliance

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

HIPAA Overview. Darren Skyles, Partner McGinnis Lochridge. Darren S. Skyles

Privacy Legislation and Industry Security Standards

Best Practices for Choosing a Content Control Solution

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Compliance Management, made easy

Violation Become a Privacy Breach? Agenda

HIPAA Audits: How to Be Prepared. Lindsey Wiley, MHA, CHTS-IM, CHTS-TS HIT Manager Oklahoma Foundation for Medical Quality

HIPAA Audits Are Here!

Reputation Management Surviving a HIPAA Breach or Audit

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Vulnerability Management Policy

Keeping watch over your best business interests.

Achieving Regulatory Compliance through Security Information Management

Identifying Broken Business Processes

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Best Practices in Data Protection Survey of U.S. IT & IT Security Practitioners

Tools to Prepare and Protect Your Practice for HIPAA and Meaningful Use Audits

Understanding and Selecting a DLP Solution. Rich Mogull Securosis

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

INFORMATION SECURITY & HIPAA COMPLIANCE MPCA

How-To Guide: Cyber Security. Content Provided by

Pristine Technology Solutions, Inc.

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Health Insurance Portability and Accountability Act (HIPAA) Compliance Training

Metropolitan Living, LLC 151 W. Burnsville Parkway, Suite 101 Burnsville, MN Ph: (952) Fax: (651)

Our Commitment to Information Security

STANDARD ADMINISTRATIVE PROCEDURE

HIPAA/HITECH Privacy and Security for Long Term Care. Association of Jewish Aging Services 1

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Welcome to ChiroCare s Fourth Annual Fall Business Summit. October 3, 2013

HIPAA and Privacy Policy Training

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

Outbound Security and Content Compliance in Today s Enterprise, 2005

Use & Disclosure of Protected Health Information by Business Associates

PROGRAM TO PREVENT, DETECT & MITIGATE IDENTITY THEFT

HIPAA Security Rule Changes and Impacts

Northern Illinois Health Insurance Program HIPAA NOTICE OF PRIVACY PRACTICES PLEASE READ CAREFULLY

HIPAA Compliance Issues and Mobile App Design

Identity Theft Security and Compliance: Issues for Business

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

How to prepare your organization for an OCR HIPAA audit

Data Leakage: What You Need to Know

HIT Audit Workshop. Jeffrey W. Short.

Data Loss Prevention. Keeping sensitive data out of the wrong hands*

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Best Practices for DLP Implementation in Healthcare Organizations

HIPAA: Privacy/Info Security

Page 1. NAOP HIPAA and Privacy Risks 3/11/2014. Privacy means being able to have control over how your information is collected, used, or shared;

what your business needs to do about the new HIPAA rules

INDIANA UNIVERSITY SCHOOL OF OPTOMETRY HIPAA COMPLIANCE PLAN TABLE OF CONTENTS. I. Introduction 2. II. Definitions 3

BREVIUM HIPAA BUSINESS ASSOCIATE TERMS AND CONDITIONS

IT Security & Compliance. On Time. On Budget. On Demand.

Health Information Privacy Refresher Training. March 2013

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

787 Wye Road, Akron, Ohio P F

Breach Notification Policy

Building a Security Program that Protects an Organizations Most Critical Assets

Christine M. Frye, CIPP/US, CIPM, Chief Privacy Officer, Bank of America

HIPAA Privacy & Breach Notification Training for System Administration Business Associates

Somansa Data Security and Regulatory Compliance for Healthcare

ZixCorp Lexicons. An Overview

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

plantemoran.com What School Personnel Administrators Need to know

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

How to Lead the People in a Program Based Environment

HiSoftware Policy Sheriff. SP HiSoftware Security Sheriff SP. Content-aware. Compliance and Security Solutions for. Microsoft SharePoint

Reining In SharePoint

NOTICE OF PRIVACY PRACTICES FOR PURDUE UNIVERSITY HEALTH PLANS

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Transcription:

Data Loss Prevention and HIPAA Kit Robinson Director kit.robinson@vontu.com

ID Theft Tops FTC's List of Complaints For the 5 th straight year, identity theft ranked 1 st of all fraud complaints. 10 million cases of Identity Theft annually. 59 percent of companies have detected some internal abuse of their networks

Changing Threats to Data Security

Top 10 Most Frequent Incidents 1. Patient PHI sent to partner, again, and again 2. Employee 401k information sent outbound and inbound 3. Payroll data being sent to home email address 4. Draft press release to outside legal council 5. Financial and M&A postings to message boards 6. Source code sent with resume to competitor 7. SSNs and thousands of them 8. Credit Card or account numbers.and thousands of them 9. Confidential patient information 10. Internal memos and confidential information

Data Loss Prevention Three Key Customer Challenges 1. Where is my confidential data stored? Data at Rest 2. Where is my confidential data going? Data in Motion 3. How do I fix my data loss problems? Data Policy Enforcement

Why Data Loss Prevention is a Priority Compliance Brand and Reputation Protection Remediation Cost The Risk 1:400 messages contain confidential information 1:50 network files are wrongly exposed

American National Insurance Company Fortune 583 Market Cap $3.25B Revenue $2.9B Employees 4,200 Industry: Insurance Vontu Solution 1. Monitor 2. Prevent Business Drivers Protect policy holder information Protect employees PHI Layered approach with email encryption HIPAA Compliance Why Vontu Was Selected Ability to prevent policy breaches Integration with PGP encryption American National Insurance Results Monitor all protocols Prevention activated with PGP within two months Automated enforcement Encrypt all emails with employee or patient information

American Association of Retired Persons Business Drivers Protect membership information Fortune 583 Market Cap $3.25B Revenue $2.9B Employees 2,670 Vontu Solution 1. Monitor 2. Prevent Protect Social Security Numbers Protect credit card numbers and PCI compliance Protect confidential documents Why Vontu Was Selected Ability to block/quarantine messages degree of accuracy Ability to delegate incident response to business units AARP Results Secure partner communications Efficiency in investigations Updating insecure business processes

Enforce Policies to Reduce Risk Enforcement Levels 100 1. Remediation 2. Notification 80 3. Prevention and Protection 60 How is Risk Reduced? Incidents 40 Fix broken processes Educate workforce Notify policy violators 20 Notify management Protect files Prevent incidents 0 Baseline Remediation Notification Prevention & Protection

Unified Data At Rest and Data in Motion Protection Intellectual Property Source Code Design Documents Patent Applications Patient Data Social Security Numbers Non-Public Information Credit Card Numbers Employee Data Social Security Numbers Employee Contact Lists 401K and Benefits Info Corporate Data Financials Merger & Acquisitions Strategy and Planning

Discover and Protect Confidential Data at Rest Define Confidential Data Policy Run Scan and Discover Exposed Data Enforce Policy by Automatically Protecting Files Remediate Incidents Report on Risk and Compliance 1 2 3 4 5

Monitor and Prevent Confidential Data in Motion Employee Sends Confidential Data Vontu Detects or Prevents Incident Vontu Notifies Employee Vontu Workflow Automates Remediation Report on Risk and Compliance 1 2 3 4 5

Secure Messaging Solution SENSITIVE Employee sends confidential data Vontu detects incidents Vontu tags email message PGP automatically encrypts tagged messages Report on Risk and Compliance 1 2 3 4 5

Vontu covers HIPAA Health Insurance Portability & Accountability Act 1996 Individually Identifiable Health Information Identifies the individual AND Past, present, or future physical or mental health or condition of an individual OR The provision of health care to an individual OR The past, present, or future payment for the provision of health care to an individual NOT Communications with Treatment, Payment, Operations (TPO) partners Vontu HIPAA Policy How Vontu Detects HIPAA 1. Exact Patient Data Social Security Numbers Health Insurance Card Numbers First Name, Last Name Address & Phone Numbers WITH 2. Drug, Disease, Treatments Medical Disease Keywords Medical Treatment Keywords Drug Keywords EXCEPT 3. Specific TPO Partners

Healthcare Solution Pack Solution Pack Healthcare Data Loss Priorities & Policy Compliance Regulations (HIPAA) M&A language Patient & Employee Data Account info Personal info Enrollment info Employee benefit info Pharmacy info Insurance Claim info Confidential Data Rate Calculators Financial info M&A info General confidential docs Roles & Responsibilities Security Services Responder Front line for remediation Fan-out to extended remediation team Security Services Manager Escalations within the Security Services Compliance Officers Compliance & incident trends Risk scorecards Internal Auditors Compliance & incident trends Risk scorecards HR/Employee Relations Incidents that lead to employee termination Legal/Privacy Officers Investigate incidents to mitigate legal actions Compliance & incident trends Risk scorecards Investigations & Forensics Focused investigation on specific employees Business Unit Managers Corporate involvement on escalated incidents Executives (trends & dashboards) Risk trends and performance metrics Risk dashboards

Data Loss Prevention Requirements Discover and Protect Confidential Data at Rest Monitor and Prevent Confidential Data in Motion Accurate Detection Across All Content and Groups Automate Enforcement and Response Workflow Encryption Visibility and Control Safeguard Employee Privacy Proven Global Scale and Architecture

Self-Risk Assessment 1. How many emails leave your company with PHI? 2. Who is sending the confidential information? 3. What are your most offensive protocols? 4. How many of these emails violated a regulation? 5. What is your risk level compared to that of peer companies or competitors?

Risk Assessment Scorecard Priority Data Severity of Loss Data at Rest Data in Motion Frequency Risk Frequency Risk HIPAA 721 incidents Very 256 incidents Very Patient Data 10,178 incidents Very 2178 incidents Very Physician Referral Very 78 incidents Very Medium 9 incidents Medium CA 1386 Medium 939 incidents Medium 132 incidents Research 624 incidents 24 incidents Severity x Frequency = Risk

Data Loss Prevention In Summary Reduce Risk of Data Loss Reduce Financial Loss Protect Brand and Reputation Demonstrate Compliance Vontu met all our requirements to meet the highest degree of compliance with both our own data security policies and state and federal regulations Charles Addison CIO American National Insurance

Data Loss Prevention and HIPAA Kit Robinson Director kit.robinson@vontu.com