SlideShare ist ein Scribd-Unternehmen logo
1 von 11
I Volunteered To Do This?  Eric Cowperthwaite Providence Health & Services SOURCE Seattle, June 16, 2011
About Providence 27 hospitals located in 5 states Over 160 other facilities, including Physician clinics, long term care, laboratories, billing & debt collection A health plan with over 400,000 members A liberal arts university, private high school, several daycares $8 billion in annual revenue and $9 billion in assets $500 million in annual community benefit 7200 acute and long term care beds More than 7 million primary care and acute outpatient visits Tier 2 PCI Merchant with more than 2 million annual transactions 40,000 end points (PC, laptop, tablet) and 5,000 servers Among the 5 largest Catholic Healthcare Systems in the nation Patient records on approx 10 million people on the west coast
Tapes, laptops and viruses … Oh My Jan 1, 2006 – tapes containing data on more than 380,000 patients are stolen. Tapes are not encrypted Feb, 2006 – 3 laptops containing data on more than 1,000 patients are stolen. Laptops are not encrypted Mar, 2006 – a hospital goes to “downtime procedures” due to malware infections in 80% of PC’s and laptops. A/V software is 2 versions old and signatures out of date.  Feb – Apr, 2006 – EDS SPPS conducts gap analysis, forensics, etc. and recommends to the Board the institution of a formal Information Security program, including hiring a security executive May 15, 2006 – Eric Cowperthwaite’s first day at Providence Jun – Sep, 2006 - HHS is onsite, investigating Providence actions and interviewing employees.
Reflecting on being a CSO in a Crisis I was approached 3 times, third time a friend told me they were serious The Board and senior execs were serious Middle management viewed the crisis as a drain on budget and resources Going from crisis to sustained maturity is a 3 to 5 year journey Make darn sure that your soon to be new employer wants to solve their problem, even if they don’t know what it is yet Security staff has to be absolutely top notch, in both terms of hard and soft skills You have to be prepared for a lot of hard knocks and dynamically changing your plans and programs to adapt to reality
Worst Imaginable Environment Every business unit is responsible for it’s own IT – 10 CIOs 80% of my employees are professionals, I have 40,000 college degrees to deal with Financial accountability is decentralized Healthcare is used to delivering locally Everything is viewed as negotiable
Understanding the Business Failing to understand the needs of the business means a new CSO will lead them through the remainder of the crisis  Lower healthcare costs Healthcare costs rising faster than inflation National political debate Massive pressure to “transform” healthcare Increased Quality Improve outcomes Reduce infections, injuries and mortality in hospitals Standardize healthcare so everyone gets the same quality of care Community Benefit – continuing to provide for the poor & vulnerable Managing operating expenses – Good stewardship of our resources
What Did We Do? Established a formal Information Security program, with visibility all the way to the Board of Directors Created an executive position to lead that program, i.e. the CSO Reviewed and analyzed policy and standards Established a security controls framework Joint Commission for Accreditation of Healthcare Organizations PCI DSS HIPAA Security & Privacy Rules National Institute of Standards & Technology ISO 27001:2 Implemented new and improved security controls, for example: All at rest data encrypted on devices that are mobile (tapes, laptops, phones, etc) Data loss prevention Co-sourced security management controls (i.e. SIEM, firewalls, IDS/IPS)
What Did Our Regulators Do? HHS received multiple complaints that we had violated the Privacy and Security rules Class Action lawsuit filed in Oregon All lawsuits were dismissed, including appeals by the plaintiffs We were very transparent with the OR & WA Attorney Generals No AG found that Providence had caused harm or broken state laws HHS and Providence signed a Resolution Agreement on 7/15/08 3 years, established specific control and reporting requirements No FTC Consent Decree Providence CISO established as Agreement Monitor $100,000 administrative fee Providence did not admit to a violation of HIPAA or other law or regulation
Building Security Sustainability We started with Multiple point solutions Too many vendors Too much cost and not enough controls Managed by security Principles Fit for purpose Managed by appropriate IT operations organizations Reduce the number of vendors to manage Select vendors with suites or broad product offerings Reduce cost, both product acquisition and operations Governance vs. Operations Separate GRC, ITSec, InfoSec functions
Next: Enterprise Risk Management Today we are building Enterprise Risk Management All security operations is managed within appropriate parts of the business Technical security controls are delivered by the CIO, not the CISO Line of business delivers administrative controls, education, awareness  The CISO delivers Governance, Risk Management & Compliance Chief Risk Officer is independent of the business operations Reports to the Chair of the Board’s Audit Committee CISO, CPO, Insurance, Internal Audit, Compliance all report to the CRO We started this path about 9 months ago Already we are seeing far higher business engagement
That’s The End Questions?  I’ll answer the ones I can

Weitere ähnliche Inhalte

Was ist angesagt?

Emr powerpoint for IPM
Emr powerpoint for IPMEmr powerpoint for IPM
Emr powerpoint for IPM
Anna Tonnu
 
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
UsmanYakubuMaaruf
 
Software Blue
Software BlueSoftware Blue
Software Blue
Pradeep
 

Was ist angesagt? (20)

Ghana Medical Banking Institute
Ghana Medical Banking InstituteGhana Medical Banking Institute
Ghana Medical Banking Institute
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
EMR Presentation - The Time is Now
EMR Presentation - The Time is NowEMR Presentation - The Time is Now
EMR Presentation - The Time is Now
 
Himss Revenue Cycle Task Force Panel Presentation[1]
Himss Revenue Cycle Task Force Panel Presentation[1]Himss Revenue Cycle Task Force Panel Presentation[1]
Himss Revenue Cycle Task Force Panel Presentation[1]
 
Overview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy SanyalOverview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy Sanyal
 
Emr powerpoint for IPM
Emr powerpoint for IPMEmr powerpoint for IPM
Emr powerpoint for IPM
 
PSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS CommunityPSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS Community
 
Preventative Malpractice Insurance_02
Preventative Malpractice Insurance_02Preventative Malpractice Insurance_02
Preventative Malpractice Insurance_02
 
Media presentation (social impact of technology)ppt
Media presentation (social impact of technology)pptMedia presentation (social impact of technology)ppt
Media presentation (social impact of technology)ppt
 
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
 
Software Blue
Software BlueSoftware Blue
Software Blue
 
Vitas Presentation Version 2
Vitas Presentation Version 2Vitas Presentation Version 2
Vitas Presentation Version 2
 
Medical Billing Service a Top Concern for Many Physicians
  Medical Billing Service a Top Concern for Many Physicians  Medical Billing Service a Top Concern for Many Physicians
Medical Billing Service a Top Concern for Many Physicians
 
Remaking The Electronic Health Record
Remaking The Electronic Health RecordRemaking The Electronic Health Record
Remaking The Electronic Health Record
 
KP in American Healthcare System
KP in American Healthcare SystemKP in American Healthcare System
KP in American Healthcare System
 
Health Bit Webinar 612010
Health Bit Webinar 612010Health Bit Webinar 612010
Health Bit Webinar 612010
 
Making Sense of Health Information Systems
Making Sense of Health Information SystemsMaking Sense of Health Information Systems
Making Sense of Health Information Systems
 
Cuban American Medical Society Presentation[1]
 Cuban American Medical Society Presentation[1] Cuban American Medical Society Presentation[1]
Cuban American Medical Society Presentation[1]
 
Sentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI applicationSentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI application
 
Hitech Act and How It Impacts EHR
Hitech Act and How It Impacts EHRHitech Act and How It Impacts EHR
Hitech Act and How It Impacts EHR
 

Andere mochten auch

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
TheAnfieldGroup
 
Conversion
ConversionConversion
Conversion
neicher
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
 

Andere mochten auch (9)

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Conversion
ConversionConversion
Conversion
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control Convergence
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 

Ähnlich wie Keynote

Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
wlynn1
 
What Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice ModelsWhat Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice Models
mjmcgaunn
 
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Erik Ginalick
 

Ähnlich wie Keynote (20)

2016 IBM Interconnect - medical devices transformation
2016 IBM Interconnect  - medical devices transformation2016 IBM Interconnect  - medical devices transformation
2016 IBM Interconnect - medical devices transformation
 
Sharing EHRs - The Canadian Experience
Sharing EHRs - The Canadian ExperienceSharing EHRs - The Canadian Experience
Sharing EHRs - The Canadian Experience
 
Introduction to EMR
Introduction to EMRIntroduction to EMR
Introduction to EMR
 
EMR Intro
EMR IntroEMR Intro
EMR Intro
 
How a healthcare management system (hms) is improving hospitals and clinics
How a healthcare management system (hms) is improving hospitals and clinicsHow a healthcare management system (hms) is improving hospitals and clinics
How a healthcare management system (hms) is improving hospitals and clinics
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Healthcare Thinktank Roundtable
Healthcare Thinktank RoundtableHealthcare Thinktank Roundtable
Healthcare Thinktank Roundtable
 
Kaiser Permanente HealthConnect - EHR and SNOMED
Kaiser Permanente HealthConnect - EHR and SNOMEDKaiser Permanente HealthConnect - EHR and SNOMED
Kaiser Permanente HealthConnect - EHR and SNOMED
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Data-driven Healthcare for Providers
Data-driven Healthcare for ProvidersData-driven Healthcare for Providers
Data-driven Healthcare for Providers
 
Data driven Healthcare for Providers
Data driven Healthcare for ProvidersData driven Healthcare for Providers
Data driven Healthcare for Providers
 
What Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice ModelsWhat Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice Models
 
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
 
Caredojo
CaredojoCaredojo
Caredojo
 
Caredojo
CaredojoCaredojo
Caredojo
 
Willowglade - Investment Brief 2016
Willowglade - Investment Brief  2016Willowglade - Investment Brief  2016
Willowglade - Investment Brief 2016
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR System
 
Risk management in Healthcare on Cloud
Risk management in Healthcare on CloudRisk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
 
Revenue Cycle Management
Revenue Cycle ManagementRevenue Cycle Management
Revenue Cycle Management
 
Insights success the 10 fastest growing healthcare solutions provider compani...
Insights success the 10 fastest growing healthcare solutions provider compani...Insights success the 10 fastest growing healthcare solutions provider compani...
Insights success the 10 fastest growing healthcare solutions provider compani...
 

Mehr von Source Conference

Mehr von Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Keynote

  • 1. I Volunteered To Do This? Eric Cowperthwaite Providence Health & Services SOURCE Seattle, June 16, 2011
  • 2. About Providence 27 hospitals located in 5 states Over 160 other facilities, including Physician clinics, long term care, laboratories, billing & debt collection A health plan with over 400,000 members A liberal arts university, private high school, several daycares $8 billion in annual revenue and $9 billion in assets $500 million in annual community benefit 7200 acute and long term care beds More than 7 million primary care and acute outpatient visits Tier 2 PCI Merchant with more than 2 million annual transactions 40,000 end points (PC, laptop, tablet) and 5,000 servers Among the 5 largest Catholic Healthcare Systems in the nation Patient records on approx 10 million people on the west coast
  • 3. Tapes, laptops and viruses … Oh My Jan 1, 2006 – tapes containing data on more than 380,000 patients are stolen. Tapes are not encrypted Feb, 2006 – 3 laptops containing data on more than 1,000 patients are stolen. Laptops are not encrypted Mar, 2006 – a hospital goes to “downtime procedures” due to malware infections in 80% of PC’s and laptops. A/V software is 2 versions old and signatures out of date. Feb – Apr, 2006 – EDS SPPS conducts gap analysis, forensics, etc. and recommends to the Board the institution of a formal Information Security program, including hiring a security executive May 15, 2006 – Eric Cowperthwaite’s first day at Providence Jun – Sep, 2006 - HHS is onsite, investigating Providence actions and interviewing employees.
  • 4. Reflecting on being a CSO in a Crisis I was approached 3 times, third time a friend told me they were serious The Board and senior execs were serious Middle management viewed the crisis as a drain on budget and resources Going from crisis to sustained maturity is a 3 to 5 year journey Make darn sure that your soon to be new employer wants to solve their problem, even if they don’t know what it is yet Security staff has to be absolutely top notch, in both terms of hard and soft skills You have to be prepared for a lot of hard knocks and dynamically changing your plans and programs to adapt to reality
  • 5. Worst Imaginable Environment Every business unit is responsible for it’s own IT – 10 CIOs 80% of my employees are professionals, I have 40,000 college degrees to deal with Financial accountability is decentralized Healthcare is used to delivering locally Everything is viewed as negotiable
  • 6. Understanding the Business Failing to understand the needs of the business means a new CSO will lead them through the remainder of the crisis Lower healthcare costs Healthcare costs rising faster than inflation National political debate Massive pressure to “transform” healthcare Increased Quality Improve outcomes Reduce infections, injuries and mortality in hospitals Standardize healthcare so everyone gets the same quality of care Community Benefit – continuing to provide for the poor & vulnerable Managing operating expenses – Good stewardship of our resources
  • 7. What Did We Do? Established a formal Information Security program, with visibility all the way to the Board of Directors Created an executive position to lead that program, i.e. the CSO Reviewed and analyzed policy and standards Established a security controls framework Joint Commission for Accreditation of Healthcare Organizations PCI DSS HIPAA Security & Privacy Rules National Institute of Standards & Technology ISO 27001:2 Implemented new and improved security controls, for example: All at rest data encrypted on devices that are mobile (tapes, laptops, phones, etc) Data loss prevention Co-sourced security management controls (i.e. SIEM, firewalls, IDS/IPS)
  • 8. What Did Our Regulators Do? HHS received multiple complaints that we had violated the Privacy and Security rules Class Action lawsuit filed in Oregon All lawsuits were dismissed, including appeals by the plaintiffs We were very transparent with the OR & WA Attorney Generals No AG found that Providence had caused harm or broken state laws HHS and Providence signed a Resolution Agreement on 7/15/08 3 years, established specific control and reporting requirements No FTC Consent Decree Providence CISO established as Agreement Monitor $100,000 administrative fee Providence did not admit to a violation of HIPAA or other law or regulation
  • 9. Building Security Sustainability We started with Multiple point solutions Too many vendors Too much cost and not enough controls Managed by security Principles Fit for purpose Managed by appropriate IT operations organizations Reduce the number of vendors to manage Select vendors with suites or broad product offerings Reduce cost, both product acquisition and operations Governance vs. Operations Separate GRC, ITSec, InfoSec functions
  • 10. Next: Enterprise Risk Management Today we are building Enterprise Risk Management All security operations is managed within appropriate parts of the business Technical security controls are delivered by the CIO, not the CISO Line of business delivers administrative controls, education, awareness The CISO delivers Governance, Risk Management & Compliance Chief Risk Officer is independent of the business operations Reports to the Chair of the Board’s Audit Committee CISO, CPO, Insurance, Internal Audit, Compliance all report to the CRO We started this path about 9 months ago Already we are seeing far higher business engagement
  • 11. That’s The End Questions? I’ll answer the ones I can