SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Excellence in Medical Center Safety and Security Solutions Team Approach Security Industry Association “ Managing Risk, Maximizing Benefits” Paul Baratta National Security Specialist Security  Solutions                                      
GE Security & IAHSS  Healthcare Benchmarking Study ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GE Security & IAHSS  Healthcare Benchmarking Study Key Findings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Greatest Security Needs What are your hospital’s greatest security needs? 7% CCTV System/Enhancements/Upgrades 5% Communications/Communication Equipment/Radios/Call Boxes 5% Weapons/Tasers 3% Alarms/Alarm Systems 12% Administration/Hospital Staff More Proactive 52% More/Additional/Qualified Staff 57% Any Staffing Mention 60% Any Equipment Mention 2% 9% 10% 11% 12% 22% Total Technology Upgrades/New More Cameras/New/Upgrades Access Control DVR Upgrades/More/Better DVR’s Surveillance/Video/Equipment/More Coverage Equipment /Additions/New/Upgrades
Lessons Learned… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Lessons Learned… ,[object Object],[object Object],[object Object],[object Object]
The Essence of a Security Program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Program Fundamental Goals ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Detection Access Environment Response Security Culture
Preplanning Phase Evaluation Plan Development Execution TG0 TG1 TG2 TG3 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Hospital Security Roadmap to Excellence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Project Summary Security Master Plan Phase I Security Master Plan Phase II Security Master Plan Phase III Deliverables Phases & Tollgates Task  Summary Note: Tollgate Reviews are Steering Committee reviews which will require formal sign off
Risk Assessment ,[object Object],[object Object],[object Object],[object Object]
Risk Analysis Method ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Risks become actual events because:  (1) the vulnerability is not recognized,  (2) the countermeasures are not effective,  (3) the vulnerability has changed.
Joint Commission Risk Assessment Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Risk Assessment Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Vulnerability Assessment ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Security Vulnerability Assessment
Zoned Security Approach Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Zoned security approach in hospitals ,[object Object],[object Object],[object Object],[object Object]
GE Security ,[object Object],[object Object],[object Object],[object Object],[object Object],                                     

Weitere ähnliche Inhalte

Was ist angesagt?

OHSUG 2012 presentation - a pragmatic approach to risk based monitoring
OHSUG 2012 presentation - a pragmatic approach to risk based monitoringOHSUG 2012 presentation - a pragmatic approach to risk based monitoring
OHSUG 2012 presentation - a pragmatic approach to risk based monitoringTriumph Consultancy Services
 
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedKeeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedLife Sciences Network marcus evans
 
OSPAT Brochure 2015
OSPAT Brochure 2015OSPAT Brochure 2015
OSPAT Brochure 2015Peter Zahos
 
Seven questions answered by process hazard analysis
Seven questions answered by process hazard analysisSeven questions answered by process hazard analysis
Seven questions answered by process hazard analysisPaul Baybutt
 
White Paper: From Here to Risk-Based Monitoring
White Paper: From Here to Risk-Based MonitoringWhite Paper: From Here to Risk-Based Monitoring
White Paper: From Here to Risk-Based MonitoringFreedom Monk
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30timmcguinness
 
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...WorldCongress
 
Successful EHR Implementation - Strategy & Tips
Successful EHR Implementation - Strategy & TipsSuccessful EHR Implementation - Strategy & Tips
Successful EHR Implementation - Strategy & TipsJames Muir
 
carpentry cladding Employer handbook version_5_61 (1)
carpentry cladding Employer handbook version_5_61 (1)carpentry cladding Employer handbook version_5_61 (1)
carpentry cladding Employer handbook version_5_61 (1)monicaroberts773
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Managementvikasraina
 
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...Covance
 
Safety webinar with mark friend
Safety webinar with mark friendSafety webinar with mark friend
Safety webinar with mark friendERAUWebinars
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides SlideTeam
 
EMR Executive Summary
EMR Executive SummaryEMR Executive Summary
EMR Executive SummaryJacob Persily
 
Explanation of the most common types of administrative risks
Explanation of the most common types of administrative risksExplanation of the most common types of administrative risks
Explanation of the most common types of administrative risksPrathitha cb
 

Was ist angesagt? (19)

Ecm
EcmEcm
Ecm
 
OHSUG 2012 presentation - a pragmatic approach to risk based monitoring
OHSUG 2012 presentation - a pragmatic approach to risk based monitoringOHSUG 2012 presentation - a pragmatic approach to risk based monitoring
OHSUG 2012 presentation - a pragmatic approach to risk based monitoring
 
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) RedefinedKeeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
Keeping up with ICH E6(R2): Risk-Based Monitoring (RBM) Redefined
 
OSPAT Brochure 2015
OSPAT Brochure 2015OSPAT Brochure 2015
OSPAT Brochure 2015
 
Insurance
InsuranceInsurance
Insurance
 
Seven questions answered by process hazard analysis
Seven questions answered by process hazard analysisSeven questions answered by process hazard analysis
Seven questions answered by process hazard analysis
 
White Paper: From Here to Risk-Based Monitoring
White Paper: From Here to Risk-Based MonitoringWhite Paper: From Here to Risk-Based Monitoring
White Paper: From Here to Risk-Based Monitoring
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
The World Congress Summit on Risk-Based Monitoring and the Quality Risk Manag...
 
Successful EHR Implementation - Strategy & Tips
Successful EHR Implementation - Strategy & TipsSuccessful EHR Implementation - Strategy & Tips
Successful EHR Implementation - Strategy & Tips
 
carpentry cladding Employer handbook version_5_61 (1)
carpentry cladding Employer handbook version_5_61 (1)carpentry cladding Employer handbook version_5_61 (1)
carpentry cladding Employer handbook version_5_61 (1)
 
Incident investigation s4 form
Incident investigation s4 formIncident investigation s4 form
Incident investigation s4 form
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
Risk assessment tools and techniques
Risk assessment tools and techniquesRisk assessment tools and techniques
Risk assessment tools and techniques
 
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
 
Safety webinar with mark friend
Safety webinar with mark friendSafety webinar with mark friend
Safety webinar with mark friend
 
Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides Risk Analysis PowerPoint Presentation Slides
Risk Analysis PowerPoint Presentation Slides
 
EMR Executive Summary
EMR Executive SummaryEMR Executive Summary
EMR Executive Summary
 
Explanation of the most common types of administrative risks
Explanation of the most common types of administrative risksExplanation of the most common types of administrative risks
Explanation of the most common types of administrative risks
 

Ähnlich wie Sia Presentation100808

Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxSUBHI7
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310John Reno
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Synopsys Software Integrity Group
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Part 2 - Critical Controls: How to identify the critical few
Part 2 - Critical Controls: How to identify the critical fewPart 2 - Critical Controls: How to identify the critical few
Part 2 - Critical Controls: How to identify the critical fewmyosh team
 
Risk management in development of life critical systems
Risk management in development of life critical systemsRisk management in development of life critical systems
Risk management in development of life critical systemsScott Althouse
 
Rtb wkplace health, safety & risk 2010 v f 01 12-10
Rtb wkplace health, safety & risk 2010 v f 01 12-10Rtb wkplace health, safety & risk 2010 v f 01 12-10
Rtb wkplace health, safety & risk 2010 v f 01 12-10cr3at0r
 
Safety and Regulatory Solutions to Address the Needs of Small and Medium Biop...
Safety and Regulatory Solutions to Address the Needs of Small and Medium Biop...Safety and Regulatory Solutions to Address the Needs of Small and Medium Biop...
Safety and Regulatory Solutions to Address the Needs of Small and Medium Biop...Covance
 
Risk-based Monitoring Strategies for Improved Clinical Trial Performance
Risk-based Monitoring Strategies for Improved Clinical Trial PerformanceRisk-based Monitoring Strategies for Improved Clinical Trial Performance
Risk-based Monitoring Strategies for Improved Clinical Trial PerformanceCognizant
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementKeySys Health
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017zapp0
 
Taubenberger
TaubenbergerTaubenberger
Taubenbergeranesah
 
Keeping Score on Testing
Keeping Score on TestingKeeping Score on Testing
Keeping Score on Testingamiable_indian
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™CPaschal
 

Ähnlich wie Sia Presentation100808 (20)

Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Part 2 - Critical Controls: How to identify the critical few
Part 2 - Critical Controls: How to identify the critical fewPart 2 - Critical Controls: How to identify the critical few
Part 2 - Critical Controls: How to identify the critical few
 
Risk management in development of life critical systems
Risk management in development of life critical systemsRisk management in development of life critical systems
Risk management in development of life critical systems
 
Rtb wkplace health, safety & risk 2010 v f 01 12-10
Rtb wkplace health, safety & risk 2010 v f 01 12-10Rtb wkplace health, safety & risk 2010 v f 01 12-10
Rtb wkplace health, safety & risk 2010 v f 01 12-10
 
Safety and Regulatory Solutions to Address the Needs of Small and Medium Biop...
Safety and Regulatory Solutions to Address the Needs of Small and Medium Biop...Safety and Regulatory Solutions to Address the Needs of Small and Medium Biop...
Safety and Regulatory Solutions to Address the Needs of Small and Medium Biop...
 
Risk-based Monitoring Strategies for Improved Clinical Trial Performance
Risk-based Monitoring Strategies for Improved Clinical Trial PerformanceRisk-based Monitoring Strategies for Improved Clinical Trial Performance
Risk-based Monitoring Strategies for Improved Clinical Trial Performance
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
Breach response
Breach responseBreach response
Breach response
 
Taubenberger
TaubenbergerTaubenberger
Taubenberger
 
Keeping Score on Testing
Keeping Score on TestingKeeping Score on Testing
Keeping Score on Testing
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 

Sia Presentation100808

  • 1. Excellence in Medical Center Safety and Security Solutions Team Approach Security Industry Association “ Managing Risk, Maximizing Benefits” Paul Baratta National Security Specialist Security Solutions                                      
  • 2.
  • 3.
  • 4. Greatest Security Needs What are your hospital’s greatest security needs? 7% CCTV System/Enhancements/Upgrades 5% Communications/Communication Equipment/Radios/Call Boxes 5% Weapons/Tasers 3% Alarms/Alarm Systems 12% Administration/Hospital Staff More Proactive 52% More/Additional/Qualified Staff 57% Any Staffing Mention 60% Any Equipment Mention 2% 9% 10% 11% 12% 22% Total Technology Upgrades/New More Cameras/New/Upgrades Access Control DVR Upgrades/More/Better DVR’s Surveillance/Video/Equipment/More Coverage Equipment /Additions/New/Upgrades
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.