SlideShare a Scribd company logo
1 of 19
Lisa Copp
Chief Privacy Officer & Assistant General Counsel
CNO Financial Group
Meredith Phillips
Chief Information Privacy & Security Officer
Henry Ford Health System
• Publicly traded insurance holding company
• CNO affiliated insurance brands provide life and supplemental
health insurance products to middle income Americans
• Not all products are HIPAA governed – life, annuity, accident, disability
income
• CNO insurance companies are licensed in all States, DC and PR
CHIEF PRIVACY OFFICER
• Reports through Law Department
• Oversees regulatory compliance
• Primary accountability for “non-
technical” incidents
• Metrics focused on incidents as an
impact on privacy as an objective –
incidents (quantity/root
cause/character of data)
DIRECTOR OF
INFORMATION SECURITY
• Reports through IT Infrastructure
• Oversees technical control environment
• Primary accountability for “technical”
incidents
• Metrics focused on incidents as impact
on function of security processes
Coordinated Activities Between Privacy & Security Teams
• Metrics reported to Enterprise Risk Mgt Committee
• RADAR web form single intake point for all types of incidents
• RADAR incident management tool for all types of incidents
• Consistency between check lists and analysis tools
governance
accountability
AND
Building Security
Primary
investigators for
loss and theft of
equipment or
materials
containing PII
Effective incident management requires a variety of skill sets to perform a variety of functions
Privacy & Security
Incident Management
Teamwork Across the CNO Enterprise
Technology tools for incident reporting and management allow efficiency and consistency
IT Security
Expertise in
systems security
Investigation and
analysis check lists
for technical
incidents
Technical incident
management
Fraud Unit
Primary
investigators for
internal and
external fraud
involving misuse of
PII
Enterprise Risk
Mgt
Conduct root
cause analysis for
process-related
incidents
Consumer
Relations
Process incidents
in RADAR
Issue consumer
breach notification
letters
Manage credit
monitoring codes
Regulatory
Affairs
Liaison with state
Departments of
Insurance
Privacy
Compliance
Provide attorney
oversight
Investigation and
analysis check lists
for non-technical
incidents
Non-technical
incident mgt
Framework for
sanctions
Issue regulator
breach notification
letters
value of automated
• Investigate incident
• Investigate impacted consumers
• Understand breach standards in relevant jurisdictions
• Understand consumer notice standards in relevant jurisdictions
• Understand regulator notice standards in relevant jurisdictions
• Investigate root cause(s)
• Develop corrective action
• Monitor corrective action
• Recommend sanctions
• Monitor sanctions
incident management
Single
Source
of
Truth
• Repeatable analysis
• “Evidence room”
• Single intake point with customized Web
Form regardless of incident type
• Stolen briefcase
• Misdirected mail
• Malware
• Social engineering
Coordinates
a
Non-linear
Workflow
• Risk thresholds
• Risk based metrics
• Number of individuals
impacted
• Character of data
• Root cause
Automates selection of breach
notification letter
• Jurisdiction
• HIPAA or non-HIPAA
• Mandatory or voluntary
notice
• Special states
key elements of our program
ideas to share
Risk assessment
Check lists
• Loss/theft
• Process issues/root cause
• Corrective action plans
• Sanctions
“Letter picker”
Common repository
• Evidence of repeatable process
• Consistent analysis
• Consistent documentation
• Then…Prior to 2012
– Privacy was a subset of Corporate Compliance
– Security was a subset of Information Technology
– Decentralized approach throughout the System with lean resources to carry out the
Privacy & Security Mission
• Observation
– Due to lean resources (i.e., budget, FTEs, etc.), competing priorities and fragmented
oversight, Privacy & Security compliance was at times misaligned with the HFHS Mission
& Vision
– Organizational mindset saw privacy & security compliance as a “necessary evil” –
Regulatory issue…not clinical!
– We struggled with being a part of the solution and was seen as a barrier to patient care
– Roles were not clearly defined thus creating misalignment during incident response
THEN vs. NOW
• Now…
– Named the System’s Chief Information Privacy & Security Officer
– Combined the Information Privacy & Information Security into one department under one leader
– Launched a System-wide internal marketing campaign to communicate the new governance
structure, responsibility, mission, vision, goals, etc.
– Priorities have further been streamlined and standardized within the IPSO to establish Service Level
Agreements with each Business Unit
– Investigative process & re-education will be managed by the IPSO team while maintaining
coordination with the key stakeholders (i.e., business unit leadership, Privacy/Security Champions,
Human Resources, etc.)
• Observations
– HFHS entered into new territory to ensure synergy between Privacy & Security – Culture of
Confidentiality – through organizational structure
– Incident reporting has increased by 26% from 2013 to 2014
– Employees “Think Privacy & Security First”…when in doubt, they call the IPSO…we are here to save
the day!
– The “necessary evil” mindset has diminished…we are now a welcomed partner and resource to the
organization and leaders
THEN vs. NOW
IPSO GOVERNANCE STRUCTURE
• Any routine investigations that may result in a breach must be forwarded to the IPSO for a Code
A(ssessment) and potential Code B Alert
• Investigations are led by the IPSO (i.e., privacy & security) in conjunction with operational or medical staff
management, Human Resources, Legal Affairs, Risk Management & the Police Authority Unit
• All investigative documentation (i.e., notes, interview transcripts, audit logs, etc.) should be stored in our
centralized repository to ensure the ability for metric reporting
• All incidents must be receive a breach risk assessment using RADAR to ensure consistent assessments are
performed and documented
• Corrective Action always recommended by the IPSO in accordance with the outcome of the investigation
– Application of corrective action is consistent across business units and employee types
• Re-education required for the entire department within 30 days of investigation closure not just the
offender
CENTRALIZED INVESTIGATIVE
PROCESS
• The HFHS Privacy & Security Council is an oversight council that
approves System policies and procedures related to privacy & security
regulations
• The Code B Alert Team is a rapid-response workgroup established to
centrally respond and manage all System data breaches & incidents
• The Office for Civil Rights Response Team will review all OCR data
requests related to privacy & security violations and respond on behalf
of the System and/or specific business unit
“These teams are coordinated by our office and have been added to the BFF
circle of collaboration. We all are working towards the common goal of
ensuring our Culture of Confidentiality is maintained for all of our patients,
members, guests and employees. Without each other, we would definitely
fail!”
-Meredith Phillips
IPSO COUNCILS &
RESPONSE TEAMS
IPSO
Resources
1. Presentation Slides: To download a copy of these
presentation slides please go to:
http://www.idexpertscorp.com/IAPPwebinar1214
2. Download Whitepaper: The CISO’s Secret Weapon for
Reducing Enterprise Risk
http://www2.idexpertscorp.com/resources/single/incident-
response-management-software-the-cisos-secret-weapon-for-
reducing/r-radar
A Word from our Sponsors
Security and privacy incident
response software
www.idexpertscorp.com/radar-software
For a copy of these presentation slides and to view the recording of this web conference
(to be posted approximately 48 hours following the live event) please go to:
http://www.idexpertscorp.com/IAPPwebinar1214
Questions & Answers
Lisa Copp
Chief Privacy Officer &
Assistant General Counsel
CNO Financial Group
Lisa.Copp@CNOinc.com
Meredith Phillips
Chief Information Privacy & Security Officer
Henry Ford Health System
mphilli2@hfhs.org
Web Conference
Participant Feedback Survey
’
Privacy and Security: Teamwork Required to Tackle Incident Response

More Related Content

What's hot

Information technology risks
Information technology risksInformation technology risks
Information technology risks
salman butt
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
Yaser Alrefai
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
Matthew Rosenquist
 

What's hot (20)

Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Information classification
Information classificationInformation classification
Information classification
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
Gtag 1 information risk and control
Gtag 1 information risk and controlGtag 1 information risk and control
Gtag 1 information risk and control
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and Governance
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 

Viewers also liked

Viewers also liked (6)

Incident Response Management - Metrics, Data, Visualize & Apply
Incident Response Management - Metrics, Data, Visualize & ApplyIncident Response Management - Metrics, Data, Visualize & Apply
Incident Response Management - Metrics, Data, Visualize & Apply
 
OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
 
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 

Similar to Privacy and Security: Teamwork Required to Tackle Incident Response

Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
Kimberly Hood
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
Resilient Systems
 

Similar to Privacy and Security: Teamwork Required to Tackle Incident Response (20)

Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptx
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
HIPAA omnibus rule update
HIPAA omnibus rule updateHIPAA omnibus rule update
HIPAA omnibus rule update
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance Office
 
nist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptxnist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptx
 
nist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptxnist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptx
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOV
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 

Recently uploaded

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Privacy and Security: Teamwork Required to Tackle Incident Response

  • 1.
  • 2. Lisa Copp Chief Privacy Officer & Assistant General Counsel CNO Financial Group Meredith Phillips Chief Information Privacy & Security Officer Henry Ford Health System
  • 3. • Publicly traded insurance holding company • CNO affiliated insurance brands provide life and supplemental health insurance products to middle income Americans • Not all products are HIPAA governed – life, annuity, accident, disability income • CNO insurance companies are licensed in all States, DC and PR
  • 4. CHIEF PRIVACY OFFICER • Reports through Law Department • Oversees regulatory compliance • Primary accountability for “non- technical” incidents • Metrics focused on incidents as an impact on privacy as an objective – incidents (quantity/root cause/character of data) DIRECTOR OF INFORMATION SECURITY • Reports through IT Infrastructure • Oversees technical control environment • Primary accountability for “technical” incidents • Metrics focused on incidents as impact on function of security processes Coordinated Activities Between Privacy & Security Teams • Metrics reported to Enterprise Risk Mgt Committee • RADAR web form single intake point for all types of incidents • RADAR incident management tool for all types of incidents • Consistency between check lists and analysis tools governance accountability AND
  • 5. Building Security Primary investigators for loss and theft of equipment or materials containing PII Effective incident management requires a variety of skill sets to perform a variety of functions Privacy & Security Incident Management Teamwork Across the CNO Enterprise Technology tools for incident reporting and management allow efficiency and consistency IT Security Expertise in systems security Investigation and analysis check lists for technical incidents Technical incident management Fraud Unit Primary investigators for internal and external fraud involving misuse of PII Enterprise Risk Mgt Conduct root cause analysis for process-related incidents Consumer Relations Process incidents in RADAR Issue consumer breach notification letters Manage credit monitoring codes Regulatory Affairs Liaison with state Departments of Insurance Privacy Compliance Provide attorney oversight Investigation and analysis check lists for non-technical incidents Non-technical incident mgt Framework for sanctions Issue regulator breach notification letters
  • 6. value of automated • Investigate incident • Investigate impacted consumers • Understand breach standards in relevant jurisdictions • Understand consumer notice standards in relevant jurisdictions • Understand regulator notice standards in relevant jurisdictions • Investigate root cause(s) • Develop corrective action • Monitor corrective action • Recommend sanctions • Monitor sanctions incident management Single Source of Truth • Repeatable analysis • “Evidence room” • Single intake point with customized Web Form regardless of incident type • Stolen briefcase • Misdirected mail • Malware • Social engineering Coordinates a Non-linear Workflow
  • 7. • Risk thresholds • Risk based metrics • Number of individuals impacted • Character of data • Root cause Automates selection of breach notification letter • Jurisdiction • HIPAA or non-HIPAA • Mandatory or voluntary notice • Special states key elements of our program ideas to share Risk assessment Check lists • Loss/theft • Process issues/root cause • Corrective action plans • Sanctions “Letter picker” Common repository • Evidence of repeatable process • Consistent analysis • Consistent documentation
  • 8. • Then…Prior to 2012 – Privacy was a subset of Corporate Compliance – Security was a subset of Information Technology – Decentralized approach throughout the System with lean resources to carry out the Privacy & Security Mission • Observation – Due to lean resources (i.e., budget, FTEs, etc.), competing priorities and fragmented oversight, Privacy & Security compliance was at times misaligned with the HFHS Mission & Vision – Organizational mindset saw privacy & security compliance as a “necessary evil” – Regulatory issue…not clinical! – We struggled with being a part of the solution and was seen as a barrier to patient care – Roles were not clearly defined thus creating misalignment during incident response THEN vs. NOW
  • 9. • Now… – Named the System’s Chief Information Privacy & Security Officer – Combined the Information Privacy & Information Security into one department under one leader – Launched a System-wide internal marketing campaign to communicate the new governance structure, responsibility, mission, vision, goals, etc. – Priorities have further been streamlined and standardized within the IPSO to establish Service Level Agreements with each Business Unit – Investigative process & re-education will be managed by the IPSO team while maintaining coordination with the key stakeholders (i.e., business unit leadership, Privacy/Security Champions, Human Resources, etc.) • Observations – HFHS entered into new territory to ensure synergy between Privacy & Security – Culture of Confidentiality – through organizational structure – Incident reporting has increased by 26% from 2013 to 2014 – Employees “Think Privacy & Security First”…when in doubt, they call the IPSO…we are here to save the day! – The “necessary evil” mindset has diminished…we are now a welcomed partner and resource to the organization and leaders THEN vs. NOW
  • 11. • Any routine investigations that may result in a breach must be forwarded to the IPSO for a Code A(ssessment) and potential Code B Alert • Investigations are led by the IPSO (i.e., privacy & security) in conjunction with operational or medical staff management, Human Resources, Legal Affairs, Risk Management & the Police Authority Unit • All investigative documentation (i.e., notes, interview transcripts, audit logs, etc.) should be stored in our centralized repository to ensure the ability for metric reporting • All incidents must be receive a breach risk assessment using RADAR to ensure consistent assessments are performed and documented • Corrective Action always recommended by the IPSO in accordance with the outcome of the investigation – Application of corrective action is consistent across business units and employee types • Re-education required for the entire department within 30 days of investigation closure not just the offender CENTRALIZED INVESTIGATIVE PROCESS
  • 12. • The HFHS Privacy & Security Council is an oversight council that approves System policies and procedures related to privacy & security regulations • The Code B Alert Team is a rapid-response workgroup established to centrally respond and manage all System data breaches & incidents • The Office for Civil Rights Response Team will review all OCR data requests related to privacy & security violations and respond on behalf of the System and/or specific business unit “These teams are coordinated by our office and have been added to the BFF circle of collaboration. We all are working towards the common goal of ensuring our Culture of Confidentiality is maintained for all of our patients, members, guests and employees. Without each other, we would definitely fail!” -Meredith Phillips IPSO COUNCILS & RESPONSE TEAMS IPSO
  • 13. Resources 1. Presentation Slides: To download a copy of these presentation slides please go to: http://www.idexpertscorp.com/IAPPwebinar1214 2. Download Whitepaper: The CISO’s Secret Weapon for Reducing Enterprise Risk http://www2.idexpertscorp.com/resources/single/incident- response-management-software-the-cisos-secret-weapon-for- reducing/r-radar
  • 14. A Word from our Sponsors Security and privacy incident response software www.idexpertscorp.com/radar-software
  • 15. For a copy of these presentation slides and to view the recording of this web conference (to be posted approximately 48 hours following the live event) please go to: http://www.idexpertscorp.com/IAPPwebinar1214 Questions & Answers Lisa Copp Chief Privacy Officer & Assistant General Counsel CNO Financial Group Lisa.Copp@CNOinc.com Meredith Phillips Chief Information Privacy & Security Officer Henry Ford Health System mphilli2@hfhs.org
  • 17.
  • 18.