SlideShare ist ein Scribd-Unternehmen logo
1 von 11
I Volunteered To Do This?  Eric Cowperthwaite Providence Health & Services SOURCE Seattle, June 16, 2011
About Providence 27 hospitals located in 5 states Over 160 other facilities, including Physician clinics, long term care, laboratories, billing & debt collection A health plan with over 400,000 members A liberal arts university, private high school, several daycares $8 billion in annual revenue and $9 billion in assets $500 million in annual community benefit 7200 acute and long term care beds More than 7 million primary care and acute outpatient visits Tier 2 PCI Merchant with more than 2 million annual transactions 40,000 end points (PC, laptop, tablet) and 5,000 servers Among the 5 largest Catholic Healthcare Systems in the nation Patient records on approx 10 million people on the west coast
Tapes, laptops and viruses … Oh My Jan 1, 2006 – tapes containing data on more than 380,000 patients are stolen. Tapes are not encrypted Feb, 2006 – 3 laptops containing data on more than 1,000 patients are stolen. Laptops are not encrypted Mar, 2006 – a hospital goes to “downtime procedures” due to malware infections in 80% of PC’s and laptops. A/V software is 2 versions old and signatures out of date.  Feb – Apr, 2006 – EDS SPPS conducts gap analysis, forensics, etc. and recommends to the Board the institution of a formal Information Security program, including hiring a security executive May 15, 2006 – Eric Cowperthwaite’s first day at Providence Jun – Sep, 2006 - HHS is onsite, investigating Providence actions and interviewing employees.
Reflecting on being a CSO in a Crisis I was approached 3 times, third time a friend told me they were serious The Board and senior execs were serious Middle management viewed the crisis as a drain on budget and resources Going from crisis to sustained maturity is a 3 to 5 year journey Make darn sure that your soon to be new employer wants to solve their problem, even if they don’t know what it is yet Security staff has to be absolutely top notch, in both terms of hard and soft skills You have to be prepared for a lot of hard knocks and dynamically changing your plans and programs to adapt to reality
Worst Imaginable Environment Every business unit is responsible for it’s own IT – 10 CIOs 80% of my employees are professionals, I have 40,000 college degrees to deal with Financial accountability is decentralized Healthcare is used to delivering locally Everything is viewed as negotiable
Understanding the Business Failing to understand the needs of the business means a new CSO will lead them through the remainder of the crisis  Lower healthcare costs Healthcare costs rising faster than inflation National political debate Massive pressure to “transform” healthcare Increased Quality Improve outcomes Reduce infections, injuries and mortality in hospitals Standardize healthcare so everyone gets the same quality of care Community Benefit – continuing to provide for the poor & vulnerable Managing operating expenses – Good stewardship of our resources
What Did We Do? Established a formal Information Security program, with visibility all the way to the Board of Directors Created an executive position to lead that program, i.e. the CSO Reviewed and analyzed policy and standards Established a security controls framework Joint Commission for Accreditation of Healthcare Organizations PCI DSS HIPAA Security & Privacy Rules National Institute of Standards & Technology ISO 27001:2 Implemented new and improved security controls, for example: All at rest data encrypted on devices that are mobile (tapes, laptops, phones, etc) Data loss prevention Co-sourced security management controls (i.e. SIEM, firewalls, IDS/IPS)
What Did Our Regulators Do? HHS received multiple complaints that we had violated the Privacy and Security rules Class Action lawsuit filed in Oregon All lawsuits were dismissed, including appeals by the plaintiffs We were very transparent with the OR & WA Attorney Generals No AG found that Providence had caused harm or broken state laws HHS and Providence signed a Resolution Agreement on 7/15/08 3 years, established specific control and reporting requirements No FTC Consent Decree Providence CISO established as Agreement Monitor $100,000 administrative fee Providence did not admit to a violation of HIPAA or other law or regulation
Building Security Sustainability We started with Multiple point solutions Too many vendors Too much cost and not enough controls Managed by security Principles Fit for purpose Managed by appropriate IT operations organizations Reduce the number of vendors to manage Select vendors with suites or broad product offerings Reduce cost, both product acquisition and operations Governance vs. Operations Separate GRC, ITSec, InfoSec functions
Next: Enterprise Risk Management Today we are building Enterprise Risk Management All security operations is managed within appropriate parts of the business Technical security controls are delivered by the CIO, not the CISO Line of business delivers administrative controls, education, awareness  The CISO delivers Governance, Risk Management & Compliance Chief Risk Officer is independent of the business operations Reports to the Chair of the Board’s Audit Committee CISO, CPO, Insurance, Internal Audit, Compliance all report to the CRO We started this path about 9 months ago Already we are seeing far higher business engagement
That’s The End Questions?  I’ll answer the ones I can

Weitere ähnliche Inhalte

Was ist angesagt?

Emr powerpoint for IPM
Emr powerpoint for IPMEmr powerpoint for IPM
Emr powerpoint for IPM
Anna Tonnu
 
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
UsmanYakubuMaaruf
 
Software Blue
Software BlueSoftware Blue
Software Blue
Pradeep
 

Was ist angesagt? (20)

Ghana Medical Banking Institute
Ghana Medical Banking InstituteGhana Medical Banking Institute
Ghana Medical Banking Institute
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
EMR Presentation - The Time is Now
EMR Presentation - The Time is NowEMR Presentation - The Time is Now
EMR Presentation - The Time is Now
 
Himss Revenue Cycle Task Force Panel Presentation[1]
Himss Revenue Cycle Task Force Panel Presentation[1]Himss Revenue Cycle Task Force Panel Presentation[1]
Himss Revenue Cycle Task Force Panel Presentation[1]
 
Overview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy SanyalOverview of Electronic Medical Records - Sanjoy Sanyal
Overview of Electronic Medical Records - Sanjoy Sanyal
 
Emr powerpoint for IPM
Emr powerpoint for IPMEmr powerpoint for IPM
Emr powerpoint for IPM
 
PSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS CommunityPSOW 2016 - HIPAA Compliance for EMS Community
PSOW 2016 - HIPAA Compliance for EMS Community
 
Preventative Malpractice Insurance_02
Preventative Malpractice Insurance_02Preventative Malpractice Insurance_02
Preventative Malpractice Insurance_02
 
Media presentation (social impact of technology)ppt
Media presentation (social impact of technology)pptMedia presentation (social impact of technology)ppt
Media presentation (social impact of technology)ppt
 
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDSBENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
BENEFITS AND CHALLENGES TO THE ADOPTION OF ELECTRONIC MEDICAL RECORDS
 
Software Blue
Software BlueSoftware Blue
Software Blue
 
Vitas Presentation Version 2
Vitas Presentation Version 2Vitas Presentation Version 2
Vitas Presentation Version 2
 
Medical Billing Service a Top Concern for Many Physicians
  Medical Billing Service a Top Concern for Many Physicians  Medical Billing Service a Top Concern for Many Physicians
Medical Billing Service a Top Concern for Many Physicians
 
Remaking The Electronic Health Record
Remaking The Electronic Health RecordRemaking The Electronic Health Record
Remaking The Electronic Health Record
 
KP in American Healthcare System
KP in American Healthcare SystemKP in American Healthcare System
KP in American Healthcare System
 
Health Bit Webinar 612010
Health Bit Webinar 612010Health Bit Webinar 612010
Health Bit Webinar 612010
 
Making Sense of Health Information Systems
Making Sense of Health Information SystemsMaking Sense of Health Information Systems
Making Sense of Health Information Systems
 
Cuban American Medical Society Presentation[1]
 Cuban American Medical Society Presentation[1] Cuban American Medical Society Presentation[1]
Cuban American Medical Society Presentation[1]
 
Sentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI applicationSentry Data Systems Revenue Cycle BI application
Sentry Data Systems Revenue Cycle BI application
 
Hitech Act and How It Impacts EHR
Hitech Act and How It Impacts EHRHitech Act and How It Impacts EHR
Hitech Act and How It Impacts EHR
 

Andere mochten auch

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
TheAnfieldGroup
 
Conversion
ConversionConversion
Conversion
neicher
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
Shane Glenn
 

Andere mochten auch (9)

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
Conversion
ConversionConversion
Conversion
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015Cyber Securing Physical Security May 2015
Cyber Securing Physical Security May 2015
 
Integrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and BusinessIntegrated Physical and Cybersecurity for Governments and Business
Integrated Physical and Cybersecurity for Governments and Business
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
CIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control ConvergenceCIS14: Physical and Logical Access Control Convergence
CIS14: Physical and Logical Access Control Convergence
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 

Ähnlich wie Keynote

Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
wlynn1
 
What Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice ModelsWhat Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice Models
mjmcgaunn
 
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Erik Ginalick
 

Ähnlich wie Keynote (20)

2016 IBM Interconnect - medical devices transformation
2016 IBM Interconnect  - medical devices transformation2016 IBM Interconnect  - medical devices transformation
2016 IBM Interconnect - medical devices transformation
 
Sharing EHRs - The Canadian Experience
Sharing EHRs - The Canadian ExperienceSharing EHRs - The Canadian Experience
Sharing EHRs - The Canadian Experience
 
Introduction to EMR
Introduction to EMRIntroduction to EMR
Introduction to EMR
 
EMR Intro
EMR IntroEMR Intro
EMR Intro
 
How a healthcare management system (hms) is improving hospitals and clinics
How a healthcare management system (hms) is improving hospitals and clinicsHow a healthcare management system (hms) is improving hospitals and clinics
How a healthcare management system (hms) is improving hospitals and clinics
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Healthcare Thinktank Roundtable
Healthcare Thinktank RoundtableHealthcare Thinktank Roundtable
Healthcare Thinktank Roundtable
 
Kaiser Permanente HealthConnect - EHR and SNOMED
Kaiser Permanente HealthConnect - EHR and SNOMEDKaiser Permanente HealthConnect - EHR and SNOMED
Kaiser Permanente HealthConnect - EHR and SNOMED
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Data-driven Healthcare for Providers
Data-driven Healthcare for ProvidersData-driven Healthcare for Providers
Data-driven Healthcare for Providers
 
Data driven Healthcare for Providers
Data driven Healthcare for ProvidersData driven Healthcare for Providers
Data driven Healthcare for Providers
 
What Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice ModelsWhat Veterinarians Can Learn From Physician Practice Models
What Veterinarians Can Learn From Physician Practice Models
 
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
Electronic Health Records Protecting Assets With A Solid Security Plan Wp101207
 
Caredojo
CaredojoCaredojo
Caredojo
 
Caredojo
CaredojoCaredojo
Caredojo
 
Willowglade - Investment Brief 2016
Willowglade - Investment Brief  2016Willowglade - Investment Brief  2016
Willowglade - Investment Brief 2016
 
Anatomy of an EMR System
Anatomy of an EMR SystemAnatomy of an EMR System
Anatomy of an EMR System
 
Risk management in Healthcare on Cloud
Risk management in Healthcare on CloudRisk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
 
Revenue Cycle Management
Revenue Cycle ManagementRevenue Cycle Management
Revenue Cycle Management
 
Insights success the 10 fastest growing healthcare solutions provider compani...
Insights success the 10 fastest growing healthcare solutions provider compani...Insights success the 10 fastest growing healthcare solutions provider compani...
Insights success the 10 fastest growing healthcare solutions provider compani...
 

Mehr von Source Conference

Mehr von Source Conference (20)

Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
iBanking - a botnet on Android
iBanking - a botnet on AndroidiBanking - a botnet on Android
iBanking - a botnet on Android
 
I want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUICI want the next generation web here SPDY QUIC
I want the next generation web here SPDY QUIC
 
From DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and BobsFrom DNA Sequence Variation to .NET Bits and Bobs
From DNA Sequence Variation to .NET Bits and Bobs
 
Extracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus DerivativesExtracting Forensic Information From Zeus Derivatives
Extracting Forensic Information From Zeus Derivatives
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Wfuzz para Penetration Testers
Wfuzz para Penetration TestersWfuzz para Penetration Testers
Wfuzz para Penetration Testers
 
Security Goodness with Ruby on Rails
Security Goodness with Ruby on RailsSecurity Goodness with Ruby on Rails
Security Goodness with Ruby on Rails
 
Securty Testing For RESTful Applications
Securty Testing For RESTful ApplicationsSecurty Testing For RESTful Applications
Securty Testing For RESTful Applications
 
Esteganografia
EsteganografiaEsteganografia
Esteganografia
 
Men in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the BrowserMen in the Server Meet the Man in the Browser
Men in the Server Meet the Man in the Browser
 
Advanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done ItAdvanced Data Exfiltration The Way Q Would Have Done It
Advanced Data Exfiltration The Way Q Would Have Done It
 
Adapting To The Age Of Anonymous
Adapting To The Age Of AnonymousAdapting To The Age Of Anonymous
Adapting To The Age Of Anonymous
 
Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?Are Agile And Secure Development Mutually Exclusive?
Are Agile And Secure Development Mutually Exclusive?
 
Advanced (persistent) binary planting
Advanced (persistent) binary plantingAdvanced (persistent) binary planting
Advanced (persistent) binary planting
 
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to CloudLegal/technical strategies addressing data risks as perimeter shifts to Cloud
Legal/technical strategies addressing data risks as perimeter shifts to Cloud
 
Who should the security team hire next?
Who should the security team hire next?Who should the security team hire next?
Who should the security team hire next?
 
The Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime LawThe Latest Developments in Computer Crime Law
The Latest Developments in Computer Crime Law
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
How To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security SpendHow To: Find The Right Amount Of Security Spend
How To: Find The Right Amount Of Security Spend
 

Kürzlich hochgeladen

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Kürzlich hochgeladen (20)

Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 

Keynote

  • 1. I Volunteered To Do This? Eric Cowperthwaite Providence Health & Services SOURCE Seattle, June 16, 2011
  • 2. About Providence 27 hospitals located in 5 states Over 160 other facilities, including Physician clinics, long term care, laboratories, billing & debt collection A health plan with over 400,000 members A liberal arts university, private high school, several daycares $8 billion in annual revenue and $9 billion in assets $500 million in annual community benefit 7200 acute and long term care beds More than 7 million primary care and acute outpatient visits Tier 2 PCI Merchant with more than 2 million annual transactions 40,000 end points (PC, laptop, tablet) and 5,000 servers Among the 5 largest Catholic Healthcare Systems in the nation Patient records on approx 10 million people on the west coast
  • 3. Tapes, laptops and viruses … Oh My Jan 1, 2006 – tapes containing data on more than 380,000 patients are stolen. Tapes are not encrypted Feb, 2006 – 3 laptops containing data on more than 1,000 patients are stolen. Laptops are not encrypted Mar, 2006 – a hospital goes to “downtime procedures” due to malware infections in 80% of PC’s and laptops. A/V software is 2 versions old and signatures out of date. Feb – Apr, 2006 – EDS SPPS conducts gap analysis, forensics, etc. and recommends to the Board the institution of a formal Information Security program, including hiring a security executive May 15, 2006 – Eric Cowperthwaite’s first day at Providence Jun – Sep, 2006 - HHS is onsite, investigating Providence actions and interviewing employees.
  • 4. Reflecting on being a CSO in a Crisis I was approached 3 times, third time a friend told me they were serious The Board and senior execs were serious Middle management viewed the crisis as a drain on budget and resources Going from crisis to sustained maturity is a 3 to 5 year journey Make darn sure that your soon to be new employer wants to solve their problem, even if they don’t know what it is yet Security staff has to be absolutely top notch, in both terms of hard and soft skills You have to be prepared for a lot of hard knocks and dynamically changing your plans and programs to adapt to reality
  • 5. Worst Imaginable Environment Every business unit is responsible for it’s own IT – 10 CIOs 80% of my employees are professionals, I have 40,000 college degrees to deal with Financial accountability is decentralized Healthcare is used to delivering locally Everything is viewed as negotiable
  • 6. Understanding the Business Failing to understand the needs of the business means a new CSO will lead them through the remainder of the crisis Lower healthcare costs Healthcare costs rising faster than inflation National political debate Massive pressure to “transform” healthcare Increased Quality Improve outcomes Reduce infections, injuries and mortality in hospitals Standardize healthcare so everyone gets the same quality of care Community Benefit – continuing to provide for the poor & vulnerable Managing operating expenses – Good stewardship of our resources
  • 7. What Did We Do? Established a formal Information Security program, with visibility all the way to the Board of Directors Created an executive position to lead that program, i.e. the CSO Reviewed and analyzed policy and standards Established a security controls framework Joint Commission for Accreditation of Healthcare Organizations PCI DSS HIPAA Security & Privacy Rules National Institute of Standards & Technology ISO 27001:2 Implemented new and improved security controls, for example: All at rest data encrypted on devices that are mobile (tapes, laptops, phones, etc) Data loss prevention Co-sourced security management controls (i.e. SIEM, firewalls, IDS/IPS)
  • 8. What Did Our Regulators Do? HHS received multiple complaints that we had violated the Privacy and Security rules Class Action lawsuit filed in Oregon All lawsuits were dismissed, including appeals by the plaintiffs We were very transparent with the OR & WA Attorney Generals No AG found that Providence had caused harm or broken state laws HHS and Providence signed a Resolution Agreement on 7/15/08 3 years, established specific control and reporting requirements No FTC Consent Decree Providence CISO established as Agreement Monitor $100,000 administrative fee Providence did not admit to a violation of HIPAA or other law or regulation
  • 9. Building Security Sustainability We started with Multiple point solutions Too many vendors Too much cost and not enough controls Managed by security Principles Fit for purpose Managed by appropriate IT operations organizations Reduce the number of vendors to manage Select vendors with suites or broad product offerings Reduce cost, both product acquisition and operations Governance vs. Operations Separate GRC, ITSec, InfoSec functions
  • 10. Next: Enterprise Risk Management Today we are building Enterprise Risk Management All security operations is managed within appropriate parts of the business Technical security controls are delivered by the CIO, not the CISO Line of business delivers administrative controls, education, awareness The CISO delivers Governance, Risk Management & Compliance Chief Risk Officer is independent of the business operations Reports to the Chair of the Board’s Audit Committee CISO, CPO, Insurance, Internal Audit, Compliance all report to the CRO We started this path about 9 months ago Already we are seeing far higher business engagement
  • 11. That’s The End Questions? I’ll answer the ones I can