SlideShare a Scribd company logo
1 of 22
Download to read offline
© 2014 Silverline – Confidential Do Not Distribute© 2014 Silverline – Confidential Do Not Distribute
© 2014 Silverline – Confidential Do Not Distribute
© 2014 Silverline – Confidential Do Not Distribute
The Michigan Health Information Network (MiHIN) is Michigan's
initiative to improve health care quality, efficient, and patient stagey
through the sharing of electronic health information, while reducing
costs.
• Official state designed entity for health information exchange across
Michigan and through integration with the eHealth Exchange.
• Nonprofit entity, functioning as a public and private collaboration between
the State of Michigan , sub-state health Information Exchanges, payers,
providers, and patients.
© 2014 Silverline – Confidential Do Not Distribute
• Who is Silverline?
• What can the Cloud do?
• Deploying the Cloud
• Security in the Cloud
• An example of the Cloud
• HIPAA and the Cloud
© 2014 Silverline – Confidential Do Not Distribute
• Serial Consultant
• Startups
• Cloud
© 2014 Silverline – Confidential Do Not Distribute
Headquartered in NYC with
resources around the US.
110
9.8/10
700+ Salesforce Deployments
Healthcare, Financial Services,
and Force.com
Provider, Health Plans,
Medical Devices, Wellness
Tools, Care Management
Services, Staffing/Recruiting
Firms
CalendarAnything, Visual
Relationship Mapping, and
The Watercooler: An Intranet
Platform
© 2014 Silverline – Confidential Do Not Distribute
Not Using the Cloud
Using the Cloud
70%
30%
© 2014 Silverline – Confidential Do Not Distribute
• Device Agnostic
• Predictable costs
• Reduced complexity due to coordination of hardware and software
• Faster and rapid deployment
• Universal access
• Proven management tools
• Streamlined M&A integration
• Realignment of IT resources to business imperatives
• Enhanced collaboration
• Improved analytics across applications
• Lack of tangible asset storage
…among others
© 2014 Silverline – Confidential Do Not Distribute
Health Plans
Improve visibility, collaboration, management,
and control over ongoing insurance policy
approvals, renewals, and changes with
sophisticated workflow and data validation
rules.
Medical Devices
Consolidate, Coordinate,
and Automate
Marketing/Sales Activities
and Streamline M&A Activity
Medical Supply
Replace ERPs. Consolidation of sales, inventory
management, and customer service into one
application, manage marketing efforts, track and
manage customer rewards, management and executive
dashboards
Healthcare Services
Automate and coordinate patient
lifecycle management and serve as
a lynch-pin between multiple
systems (inquiry, clinical,
scheduling & billing)
Health Information Network
Relationships between providers, patient care coordination, promote care
teams, connect patients, doctors, and healthcare facilities. TOC Notifications
© 2014 Silverline – Confidential Do Not Distribute
• Poor Information
o Messaging around cloud technology is often inaccurate, complex, and
not tailored to the audience. Leading to hesitancy and confusion,
rather than excitement and adoption
• Ambivalence
o “Cloud” represents leading-edge technology, the problem is that the
word “cloud” has become associated with so many different solutions,
products, apps, and offerings that people tend to disregard the value
• Lack of Trust
o Security is not the issue with cloud; trust is.
© 2014 Silverline – Confidential Do Not Distribute
• Applications designed for end-users delivered over
the web
• Examples – Salesforce, Workday, Concur
Software as a
Service (SaaS)
“Consume the Cloud”
• A set of tools and services designed to make coding
and deploying those applications quick and efficient
• Examples – Force.com, Google App Engine
Platform as a
Service (PaaS)
“Leverage the Cloud”
• The hardware and software that powers it all –
servers, storage, networks, operating systems
• Examples – Amazon Web Services, Azure, Rackspace
Infrastructure as
a Service (IaaS)
“Be a Cloud”
*Rackspace.com - “Whitepaper: Understanding the Cloud Computing Stack: SaaS, PaaS, IaaS”
*Blogs.technet.com – Cho’s Theories of Cloud Computing”
© 2014 Silverline – Confidential Do Not Distribute
Multi-tenant
Shared infrastructure and costs
Utility model
Service provider hosted
Single-tenant
No shared infrastructure
Higher, yet fixed cost
Greater flexibility
Highest level of security
Hosted at provider or enterprise
Composition of multiple cloud
environments (public/private)
Public
40%
*TechTarget's fall 2013 Cloud Pulse survey
Private
22%
Hybrid
38%
© 2014 Silverline – Confidential Do Not Distribute
• Defining secure infrastructure models
• Lack of trust between participants in cloud ecosystems
• Bridging the gap between existing internal security standards and
those governing off-premise services.
• Loss of governance
• Responsibility ambiguity – deployment model plays a role
• Isolation failure – mechanisms separating storage/memory/ routing
• Vendor lock-in
• Compounded malicious behavior
• Service unavailability
*Symantec – “The Secure Cloud: Best Practices for Cloud Adoption
*Cloud Standards Customer Council – Security for Cloud Computing – 10 Steps to Ensure Success
© 2014 Silverline – Confidential Do Not Distribute
*2014 Microsoft - Security Trends in Healthcare
Conduct
system-wide
data backups
that are
regularly
tested
Do not use
standardized
data
classification
Have a
disaster
recovery
program
Do not have
asset
management
policies and
conduct
asset
discovery
manually
Have
ineffective
controls for
removing
access when
employees
leave or are
reassigned
Have
immature
security
policies
© 2014 Silverline – Confidential Do Not Distribute
*Eran Feigenbaum – Director of Security for GoogleApps
30%
Using the Cloud
*Computerworld.com – “Cloud security concerns are overblown experts say”, Intermap Survey
Cloud-wary = 40% Cloud-wise = 15%
© 2014 Silverline – Confidential Do Not Distribute
*Symantec – “The Secure Cloud: Best Practices for Cloud Adoption
Infrastructure: How can you ensure that your infrastructure
providers have appropriate security and disaster recovery
policies and stick to them?
Identity: How can you enforce rigorous authentication across
multiple interconnected systems without adversely affecting
flexibility and productivity?
Information: How can you classify and protect sensitive
information, and ensure compliance with policies and
regulations?
© 2014 Silverline – Confidential Do Not Distribute
Preventative Corrective Detective
*Wikipedia
Set in place to
prevent any
purposeful attack on
a cloud system.
Much like a warning
sign on a fence or
property, these
controls do not
reduce the
vulnerability of the
system
Upgrade the
strength of the
system by managing
and safeguarding
vulnerabilities. They
cover the attack and
reduce the damage
and violation when
an attack occurs
Used to reduce the
effect of an attack.
Take action as an
attack is occurring.
Used to detect any
attacks that may be
occurring in the
system. In the event
of an attack, the
detective control will
signal the
preventative or
corrective controls
Deterrent
© 2014 Silverline – Confidential Do Not Distribute
• Conduct a full risk and compliance assessment, including processes
o Interoperability and portability
o Compliance – business continuity, data recovery, logs/audit trails
o Vendor risk
o Supply chain and ecosystem
o Infrastructure and operations quality
• Secure your own information, people, identities, and roles
o User privileges
o Authentication
o Endpoint security (where applicable)
o Encryption (where applicable)
• Implement a strong governance framework
• Embrace a security-by-design approach
• Implement an active monitoring solution
*Symantec – “The Secure Cloud: Best Practices for Cloud Adoption
*Cloud Standards Customer Council – Security for Cloud Computing – 10 Steps to Ensure Success
• Evaluate security controls on physical infrastructure
and facilities
© 2014 Silverline – Confidential Do Not Distribute
• SMS Identify Confirmation
• IP Range Restrictions
• Two-factor authentication options
(outside of username/pw)
• Secure employee systems
o Updated browsers
o Email filters
o Device protection
• SAS 70 Type II, SysTrust, and ISO 27001
• Enhanced password policies
• Secure sessions
• Session timeout thresholds
• Transparency of instances
• Governance (employees, security staff,
counsel, assessments, policies)
• Incorporation into development process
*Salesforce.com
Data
Database Security
Host Security
Network Security
Physical Security
Operational Security
© 2014 Silverline – Confidential Do Not Distribute
*Salesforce.com
© 2014 Silverline – Confidential Do Not Distribute
• “Final Rule” – BAAs and SLAs are critical!
• Security and privacy controls
• Define an exit strategy
• HIPAA ready/certified vs. HIPAA compliant/audited
• Industry background of vendor – regulatory environment
• Understand encryption of health information – LCD for encryption
• Ensure data segregation, especially PHI – physical/electronic proximity
• Understand the cloud delivery model – public/private/hybrid
• Evaluate breach monitoring
• MU informing HIPAA - CMS vs. Office of Civil Rights (OCR)
*HealthITSecurity – How HIPAA affects Healthcare cloud computing decisions
*HIPAA Considerations in Evaluating Cloud Computing – Ober | Kaler
© 2014 Silverline – Confidential Do Not Distribute

More Related Content

What's hot

Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaard
Christian Wernberg-Tougaard
 
New world software sitefinity presentation
New world software sitefinity presentationNew world software sitefinity presentation
New world software sitefinity presentation
chandrasekhar buddha
 

What's hot (20)

Intelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business GroupIntelligent Agent - Accenture Google Cloud Business Group
Intelligent Agent - Accenture Google Cloud Business Group
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 
Manufacturing and the data conundrum
Manufacturing and the data conundrumManufacturing and the data conundrum
Manufacturing and the data conundrum
 
Oracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaardOracle Social Welfare and the Cloud - WernbergTougaard
Oracle Social Welfare and the Cloud - WernbergTougaard
 
Infinite investor presentation March 2013
Infinite investor presentation   March 2013Infinite investor presentation   March 2013
Infinite investor presentation March 2013
 
Key trend in strategic sourcing
Key trend in strategic sourcing Key trend in strategic sourcing
Key trend in strategic sourcing
 
Accenture: ACIC Rome & Red Hat
Accenture: ACIC Rome & Red HatAccenture: ACIC Rome & Red Hat
Accenture: ACIC Rome & Red Hat
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
 
New world software sitefinity presentation
New world software sitefinity presentationNew world software sitefinity presentation
New world software sitefinity presentation
 
Delivering applications at the pace of business
Delivering applications at the pace of businessDelivering applications at the pace of business
Delivering applications at the pace of business
 
Pwc digital-iq-report final
Pwc digital-iq-report finalPwc digital-iq-report final
Pwc digital-iq-report final
 
Journey to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - AccentureJourney to Cloud - Enabling the Digital Enterprise - Accenture
Journey to Cloud - Enabling the Digital Enterprise - Accenture
 
Taking Windows Containers to Enterprise Level
Taking Windows Containers to Enterprise LevelTaking Windows Containers to Enterprise Level
Taking Windows Containers to Enterprise Level
 
Nff 15112011 education from the cloud
Nff 15112011 education from the cloudNff 15112011 education from the cloud
Nff 15112011 education from the cloud
 
VEA Services Portfolio
VEA  Services  PortfolioVEA  Services  Portfolio
VEA Services Portfolio
 
Government Innovation Country Specific Report - Australia
Government Innovation Country Specific Report - AustraliaGovernment Innovation Country Specific Report - Australia
Government Innovation Country Specific Report - Australia
 
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019Oracle Technology Vision Accenture Technology Vision for Oracle 2019
Oracle Technology Vision Accenture Technology Vision for Oracle 2019
 
Accenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-valueAccenture cloud-ascent-how-to-maximize-its-value
Accenture cloud-ascent-how-to-maximize-its-value
 
Accenture & Commvault
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
 
Conf 2018 Track 1 - Aerospace Innovation
Conf 2018 Track 1 - Aerospace InnovationConf 2018 Track 1 - Aerospace Innovation
Conf 2018 Track 1 - Aerospace Innovation
 

Similar to HEALTHCARE, THE CLOUD, AND ITS SECURITY

2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
promediakw
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
Ajay Rathi
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
patmisasi
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
Career Communications Group
 

Similar to HEALTHCARE, THE CLOUD, AND ITS SECURITY (20)

Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
 
Webinar compiled powerpoint
Webinar compiled powerpointWebinar compiled powerpoint
Webinar compiled powerpoint
 
2014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v012014 2nd me cloud conference trust in the cloud v01
2014 2nd me cloud conference trust in the cloud v01
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?Cloud - Everyone is doing it, But is it safe?
Cloud - Everyone is doing it, But is it safe?
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
Checklist for Competent Cloud Security Management
Checklist for Competent Cloud Security ManagementChecklist for Competent Cloud Security Management
Checklist for Competent Cloud Security Management
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
GRC Dynamics in Securing Cloud
GRC Dynamics in Securing CloudGRC Dynamics in Securing Cloud
GRC Dynamics in Securing Cloud
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Securing your Cloud Deployment
Securing your Cloud DeploymentSecuring your Cloud Deployment
Securing your Cloud Deployment
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
CyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT SecurityCyberSecurity in a World of Connected Devices: IoT Security
CyberSecurity in a World of Connected Devices: IoT Security
 
The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think The most trusted, proven enterprise-class Cloud:Closer than you think
The most trusted, proven enterprise-class Cloud:Closer than you think
 

Recently uploaded

Low Rate Call Girls Goa {9xx000xx09} ❤️VVIP NISHA CCall Girls in Goa Escort s...
Low Rate Call Girls Goa {9xx000xx09} ❤️VVIP NISHA CCall Girls in Goa Escort s...Low Rate Call Girls Goa {9xx000xx09} ❤️VVIP NISHA CCall Girls in Goa Escort s...
Low Rate Call Girls Goa {9xx000xx09} ❤️VVIP NISHA CCall Girls in Goa Escort s...
Sheetaleventcompany
 
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Sheetaleventcompany
 
DME deep margin elevation brief ppt.pptx
DME deep margin elevation brief ppt.pptxDME deep margin elevation brief ppt.pptx
DME deep margin elevation brief ppt.pptx
mcrdalialsayed
 
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Sheetaleventcompany
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
dilpreetentertainmen
 
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Sheetaleventcompany
 
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Sheetaleventcompany
 
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Sheetaleventcompany
 

Recently uploaded (20)

Low Rate Call Girls Goa {9xx000xx09} ❤️VVIP NISHA CCall Girls in Goa Escort s...
Low Rate Call Girls Goa {9xx000xx09} ❤️VVIP NISHA CCall Girls in Goa Escort s...Low Rate Call Girls Goa {9xx000xx09} ❤️VVIP NISHA CCall Girls in Goa Escort s...
Low Rate Call Girls Goa {9xx000xx09} ❤️VVIP NISHA CCall Girls in Goa Escort s...
 
💸Cash Payment No Advance Call Girls Kolkata 🧿 9332606886 🧿 High Class Call Gi...
💸Cash Payment No Advance Call Girls Kolkata 🧿 9332606886 🧿 High Class Call Gi...💸Cash Payment No Advance Call Girls Kolkata 🧿 9332606886 🧿 High Class Call Gi...
💸Cash Payment No Advance Call Girls Kolkata 🧿 9332606886 🧿 High Class Call Gi...
 
2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology2024 PCP #IMPerative Updates in Rheumatology
2024 PCP #IMPerative Updates in Rheumatology
 
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
Low Rate Call Girls Pune {9xx000xx09} ❤️VVIP NISHA Call Girls in Pune Maharas...
 
DME deep margin elevation brief ppt.pptx
DME deep margin elevation brief ppt.pptxDME deep margin elevation brief ppt.pptx
DME deep margin elevation brief ppt.pptx
 
💞 Safe And Secure Call Girls gaya 🧿 9332606886 🧿 High Class Call Girl Service...
💞 Safe And Secure Call Girls gaya 🧿 9332606886 🧿 High Class Call Girl Service...💞 Safe And Secure Call Girls gaya 🧿 9332606886 🧿 High Class Call Girl Service...
💞 Safe And Secure Call Girls gaya 🧿 9332606886 🧿 High Class Call Girl Service...
 
❤️Chandigarh Escorts☎️9814379184☎️ Call Girl service in Chandigarh☎️ Chandiga...
❤️Chandigarh Escorts☎️9814379184☎️ Call Girl service in Chandigarh☎️ Chandiga...❤️Chandigarh Escorts☎️9814379184☎️ Call Girl service in Chandigarh☎️ Chandiga...
❤️Chandigarh Escorts☎️9814379184☎️ Call Girl service in Chandigarh☎️ Chandiga...
 
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9815457724☎️ Call Girl service in Chandigarh☎️ ...
 
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
Call Girls Amritsar Just Call Ruhi 8725944379 Top Class Call Girl Service Ava...
 
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
🍑👄Ludhiana Escorts Service☎️98157-77685🍑👄 Call Girl service in Ludhiana☎️Ludh...
 
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
Low Rate Call Girls Nagpur {9xx000xx09} ❤️VVIP NISHA Call Girls in Nagpur Mah...
 
Independent Call Girls Service Chandigarh | 8868886958 | Call Girl Service Nu...
Independent Call Girls Service Chandigarh | 8868886958 | Call Girl Service Nu...Independent Call Girls Service Chandigarh | 8868886958 | Call Girl Service Nu...
Independent Call Girls Service Chandigarh | 8868886958 | Call Girl Service Nu...
 
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
Low Rate Call Girls Jaipur {9521753030} ❤️VVIP NISHA CCall Girls in Jaipur Es...
 
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
❤️Zirakpur Escorts☎️7837612180☎️ Call Girl service in Zirakpur☎️ Zirakpur Cal...
 
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
Low Rate Call Girls Udaipur {9xx000xx09} ❤️VVIP NISHA CCall Girls in Udaipur ...
 
❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
❤️Chandigarh Escorts Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ ...
 
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
❤️Chandigarh Escort Service☎️9814379184☎️ Call Girl service in Chandigarh☎️ C...
 
💞 Safe And Secure Call Girls Nanded 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Nanded 🧿 9332606886 🧿 High Class Call Girl Servi...💞 Safe And Secure Call Girls Nanded 🧿 9332606886 🧿 High Class Call Girl Servi...
💞 Safe And Secure Call Girls Nanded 🧿 9332606886 🧿 High Class Call Girl Servi...
 
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...
❤️Amritsar Escort Service☎️9815674956☎️ Call Girl service in Amritsar☎️ Amrit...
 
Call Girls Service 11 Phase Mohali {7435815124} ❤️ MONA Call Girl in Mohali P...
Call Girls Service 11 Phase Mohali {7435815124} ❤️ MONA Call Girl in Mohali P...Call Girls Service 11 Phase Mohali {7435815124} ❤️ MONA Call Girl in Mohali P...
Call Girls Service 11 Phase Mohali {7435815124} ❤️ MONA Call Girl in Mohali P...
 

HEALTHCARE, THE CLOUD, AND ITS SECURITY

  • 1. © 2014 Silverline – Confidential Do Not Distribute© 2014 Silverline – Confidential Do Not Distribute
  • 2. © 2014 Silverline – Confidential Do Not Distribute
  • 3. © 2014 Silverline – Confidential Do Not Distribute The Michigan Health Information Network (MiHIN) is Michigan's initiative to improve health care quality, efficient, and patient stagey through the sharing of electronic health information, while reducing costs. • Official state designed entity for health information exchange across Michigan and through integration with the eHealth Exchange. • Nonprofit entity, functioning as a public and private collaboration between the State of Michigan , sub-state health Information Exchanges, payers, providers, and patients.
  • 4. © 2014 Silverline – Confidential Do Not Distribute • Who is Silverline? • What can the Cloud do? • Deploying the Cloud • Security in the Cloud • An example of the Cloud • HIPAA and the Cloud
  • 5. © 2014 Silverline – Confidential Do Not Distribute • Serial Consultant • Startups • Cloud
  • 6. © 2014 Silverline – Confidential Do Not Distribute Headquartered in NYC with resources around the US. 110 9.8/10 700+ Salesforce Deployments Healthcare, Financial Services, and Force.com Provider, Health Plans, Medical Devices, Wellness Tools, Care Management Services, Staffing/Recruiting Firms CalendarAnything, Visual Relationship Mapping, and The Watercooler: An Intranet Platform
  • 7. © 2014 Silverline – Confidential Do Not Distribute Not Using the Cloud Using the Cloud 70% 30%
  • 8. © 2014 Silverline – Confidential Do Not Distribute • Device Agnostic • Predictable costs • Reduced complexity due to coordination of hardware and software • Faster and rapid deployment • Universal access • Proven management tools • Streamlined M&A integration • Realignment of IT resources to business imperatives • Enhanced collaboration • Improved analytics across applications • Lack of tangible asset storage …among others
  • 9. © 2014 Silverline – Confidential Do Not Distribute Health Plans Improve visibility, collaboration, management, and control over ongoing insurance policy approvals, renewals, and changes with sophisticated workflow and data validation rules. Medical Devices Consolidate, Coordinate, and Automate Marketing/Sales Activities and Streamline M&A Activity Medical Supply Replace ERPs. Consolidation of sales, inventory management, and customer service into one application, manage marketing efforts, track and manage customer rewards, management and executive dashboards Healthcare Services Automate and coordinate patient lifecycle management and serve as a lynch-pin between multiple systems (inquiry, clinical, scheduling & billing) Health Information Network Relationships between providers, patient care coordination, promote care teams, connect patients, doctors, and healthcare facilities. TOC Notifications
  • 10. © 2014 Silverline – Confidential Do Not Distribute • Poor Information o Messaging around cloud technology is often inaccurate, complex, and not tailored to the audience. Leading to hesitancy and confusion, rather than excitement and adoption • Ambivalence o “Cloud” represents leading-edge technology, the problem is that the word “cloud” has become associated with so many different solutions, products, apps, and offerings that people tend to disregard the value • Lack of Trust o Security is not the issue with cloud; trust is.
  • 11. © 2014 Silverline – Confidential Do Not Distribute • Applications designed for end-users delivered over the web • Examples – Salesforce, Workday, Concur Software as a Service (SaaS) “Consume the Cloud” • A set of tools and services designed to make coding and deploying those applications quick and efficient • Examples – Force.com, Google App Engine Platform as a Service (PaaS) “Leverage the Cloud” • The hardware and software that powers it all – servers, storage, networks, operating systems • Examples – Amazon Web Services, Azure, Rackspace Infrastructure as a Service (IaaS) “Be a Cloud” *Rackspace.com - “Whitepaper: Understanding the Cloud Computing Stack: SaaS, PaaS, IaaS” *Blogs.technet.com – Cho’s Theories of Cloud Computing”
  • 12. © 2014 Silverline – Confidential Do Not Distribute Multi-tenant Shared infrastructure and costs Utility model Service provider hosted Single-tenant No shared infrastructure Higher, yet fixed cost Greater flexibility Highest level of security Hosted at provider or enterprise Composition of multiple cloud environments (public/private) Public 40% *TechTarget's fall 2013 Cloud Pulse survey Private 22% Hybrid 38%
  • 13. © 2014 Silverline – Confidential Do Not Distribute • Defining secure infrastructure models • Lack of trust between participants in cloud ecosystems • Bridging the gap between existing internal security standards and those governing off-premise services. • Loss of governance • Responsibility ambiguity – deployment model plays a role • Isolation failure – mechanisms separating storage/memory/ routing • Vendor lock-in • Compounded malicious behavior • Service unavailability *Symantec – “The Secure Cloud: Best Practices for Cloud Adoption *Cloud Standards Customer Council – Security for Cloud Computing – 10 Steps to Ensure Success
  • 14. © 2014 Silverline – Confidential Do Not Distribute *2014 Microsoft - Security Trends in Healthcare Conduct system-wide data backups that are regularly tested Do not use standardized data classification Have a disaster recovery program Do not have asset management policies and conduct asset discovery manually Have ineffective controls for removing access when employees leave or are reassigned Have immature security policies
  • 15. © 2014 Silverline – Confidential Do Not Distribute *Eran Feigenbaum – Director of Security for GoogleApps 30% Using the Cloud *Computerworld.com – “Cloud security concerns are overblown experts say”, Intermap Survey Cloud-wary = 40% Cloud-wise = 15%
  • 16. © 2014 Silverline – Confidential Do Not Distribute *Symantec – “The Secure Cloud: Best Practices for Cloud Adoption Infrastructure: How can you ensure that your infrastructure providers have appropriate security and disaster recovery policies and stick to them? Identity: How can you enforce rigorous authentication across multiple interconnected systems without adversely affecting flexibility and productivity? Information: How can you classify and protect sensitive information, and ensure compliance with policies and regulations?
  • 17. © 2014 Silverline – Confidential Do Not Distribute Preventative Corrective Detective *Wikipedia Set in place to prevent any purposeful attack on a cloud system. Much like a warning sign on a fence or property, these controls do not reduce the vulnerability of the system Upgrade the strength of the system by managing and safeguarding vulnerabilities. They cover the attack and reduce the damage and violation when an attack occurs Used to reduce the effect of an attack. Take action as an attack is occurring. Used to detect any attacks that may be occurring in the system. In the event of an attack, the detective control will signal the preventative or corrective controls Deterrent
  • 18. © 2014 Silverline – Confidential Do Not Distribute • Conduct a full risk and compliance assessment, including processes o Interoperability and portability o Compliance – business continuity, data recovery, logs/audit trails o Vendor risk o Supply chain and ecosystem o Infrastructure and operations quality • Secure your own information, people, identities, and roles o User privileges o Authentication o Endpoint security (where applicable) o Encryption (where applicable) • Implement a strong governance framework • Embrace a security-by-design approach • Implement an active monitoring solution *Symantec – “The Secure Cloud: Best Practices for Cloud Adoption *Cloud Standards Customer Council – Security for Cloud Computing – 10 Steps to Ensure Success • Evaluate security controls on physical infrastructure and facilities
  • 19. © 2014 Silverline – Confidential Do Not Distribute • SMS Identify Confirmation • IP Range Restrictions • Two-factor authentication options (outside of username/pw) • Secure employee systems o Updated browsers o Email filters o Device protection • SAS 70 Type II, SysTrust, and ISO 27001 • Enhanced password policies • Secure sessions • Session timeout thresholds • Transparency of instances • Governance (employees, security staff, counsel, assessments, policies) • Incorporation into development process *Salesforce.com Data Database Security Host Security Network Security Physical Security Operational Security
  • 20. © 2014 Silverline – Confidential Do Not Distribute *Salesforce.com
  • 21. © 2014 Silverline – Confidential Do Not Distribute • “Final Rule” – BAAs and SLAs are critical! • Security and privacy controls • Define an exit strategy • HIPAA ready/certified vs. HIPAA compliant/audited • Industry background of vendor – regulatory environment • Understand encryption of health information – LCD for encryption • Ensure data segregation, especially PHI – physical/electronic proximity • Understand the cloud delivery model – public/private/hybrid • Evaluate breach monitoring • MU informing HIPAA - CMS vs. Office of Civil Rights (OCR) *HealthITSecurity – How HIPAA affects Healthcare cloud computing decisions *HIPAA Considerations in Evaluating Cloud Computing – Ober | Kaler
  • 22. © 2014 Silverline – Confidential Do Not Distribute