Healthcare and IT Working Together. 2013 KY HFMA Spring Institute



Similar documents
HIPAA and HITECH Compliance for Cloud Applications

HIPAA Security Rule Compliance

HIPAA and Mental Health Privacy:

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA Compliance Guide

InfoGard Healthcare Services InfoGard Laboratories Inc.

FACT SHEET: Ransomware and HIPAA

HIPAA Compliance Guide

8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Overview of the HIPAA Security Rule

Security Is Everyone s Concern:

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

What do you need to know?

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

University Healthcare Physicians Compliance and Privacy Policy

HIPAA in an Omnibus World. Presented by

July 6, Mr. Michael L. Joseph Chairman of the Board Roswell Park Cancer Institute Elm & Carlton Streets Buffalo, NY 14263

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Bridging the HIPAA/HITECH Compliance Gap

VMware vcloud Air HIPAA Matrix

BUSINESS ASSOCIATE AGREEMENT. Recitals

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA Security & Compliance

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

Business Associate Liability Under HIPAA/HITECH

HIPAA Compliance: Are you prepared for the new regulatory changes?

Nine Network Considerations in the New HIPAA Landscape

Joe Dylewski President, ATMP Solutions

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Welcome to the Privacy and Security PowerPoint presentation in the Data Analytics Toolkit. This presentation will provide introductory information

CHIS, Inc. Privacy General Guidelines

Healthcare Compliance Solutions

SECURITY RISK ASSESSMENT SUMMARY

The Basics of HIPAA Privacy and Security and HITECH

SAMPLE BUSINESS ASSOCIATE AGREEMENT

HIPAA Security Alert

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

How to Use the NYeC Privacy and Security Toolkit V 1.1

Assessing Your HIPAA Compliance Risk

Business Associate Agreement

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Big Data, Big Risk, Big Rewards. Hussein Syed

HIPAA BUSINESS ASSOCIATE ADDENDUM (Privacy & Security) I. Definitions

3/13/2015 HIPAA/HITECH WHAT S YOUR COMPLIANCE STATUS? Daniel B. Mills Pretzel & Stouffer, Chartered WHAT IS HIPAA?

Datto Compliance 101 1

My Docs Online HIPAA Compliance

Mitigating and managing cyber risk: ten issues to consider

COMPLIANCE ALERT 10-12

BUSINESS ASSOCIATE AGREEMENT

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA BUSINESS ASSOCIATE AGREEMENT

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Please print the attached document, sign and return to or contact Erica Van Treese, Account Manager, Provider Relations &

Joseph Suchocki HIPAA Compliance 2015

HIPAA Security COMPLIANCE Checklist For Employers

Healthcare Management Service Organization Accreditation Program (MSOAP)

What is required of a compliant Risk Assessment?

Transcription:

Healthcare and IT Working Together 2013 KY HFMA Spring Institute

Introduction Michael R Gilliam Over 7 Years Experience in Cyber Security BA Telecommunications Network Security CISSP, GHIC, CCFE, SnortCP, Security+, Network+ Previously provided security solutions while working in the Federal Government, Military, State Governments, and Private Consulting Jimmy Noll 26 Years in Information Technology 18 Years in IT Security and Risk Management Consultant to Healthcare for Risk and Impact Analysis and Security Management Programs CTO at SDGblue started Security Practice, Ohio Business Unit, Managed Security Services

Contents Changes in Healthcare Information Technology Where IT and Health-care Meet What is a Risk Analysis Cyber Security Challenges Presented How Cyber Security Can Impact Healthcare How To Protect Critical Information Additional Information

Changes in IT and Healthcare HITECH - Health Information Technology for Economic and Clinical Health Attempts to spur the rapid adoption of Electronic Health Records (EHR) Financial Incentives to encourage the adoption of EHR Financial Incentives will soon give way to penalties Non-Adoption by 2015 penalized 1% of Medicare Payments Depending on the volume of

HITECH Breach Notification Law Requires providers who experience a breach to promptly notify affected individuals Notification of HHS secretary and media in the case where During a recent study of Healthcare breaches 94% of respondents had at least one data breach in the previous two year 45% report that they had more than five incidents.

Healthcare Cyber Security Statistics

Where Healthcare and IT Meet.. Most CFO's would agree that it is their primary responsibility to ensure the fiscal resources of the organization are used wisely and in such a way to support the business needs and future growth of the organization. From the Financial Side we need to plan for IT Hardware Software People and Training

Challenges Moving Personal Health Information (PHI) to an electronic format (ephi) introduces a new set of threats. Healthcare organizations needs to ensure these critical digital assets are adequately protected by using the following types of controls. Physical Technical Administrative

Cyber Security in Healthcare Need to implement new controls How should these items be budgeted for and prioritized? Ensure that the solution proposed meets the long term needs of the organization and does so in a financially responsible way this can be accomplished by a standard proper Cost-Benefit Analysis (CBA) Cost of doing Nothing Cost of Solution Weigh the Benefits vs the Cost

What is a Risk Analysis A risk analysis is a periodic assessment of the electronic personal health information and other critical data or assets owned by the organization. Discovery / Inventory Identify Threat Sources Vulnerabilities Control Analysis Likelihood Analysis Impact Analysis Mitigation

Financial Impact to Healthcare Cyber Attacks on Medical Devices Modification of Records Loss of Patient Data Legal Liability Reputation Damage Cost of Downtime Fines

What Healthcare Should be Doing A business will have good security if its corporate culture is correct. That depends on one thing; tone at the top. There will be no grassroots effort to overwhelm corporate neglect. --William Malik Vice President and Research Area Director for Information Security At Gartner Make Cyber Security a priority build security into all procedures and processes from the beginning

What Healthcare should be Doing Build an Information Security Program Fundamentals Network Architecture Design Physical Security Awareness Training Well Developed Policies and Procedures Limited User Access Vulnerability Remediation and Testing Disaster Recovery / Business Continuity

What Healthcare Should be Doing Knowing Where You Stand Testing, Testing, and more Testing Annually Performing a Risk Analysis Annually Conducting a Technical Assessment measuring the effectiveness of Policies Procedures Practices Security Controls Retest every year to measure progress and be able to benchmark yourself

What Healthcare Should be Doing Incident Response Program Preparation Identification Containment Remediation Restoration Reporting Crucial to limit the impact of a breach when they do occur

What Healthcare Should be Doing Regulatory Compliance HIPAA 12 Administrative Controls Regular Security Testing, Risk Analysis, Log Monitoring, Password Policies, Antivirus, Security Awareness Program, Incident Response Program, etc. HIPAA Security Rule Ensure the confidentiality, integrity, and availability of all e-phi they create, receive, maintain or transmit; Identify and protect against reasonably anticipated threats to the security or integrity of the information; Protect against reasonably anticipated, impermissible uses or disclosures; and Ensure compliance by their workforce. Reduce the financial impact of a breach

Conclusion Changes introduce additional complexity / threats Threats are Real Need to Make Security a priority Do the Fundamentals Right Use Risk Analysis to determine balanced approach

Additional Resources US Department of Health and Human Services http://www.hhs.gov National Institute for Standards and Technology http://www.nist.gov

SDGblue Service Lines What services do we offer? Security Services Group (SSG) Security Assessments & Testing (Hacker type things) Internal - External - Firewalls Applications Social Engineering - Malicious Activities Regulatory (HIPAA) Audit, Compliance & Risk Financial Systems - Policy Reviews - Disaster Recovery Regulatory (HIPAA) Technical, Administrative, Physical Risk Identification Hosted Security Services Log Management Firewall Management www.sdgblue.com

Thank You! Michael R Gilliam Senior Security Engineer 859-685-3498 Michael.Gilliam@sdgblue.com Jimmy Noll Chief Technology Officer 513-618-8960 Jimmy.Noll@sdgblue.com