SlideShare ist ein Scribd-Unternehmen logo
1 von 33
The Healthcare
Cybersecurity Framework:
A Top Defense Against Data
Breaches and Attacks
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
The Healthcare Cybersecurity Framework
Healthcare IT vendors have an immense
responsibility for an organization’s cyber-
security when they partner on software
and solutions, especially as breaches
and cyberattacks are on the rise in the
healthcare industry.
Digital technology and connectivity have
led to significant improvements in
healthcare delivery, but increased
integration enables more exposure to
cyberattacks that can impact care
delivery, safety, and privacy.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
The Healthcare Cybersecurity Framework
More than 93 percent of healthcare
organizations experienced a data breach
between 2017 and 2020, and 57 percent
have had more than five data breaches
during the same time frame.
Furthermore, researcher Cybersecurity
Ventures predicts healthcare will suffer
two to three times more cyberattacks in
2021 than the average amount for other
industries and that ransomware attacks
on healthcare organizations will grow
fivefold by 2021.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Sharing Responsibility:
The Cybersecurity Vendor-Partner Relationship
In a vendor-partner relationship, both
parties often share the security
responsibility, varying according to the
type of hosted infrastructure.
For example, in Figure 1, an on-premises
(or self-hosted) solution, the respons-
ibility and ownership fall more with the
partner and move to the vendor as the
hosted model moves towards software
as a service (SaaS).
Figure 1: Vendor-partner hosting relationships.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Sharing Responsibility:
The Cybersecurity Vendor-Partner Relationship
In contrast to the SaaS model in Figure 1, a
vendor (such as Health Catalyst and its
hosted Data Operating System (DOS™))
platform uses a platform as a service
(PaaS) model and move towards SaaS as
capabilities allow.
In a PaaS model, shared responsibilities
between the vendor and partner exist in
three main areas:
 Identity and directory infrastructure
 Applications
 Network controls
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Avoiding and Withstanding Attacks Requires a Hybrid Centralized
and Decentralized Healthcare Cybersecurity Framework
A healthcare IT vendor cybersecurity
framework aims to prevent data breaches from
occurring. Sometimes, however, bad actors
evade even the most robust measures.
For example, on December 13, 2020, the
Cybersecurity & Infrastructure Security Agency
(CISA) issued its second of five-ever-ordered
directives for its federal civilian agencies to
shut down an imminent threat involving
software from a vendor.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Avoiding and Withstanding Attacks Requires a Hybrid Centralized
and Decentralized Healthcare Cybersecurity Framework
A nation-state attacker compromised this
vendor’s product code to impact the supply
chain of organizations relying on the software
to monitor and manage their network
infrastructures.
The effects of this attack are only in their
first wave and will be long-lasting.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Avoiding and Withstanding Attacks Requires a Hybrid Centralized
and Decentralized Healthcare Cybersecurity Framework
While even the most comprehensive
security infrastructure can’t guarantee to
avert all threats, a security framework
must be robust enough for healthcare
cybersecurity teams to logically defend
their cybersecurity practices, even amid
the panic following a breach.
In other words, the goal is to build a
layered defense strategy so that a
compromise in any one layer would not
compromise the system as a whole.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Avoiding and Withstanding Attacks Requires a Hybrid Centralized
and Decentralized Healthcare Cybersecurity Framework
To galvanize cybersecurity across the
organization, C-suite leadership must
support the program.
The chief information security officer
(CISO) establishes centralized security
principles through a formalized
organizational information security
management program.
The full C-suite supports processes and
standards for decentralized execution
and adherence.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Avoiding and Withstanding Attacks Requires a Hybrid Centralized
and Decentralized Healthcare Cybersecurity Framework
In this hybrid centralized and decentralized
healthcare cybersecurity model, the CISO is
ultimately accountable for the cybersecurity
program, which reaches through each of the
other C-level business units to set
prioritization for security and privacy
compliance objectives.
Strong C-suite and board alignment also
helps align project investments.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Avoiding and Withstanding Attacks Requires a Hybrid Centralized
and Decentralized Healthcare Cybersecurity Framework
The CISO can earn organizationwide
support for centralized security
principles with ongoing third-party
audits and certifications.
As external, objective checkpoints,
third-party independent reports (versus
self-audit) identify gaps and misaligned
practices, holding security teams
accountable to established standards
and scheduled evaluations.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Avoiding and Withstanding Attacks Requires a Hybrid Centralized
and Decentralized Healthcare Cybersecurity Framework
The third-party independent perspective
offers a credible reference point for from
outside an organization’s view and eliminates
blind spots.
Involving a third party also adds value to
other external vendors with credibility
to leverage in their own vendor
security risk assessments.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
The operational policies and procedures
in place in a vendor-partner relationship
are paramount in achieving compliance
with the two entities’ regulatory and
certification strategies.
In the security posture in a shared-
responsibility model, the partner
depends on its vendor.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
In the healthcare industry, the Health Insurance
Portability and Accountability Act (HIPAA) is the
prevailing regulatory framework.
HIPAA typically defines the partner as the
covered entity (CE) and its vendor as the
business associate (BA).
The CE is responsible for performing due
diligence in vendor risk assessments on its
BAs to assess inherited risk where third
parties fulfill services or products.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
The BA has a fiduciary duty to its partner, and
in the context of HIPAA, to notify its partner
when it discovers a security incident, breach,
or disclosure under the terms defined in the
business associate agreement (BAA).
This arrangement allows the partner to fulfill
its regulatory requirement of reporting such
material events to appropriate authorities,
following a strategic cybersecurity framework.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
The following examples of ongoing third-party
audits and certifications support the
cybersecurity framework.
These measures help organizations maintain
cybersecurity standards and assure healthcare
organizations that their vendors treat seriously
the stewardship to protect the confidentiality,
integrity, and availability of the data:
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
Service Organization Controls
Health Catalyst utilizes System and
Organization Controls (SOC) compliance
that comprises a cybersecurity risk
management reporting framework.
Organizations that comply demonstrate
they are managing cybersecurity threats
and have effective processes and controls
in place to detect, respond to, mitigate,
and recover from breaches and other
security events.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
Service Organization Controls
The SOC 1® reports provide information about a service
organization’s control environment relevant to the
partner’s internal controls over financial reporting.
At Health Catalyst, for example, the SOC 1 report covers
the design and operating effectiveness of controls
relevant to the organization’s cloud hosting solution.
Vendor organizations receive SOC 1 Type II report per
Statements on Standards of Attestation Engagements
(SSAE) No. 18 (Reporting on Controls at a Service
Organization) and the International Standard on
Assurance Engagements (ISAE) 3402 (Assurance
Reports on Controls at a Service Organization).
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
Service Organization Controls
The SOC 2® report is annual, third-party independent
assessments of a control environment. The SOC 2 report
is based on the American Institute of CPAs’ (AICPA) Trust
Services Criteria and is issued annually following the
AICPA AT Section 101 of its attest engagements.
The report offers a retrospective 12-month audit. details
the design and operating effectiveness of controls
relevant to any system containing customer data as part
of a healthcare cloud hosting solution.
At Health Catalyst, the SOC 2 report addresses three of
the five AICPA Trust Services Criteria (security,
availability, and confidentiality).
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
HIPAA
Vendors may use HIPAA as a basis for their
security and privacy framework.
These third-party audits measure the
compliance with HIPAA and assure that the
organization has a HIPAA-compliance
program with adequate measures for
saving, accessing, and sharing individual
medical and personal information.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
Business Associate Agreements
Some organizations will sign BAAs at
their partner’s request.
These agreements ensure that partners
can meet the HIPAA and Health
Information Technology for Economic
and Clinical Health Act (HITECH)
compliance requirements.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
The Electronic Healthcare Network Accreditation Commission
Electronic Healthcare Network Accreditation
Commission (EHNAC) is a national standard
that indicates healthcare stakeholders have met
or exceeded EHNAC’s criteria.
These stakeholders include electronic healthcare
networks, financial services organizations,
medical billers, third party administrators,
outsourcers, ePrescribing networks, Healthcare
Information Service Providers (HISP), Practice
Management Systems vendors, and others.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
The Electronic Healthcare Network Accreditation Commission
The EHNAC criteria include conformance with
federal healthcare reform legislation, including
HIPAA, HITECH, American Recovery and
Reinvestment Act, the Affordable Care Act,
the HIPPA Omnibus Rule, and other applicable
state legislation.
Further, the criteria encompass privacy,
security, and confidentiality; technical
performance; business practices; and
resources.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
The Electronic Healthcare Network Accreditation Commission
EHNAC bases accreditation on independent peer
evaluation of an entity’s ability to perform at levels
based on industry-established criteria.
The accrediting process permits applicants to review
their current performance levels and bring those
levels according to industry-established minimums,
best practices, and conformance with applicable
federal and state healthcare reform legislation.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
HITRUST
The HITRUST cybersecurity framework (CSF)
leverages nationally and internationally accepted
standards, including ISO, National Institute of
Standards and Technology (NIST), PCI Security
Standards Council, and HIPAA, to ensure a
comprehensive set of baseline security controls.
The CSF normalizes these security requirements
and provides clarity and consistency, reducing the
burden of compliance with the varied requirements
that apply to organizations.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
International Organization for Standardization
The International Organization for Standardization (ISO) 27001 is a globally
recognized, standards-based approach to security that outlines requirements
for an organization’s cybersecurity management system.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Inside the Healthcare Cybersecurity Framework:
Third-Party Audits and Certifications
The NIST Cybersecurity Framework
The NIST CSF guides organizations on how
to improve their ability to prevent, detect, and
respond to cybersecurity risks.
The NIST 800-53 standard is a publication
that recommends security controls for federal
information systems and organizations and
documents security controls for all federal
information systems, except those designed
for national security.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
The Best Defensive Against Ongoing Cybersecurity Threats:
An Active and Optimized Healthcare Cybersecurity Program
As statistics show, healthcare data
breaches and cyberattacks are rarely
isolated, infrequent events, but rather
ongoing threats requiring constant
vigilance.
And with the mounting drive for more
connectivity throughout the industry,
health systems and their IT vendors
must prioritize an active and optimized
cybersecurity framework in their digital
and operational strategies.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
The Best Defensive Against Ongoing Cybersecurity Threats:
An Active and Optimized Healthcare Cybersecurity Program
The most secure protocols define the
security responsibility in the vendor-partner
relationship and hold vendors accountable
to routine audits and compliance measures.
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
For more information:
“This book is a fantastic piece of work”
– Robert Lindeman MD, FAAP, Chief Physician Quality Officer
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
More about this topic
Link to original article for a more in-depth discussion.
The Healthcare Cybersecurity Framework: A Top Defense Against Data Breaches and Attacks
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
Kevin Scharnhorst, Chief Information Security Officer at Health Catalyst
How Artificial Intelligence Can Overcome Healthcare Data Security Challenges and Improve Patient Trust
Health Catalyst Editors
Pairing HIE Data with an Analytics Platform: Four Key Improvement Categories
Adam Bell, Director of Clinical Advisory and Provider Outreach Services; Carol Owen, Senior VP, Interoperability
Dan Soule, VP Product Management; Eric Crawford, Head of Product - Interoperability, Analytics and Big Data
Exceptions to Information Blocking Defined in Proposed Rule: Here’s What You Need to Know
Daniel Orenstein, JD, Senior VP, General Counsel, and Secretary
Three Must-Haves for a Successful Healthcare Data Strategy
David Grauer, MBA, MHSA, Senior VP Professional Services
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Kevin is the Chief Information Security Officer at Health Catalyst. Prior to joining with
Health Catalyst, he worked for Blue Cross of Idaho in Boise, Idaho as a Service
Oriented Architecture (SOA) Development Manager and worked there for five years.
Before Blue Cross of Idaho, Kevin worked in the Hi-Tech sector within e-commerce
developing enabling technologies for Micron, a Semiconductor Manufacturer to sell and
distribute their product portfolio to consumers. Kevin has an Associates in Political
Science from BYI-Idaho, a Bachelor’s in Business Administration in Computer
Information Systems from Boise State University and a Master’s of Science in Medical Informatics from
Northwestern University. He continues to teach as an Instructor at Northwestern in the Masters of
Medical Informatics Program and also Computer Science at a local community college.
Other Clinical Quality Improvement Resources
Click to read additional information at www.healthcatalyst.com
Kevin Scharnhorst
© 2021 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Other Clinical Quality Improvement Resources
Click to read additional information at www.healthcatalyst.com
Health Catalyst is a mission-driven data warehousing, analytics and outcomes-improvement
company that helps healthcare organizations of all sizes improve clinical, financial, and operational
outcomes needed to improve population health and accountable care. Our proven enterprise data
warehouse (EDW) and analytics platform helps improve quality, add efficiency and lower costs in
support of more than 65 million patients for organizations ranging from the largest US health system
to forward-thinking physician practices.
Health Catalyst was recently named as the leader in the enterprise healthcare BI market in
improvement by KLAS, and has received numerous best-place-to work awards including Modern
Healthcare in 2013, 2014, and 2015, as well as other recognitions such as “Best Place to work for
Millenials, and a “Best Perks for Women.”

Weitere ähnliche Inhalte

Was ist angesagt?

Healthcare Data Management: Three Principles of Using Data to Its Full Potential
Healthcare Data Management: Three Principles of Using Data to Its Full PotentialHealthcare Data Management: Three Principles of Using Data to Its Full Potential
Healthcare Data Management: Three Principles of Using Data to Its Full PotentialHealth Catalyst
 
The Four Essential Zones of a Healthcare Data Lake
The Four Essential Zones of a Healthcare Data LakeThe Four Essential Zones of a Healthcare Data Lake
The Four Essential Zones of a Healthcare Data LakeHealth Catalyst
 
Physician Burnout and the EHR: Addressing Five Common Burdens
Physician Burnout and the EHR: Addressing Five Common BurdensPhysician Burnout and the EHR: Addressing Five Common Burdens
Physician Burnout and the EHR: Addressing Five Common BurdensHealth Catalyst
 
A Roadmap for Optimizing Clinical Decision Support
A Roadmap for Optimizing Clinical Decision SupportA Roadmap for Optimizing Clinical Decision Support
A Roadmap for Optimizing Clinical Decision SupportHealth Catalyst
 
Improving Patient Safety: Machine Learning Targets an Urgent Concern
Improving Patient Safety: Machine Learning Targets an Urgent ConcernImproving Patient Safety: Machine Learning Targets an Urgent Concern
Improving Patient Safety: Machine Learning Targets an Urgent ConcernHealth Catalyst
 
How to Build a Healthcare Analytics Team and Solve Strategic Problems
How to Build a Healthcare Analytics Team and Solve Strategic ProblemsHow to Build a Healthcare Analytics Team and Solve Strategic Problems
How to Build a Healthcare Analytics Team and Solve Strategic ProblemsHealth Catalyst
 
An Effective Financial Response to COVID-19: Three Ways to Leverage Data
An Effective Financial Response to COVID-19: Three Ways to Leverage DataAn Effective Financial Response to COVID-19: Three Ways to Leverage Data
An Effective Financial Response to COVID-19: Three Ways to Leverage DataHealth Catalyst
 
How to Run Analytics for More Actionable, Timely Insights: A Healthcare Data ...
How to Run Analytics for More Actionable, Timely Insights: A Healthcare Data ...How to Run Analytics for More Actionable, Timely Insights: A Healthcare Data ...
How to Run Analytics for More Actionable, Timely Insights: A Healthcare Data ...Health Catalyst
 
Health Catalyst® Introduces Closed-Loop Analytics™ Services
Health Catalyst® Introduces Closed-Loop Analytics™ ServicesHealth Catalyst® Introduces Closed-Loop Analytics™ Services
Health Catalyst® Introduces Closed-Loop Analytics™ ServicesHealth Catalyst
 
Using Improvement Science in Healthcare to Create True Change
Using Improvement Science in Healthcare to Create True ChangeUsing Improvement Science in Healthcare to Create True Change
Using Improvement Science in Healthcare to Create True ChangeHealth Catalyst
 
A 5-Step Guide for Successful Healthcare Data Warehouse Operations
A 5-Step Guide for Successful Healthcare Data Warehouse OperationsA 5-Step Guide for Successful Healthcare Data Warehouse Operations
A 5-Step Guide for Successful Healthcare Data Warehouse OperationsHealth Catalyst
 
Bridging the Data and Trust Gaps: Why Health Catalyst Entered the Life Scienc...
Bridging the Data and Trust Gaps: Why Health Catalyst Entered the Life Scienc...Bridging the Data and Trust Gaps: Why Health Catalyst Entered the Life Scienc...
Bridging the Data and Trust Gaps: Why Health Catalyst Entered the Life Scienc...Health Catalyst
 
Interoperability in Healthcare Data: A Life-Saving Advantage
Interoperability in Healthcare Data: A Life-Saving AdvantageInteroperability in Healthcare Data: A Life-Saving Advantage
Interoperability in Healthcare Data: A Life-Saving AdvantageHealth Catalyst
 
Interoperability in Healthcare: Making the Most of FHIR
Interoperability in Healthcare: Making the Most of FHIRInteroperability in Healthcare: Making the Most of FHIR
Interoperability in Healthcare: Making the Most of FHIRHealth Catalyst
 
AI in Healthcare: Finding the Right Answers Faster
AI in Healthcare: Finding the Right Answers FasterAI in Healthcare: Finding the Right Answers Faster
AI in Healthcare: Finding the Right Answers FasterHealth Catalyst
 
ICD-10 PCS: Harnessing the Power of Procedure Codes
ICD-10 PCS: Harnessing the Power of Procedure CodesICD-10 PCS: Harnessing the Power of Procedure Codes
ICD-10 PCS: Harnessing the Power of Procedure CodesHealth Catalyst
 
Creating a Data-Driven Research Ecosystem with Patients at the Center
Creating a Data-Driven Research Ecosystem with Patients at the CenterCreating a Data-Driven Research Ecosystem with Patients at the Center
Creating a Data-Driven Research Ecosystem with Patients at the CenterHealth Catalyst
 
To Safely Restart Elective Procedures, Look to the Data
To Safely Restart Elective Procedures, Look to the DataTo Safely Restart Elective Procedures, Look to the Data
To Safely Restart Elective Procedures, Look to the DataHealth Catalyst
 
Deliver Data to Decision Makers: Two Important Strategies for Success
Deliver Data to Decision Makers: Two Important Strategies for SuccessDeliver Data to Decision Makers: Two Important Strategies for Success
Deliver Data to Decision Makers: Two Important Strategies for SuccessHealth Catalyst
 
Health Systems Share COVID-19 Financial Recovery Strategies in First Client H...
Health Systems Share COVID-19 Financial Recovery Strategies in First Client H...Health Systems Share COVID-19 Financial Recovery Strategies in First Client H...
Health Systems Share COVID-19 Financial Recovery Strategies in First Client H...Health Catalyst
 

Was ist angesagt? (20)

Healthcare Data Management: Three Principles of Using Data to Its Full Potential
Healthcare Data Management: Three Principles of Using Data to Its Full PotentialHealthcare Data Management: Three Principles of Using Data to Its Full Potential
Healthcare Data Management: Three Principles of Using Data to Its Full Potential
 
The Four Essential Zones of a Healthcare Data Lake
The Four Essential Zones of a Healthcare Data LakeThe Four Essential Zones of a Healthcare Data Lake
The Four Essential Zones of a Healthcare Data Lake
 
Physician Burnout and the EHR: Addressing Five Common Burdens
Physician Burnout and the EHR: Addressing Five Common BurdensPhysician Burnout and the EHR: Addressing Five Common Burdens
Physician Burnout and the EHR: Addressing Five Common Burdens
 
A Roadmap for Optimizing Clinical Decision Support
A Roadmap for Optimizing Clinical Decision SupportA Roadmap for Optimizing Clinical Decision Support
A Roadmap for Optimizing Clinical Decision Support
 
Improving Patient Safety: Machine Learning Targets an Urgent Concern
Improving Patient Safety: Machine Learning Targets an Urgent ConcernImproving Patient Safety: Machine Learning Targets an Urgent Concern
Improving Patient Safety: Machine Learning Targets an Urgent Concern
 
How to Build a Healthcare Analytics Team and Solve Strategic Problems
How to Build a Healthcare Analytics Team and Solve Strategic ProblemsHow to Build a Healthcare Analytics Team and Solve Strategic Problems
How to Build a Healthcare Analytics Team and Solve Strategic Problems
 
An Effective Financial Response to COVID-19: Three Ways to Leverage Data
An Effective Financial Response to COVID-19: Three Ways to Leverage DataAn Effective Financial Response to COVID-19: Three Ways to Leverage Data
An Effective Financial Response to COVID-19: Three Ways to Leverage Data
 
How to Run Analytics for More Actionable, Timely Insights: A Healthcare Data ...
How to Run Analytics for More Actionable, Timely Insights: A Healthcare Data ...How to Run Analytics for More Actionable, Timely Insights: A Healthcare Data ...
How to Run Analytics for More Actionable, Timely Insights: A Healthcare Data ...
 
Health Catalyst® Introduces Closed-Loop Analytics™ Services
Health Catalyst® Introduces Closed-Loop Analytics™ ServicesHealth Catalyst® Introduces Closed-Loop Analytics™ Services
Health Catalyst® Introduces Closed-Loop Analytics™ Services
 
Using Improvement Science in Healthcare to Create True Change
Using Improvement Science in Healthcare to Create True ChangeUsing Improvement Science in Healthcare to Create True Change
Using Improvement Science in Healthcare to Create True Change
 
A 5-Step Guide for Successful Healthcare Data Warehouse Operations
A 5-Step Guide for Successful Healthcare Data Warehouse OperationsA 5-Step Guide for Successful Healthcare Data Warehouse Operations
A 5-Step Guide for Successful Healthcare Data Warehouse Operations
 
Bridging the Data and Trust Gaps: Why Health Catalyst Entered the Life Scienc...
Bridging the Data and Trust Gaps: Why Health Catalyst Entered the Life Scienc...Bridging the Data and Trust Gaps: Why Health Catalyst Entered the Life Scienc...
Bridging the Data and Trust Gaps: Why Health Catalyst Entered the Life Scienc...
 
Interoperability in Healthcare Data: A Life-Saving Advantage
Interoperability in Healthcare Data: A Life-Saving AdvantageInteroperability in Healthcare Data: A Life-Saving Advantage
Interoperability in Healthcare Data: A Life-Saving Advantage
 
Interoperability in Healthcare: Making the Most of FHIR
Interoperability in Healthcare: Making the Most of FHIRInteroperability in Healthcare: Making the Most of FHIR
Interoperability in Healthcare: Making the Most of FHIR
 
AI in Healthcare: Finding the Right Answers Faster
AI in Healthcare: Finding the Right Answers FasterAI in Healthcare: Finding the Right Answers Faster
AI in Healthcare: Finding the Right Answers Faster
 
ICD-10 PCS: Harnessing the Power of Procedure Codes
ICD-10 PCS: Harnessing the Power of Procedure CodesICD-10 PCS: Harnessing the Power of Procedure Codes
ICD-10 PCS: Harnessing the Power of Procedure Codes
 
Creating a Data-Driven Research Ecosystem with Patients at the Center
Creating a Data-Driven Research Ecosystem with Patients at the CenterCreating a Data-Driven Research Ecosystem with Patients at the Center
Creating a Data-Driven Research Ecosystem with Patients at the Center
 
To Safely Restart Elective Procedures, Look to the Data
To Safely Restart Elective Procedures, Look to the DataTo Safely Restart Elective Procedures, Look to the Data
To Safely Restart Elective Procedures, Look to the Data
 
Deliver Data to Decision Makers: Two Important Strategies for Success
Deliver Data to Decision Makers: Two Important Strategies for SuccessDeliver Data to Decision Makers: Two Important Strategies for Success
Deliver Data to Decision Makers: Two Important Strategies for Success
 
Health Systems Share COVID-19 Financial Recovery Strategies in First Client H...
Health Systems Share COVID-19 Financial Recovery Strategies in First Client H...Health Systems Share COVID-19 Financial Recovery Strategies in First Client H...
Health Systems Share COVID-19 Financial Recovery Strategies in First Client H...
 

Ähnlich wie The Healthcare Cybersecurity Framework: A Top Defense Against Data Breaches and Attacks

Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...Ryan Starkes
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...centralohioissa
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainShawn Brown
 
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfStrengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfEnterprise Insider
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadsavassociates1
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainSanjay Chadha, CPA, CA
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsKen M. Shaurette
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
A Healthcare Digitization Framework: 5 Strategies
A Healthcare Digitization Framework: 5 StrategiesA Healthcare Digitization Framework: 5 Strategies
A Healthcare Digitization Framework: 5 StrategiesHealth Catalyst
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance365 Data Centers
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfkimangeloullero
 

Ähnlich wie The Healthcare Cybersecurity Framework: A Top Defense Against Data Breaches and Attacks (20)

Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
Cyber Alert FDA Issues New Cybersecurity Guidelines for Medical Device Manufa...
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychain
 
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfStrengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
DKapellmann_Security Compliance Models
DKapellmann_Security Compliance ModelsDKapellmann_Security Compliance Models
DKapellmann_Security Compliance Models
 
Fdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessmentsFdic ffiec cyber_security_assessments
Fdic ffiec cyber_security_assessments
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
A Healthcare Digitization Framework: 5 Strategies
A Healthcare Digitization Framework: 5 StrategiesA Healthcare Digitization Framework: 5 Strategies
A Healthcare Digitization Framework: 5 Strategies
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 

Mehr von Health Catalyst

Looking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesLooking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesHealth Catalyst
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology InsightsHealth Catalyst
 
Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborHealth Catalyst
 
2024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 32024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 3Health Catalyst
 
2024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 22024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 2Health Catalyst
 
2024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 12024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 1Health Catalyst
 
What’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondWhat’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondHealth Catalyst
 
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementAutomated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementHealth Catalyst
 
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule UpdatesHealth Catalyst
 
What's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleWhat's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleHealth Catalyst
 
Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Health Catalyst
 
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfVitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfHealth Catalyst
 
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsDriving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsHealth Catalyst
 
Tech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingTech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingHealth Catalyst
 
2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set UpdatesHealth Catalyst
 
How Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHow Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHealth Catalyst
 
COVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsCOVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsHealth Catalyst
 
Automated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientAutomated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientHealth Catalyst
 
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxA Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxHealth Catalyst
 
Self-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceSelf-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceHealth Catalyst
 

Mehr von Health Catalyst (20)

Looking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare IssuesLooking Ahead: Market Trends Impacting Key Healthcare Issues
Looking Ahead: Market Trends Impacting Key Healthcare Issues
 
2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights2024 HCAT Healthcare Technology Insights
2024 HCAT Healthcare Technology Insights
 
Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and Labor
 
2024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 32024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 3
 
2024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 22024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 2
 
2024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 12024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 1
 
What’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondWhat’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and Beyond
 
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementAutomated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
 
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
 
What's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleWhat's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final Rule
 
Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2
 
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfVitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
 
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsDriving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
 
Tech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingTech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average Outsourcing
 
2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates
 
How Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHow Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital Technology
 
COVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsCOVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency Ends
 
Automated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientAutomated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and Patient
 
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxA Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
 
Self-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceSelf-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business Intelligence
 

Kürzlich hochgeladen

Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...perfect solution
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...hotbabesbook
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...jageshsingh5554
 
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...Garima Khatri
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋TANUJA PANDEY
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomdiscovermytutordmt
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeCall Girls Delhi
 
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...Arohi Goyal
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...astropune
 
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsBangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsGfnyt
 
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Dipal Arora
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...Taniya Sharma
 

Kürzlich hochgeladen (20)

Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Kochi Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
College Call Girls in Haridwar 9667172968 Short 4000 Night 10000 Best call gi...
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
 
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
 
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
VIP Mumbai Call Girls Hiranandani Gardens Just Call 9920874524 with A/C Room ...
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
 
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
 
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsBangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
 
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Aurangabad Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Mumbai Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
 

The Healthcare Cybersecurity Framework: A Top Defense Against Data Breaches and Attacks

  • 1. The Healthcare Cybersecurity Framework: A Top Defense Against Data Breaches and Attacks
  • 2. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. The Healthcare Cybersecurity Framework Healthcare IT vendors have an immense responsibility for an organization’s cyber- security when they partner on software and solutions, especially as breaches and cyberattacks are on the rise in the healthcare industry. Digital technology and connectivity have led to significant improvements in healthcare delivery, but increased integration enables more exposure to cyberattacks that can impact care delivery, safety, and privacy.
  • 3. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. The Healthcare Cybersecurity Framework More than 93 percent of healthcare organizations experienced a data breach between 2017 and 2020, and 57 percent have had more than five data breaches during the same time frame. Furthermore, researcher Cybersecurity Ventures predicts healthcare will suffer two to three times more cyberattacks in 2021 than the average amount for other industries and that ransomware attacks on healthcare organizations will grow fivefold by 2021.
  • 4. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Sharing Responsibility: The Cybersecurity Vendor-Partner Relationship In a vendor-partner relationship, both parties often share the security responsibility, varying according to the type of hosted infrastructure. For example, in Figure 1, an on-premises (or self-hosted) solution, the respons- ibility and ownership fall more with the partner and move to the vendor as the hosted model moves towards software as a service (SaaS). Figure 1: Vendor-partner hosting relationships.
  • 5. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Sharing Responsibility: The Cybersecurity Vendor-Partner Relationship In contrast to the SaaS model in Figure 1, a vendor (such as Health Catalyst and its hosted Data Operating System (DOS™)) platform uses a platform as a service (PaaS) model and move towards SaaS as capabilities allow. In a PaaS model, shared responsibilities between the vendor and partner exist in three main areas:  Identity and directory infrastructure  Applications  Network controls
  • 6. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Avoiding and Withstanding Attacks Requires a Hybrid Centralized and Decentralized Healthcare Cybersecurity Framework A healthcare IT vendor cybersecurity framework aims to prevent data breaches from occurring. Sometimes, however, bad actors evade even the most robust measures. For example, on December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued its second of five-ever-ordered directives for its federal civilian agencies to shut down an imminent threat involving software from a vendor.
  • 7. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Avoiding and Withstanding Attacks Requires a Hybrid Centralized and Decentralized Healthcare Cybersecurity Framework A nation-state attacker compromised this vendor’s product code to impact the supply chain of organizations relying on the software to monitor and manage their network infrastructures. The effects of this attack are only in their first wave and will be long-lasting.
  • 8. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Avoiding and Withstanding Attacks Requires a Hybrid Centralized and Decentralized Healthcare Cybersecurity Framework While even the most comprehensive security infrastructure can’t guarantee to avert all threats, a security framework must be robust enough for healthcare cybersecurity teams to logically defend their cybersecurity practices, even amid the panic following a breach. In other words, the goal is to build a layered defense strategy so that a compromise in any one layer would not compromise the system as a whole.
  • 9. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Avoiding and Withstanding Attacks Requires a Hybrid Centralized and Decentralized Healthcare Cybersecurity Framework To galvanize cybersecurity across the organization, C-suite leadership must support the program. The chief information security officer (CISO) establishes centralized security principles through a formalized organizational information security management program. The full C-suite supports processes and standards for decentralized execution and adherence.
  • 10. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Avoiding and Withstanding Attacks Requires a Hybrid Centralized and Decentralized Healthcare Cybersecurity Framework In this hybrid centralized and decentralized healthcare cybersecurity model, the CISO is ultimately accountable for the cybersecurity program, which reaches through each of the other C-level business units to set prioritization for security and privacy compliance objectives. Strong C-suite and board alignment also helps align project investments.
  • 11. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Avoiding and Withstanding Attacks Requires a Hybrid Centralized and Decentralized Healthcare Cybersecurity Framework The CISO can earn organizationwide support for centralized security principles with ongoing third-party audits and certifications. As external, objective checkpoints, third-party independent reports (versus self-audit) identify gaps and misaligned practices, holding security teams accountable to established standards and scheduled evaluations.
  • 12. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Avoiding and Withstanding Attacks Requires a Hybrid Centralized and Decentralized Healthcare Cybersecurity Framework The third-party independent perspective offers a credible reference point for from outside an organization’s view and eliminates blind spots. Involving a third party also adds value to other external vendors with credibility to leverage in their own vendor security risk assessments.
  • 13. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications The operational policies and procedures in place in a vendor-partner relationship are paramount in achieving compliance with the two entities’ regulatory and certification strategies. In the security posture in a shared- responsibility model, the partner depends on its vendor.
  • 14. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications In the healthcare industry, the Health Insurance Portability and Accountability Act (HIPAA) is the prevailing regulatory framework. HIPAA typically defines the partner as the covered entity (CE) and its vendor as the business associate (BA). The CE is responsible for performing due diligence in vendor risk assessments on its BAs to assess inherited risk where third parties fulfill services or products.
  • 15. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications The BA has a fiduciary duty to its partner, and in the context of HIPAA, to notify its partner when it discovers a security incident, breach, or disclosure under the terms defined in the business associate agreement (BAA). This arrangement allows the partner to fulfill its regulatory requirement of reporting such material events to appropriate authorities, following a strategic cybersecurity framework.
  • 16. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications The following examples of ongoing third-party audits and certifications support the cybersecurity framework. These measures help organizations maintain cybersecurity standards and assure healthcare organizations that their vendors treat seriously the stewardship to protect the confidentiality, integrity, and availability of the data:
  • 17. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications Service Organization Controls Health Catalyst utilizes System and Organization Controls (SOC) compliance that comprises a cybersecurity risk management reporting framework. Organizations that comply demonstrate they are managing cybersecurity threats and have effective processes and controls in place to detect, respond to, mitigate, and recover from breaches and other security events.
  • 18. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications Service Organization Controls The SOC 1® reports provide information about a service organization’s control environment relevant to the partner’s internal controls over financial reporting. At Health Catalyst, for example, the SOC 1 report covers the design and operating effectiveness of controls relevant to the organization’s cloud hosting solution. Vendor organizations receive SOC 1 Type II report per Statements on Standards of Attestation Engagements (SSAE) No. 18 (Reporting on Controls at a Service Organization) and the International Standard on Assurance Engagements (ISAE) 3402 (Assurance Reports on Controls at a Service Organization).
  • 19. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications Service Organization Controls The SOC 2® report is annual, third-party independent assessments of a control environment. The SOC 2 report is based on the American Institute of CPAs’ (AICPA) Trust Services Criteria and is issued annually following the AICPA AT Section 101 of its attest engagements. The report offers a retrospective 12-month audit. details the design and operating effectiveness of controls relevant to any system containing customer data as part of a healthcare cloud hosting solution. At Health Catalyst, the SOC 2 report addresses three of the five AICPA Trust Services Criteria (security, availability, and confidentiality).
  • 20. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications HIPAA Vendors may use HIPAA as a basis for their security and privacy framework. These third-party audits measure the compliance with HIPAA and assure that the organization has a HIPAA-compliance program with adequate measures for saving, accessing, and sharing individual medical and personal information.
  • 21. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications Business Associate Agreements Some organizations will sign BAAs at their partner’s request. These agreements ensure that partners can meet the HIPAA and Health Information Technology for Economic and Clinical Health Act (HITECH) compliance requirements.
  • 22. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications The Electronic Healthcare Network Accreditation Commission Electronic Healthcare Network Accreditation Commission (EHNAC) is a national standard that indicates healthcare stakeholders have met or exceeded EHNAC’s criteria. These stakeholders include electronic healthcare networks, financial services organizations, medical billers, third party administrators, outsourcers, ePrescribing networks, Healthcare Information Service Providers (HISP), Practice Management Systems vendors, and others.
  • 23. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications The Electronic Healthcare Network Accreditation Commission The EHNAC criteria include conformance with federal healthcare reform legislation, including HIPAA, HITECH, American Recovery and Reinvestment Act, the Affordable Care Act, the HIPPA Omnibus Rule, and other applicable state legislation. Further, the criteria encompass privacy, security, and confidentiality; technical performance; business practices; and resources.
  • 24. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications The Electronic Healthcare Network Accreditation Commission EHNAC bases accreditation on independent peer evaluation of an entity’s ability to perform at levels based on industry-established criteria. The accrediting process permits applicants to review their current performance levels and bring those levels according to industry-established minimums, best practices, and conformance with applicable federal and state healthcare reform legislation.
  • 25. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications HITRUST The HITRUST cybersecurity framework (CSF) leverages nationally and internationally accepted standards, including ISO, National Institute of Standards and Technology (NIST), PCI Security Standards Council, and HIPAA, to ensure a comprehensive set of baseline security controls. The CSF normalizes these security requirements and provides clarity and consistency, reducing the burden of compliance with the varied requirements that apply to organizations.
  • 26. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications International Organization for Standardization The International Organization for Standardization (ISO) 27001 is a globally recognized, standards-based approach to security that outlines requirements for an organization’s cybersecurity management system.
  • 27. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Inside the Healthcare Cybersecurity Framework: Third-Party Audits and Certifications The NIST Cybersecurity Framework The NIST CSF guides organizations on how to improve their ability to prevent, detect, and respond to cybersecurity risks. The NIST 800-53 standard is a publication that recommends security controls for federal information systems and organizations and documents security controls for all federal information systems, except those designed for national security.
  • 28. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. The Best Defensive Against Ongoing Cybersecurity Threats: An Active and Optimized Healthcare Cybersecurity Program As statistics show, healthcare data breaches and cyberattacks are rarely isolated, infrequent events, but rather ongoing threats requiring constant vigilance. And with the mounting drive for more connectivity throughout the industry, health systems and their IT vendors must prioritize an active and optimized cybersecurity framework in their digital and operational strategies.
  • 29. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. The Best Defensive Against Ongoing Cybersecurity Threats: An Active and Optimized Healthcare Cybersecurity Program The most secure protocols define the security responsibility in the vendor-partner relationship and hold vendors accountable to routine audits and compliance measures.
  • 30. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. For more information: “This book is a fantastic piece of work” – Robert Lindeman MD, FAAP, Chief Physician Quality Officer
  • 31. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. More about this topic Link to original article for a more in-depth discussion. The Healthcare Cybersecurity Framework: A Top Defense Against Data Breaches and Attacks COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce Kevin Scharnhorst, Chief Information Security Officer at Health Catalyst How Artificial Intelligence Can Overcome Healthcare Data Security Challenges and Improve Patient Trust Health Catalyst Editors Pairing HIE Data with an Analytics Platform: Four Key Improvement Categories Adam Bell, Director of Clinical Advisory and Provider Outreach Services; Carol Owen, Senior VP, Interoperability Dan Soule, VP Product Management; Eric Crawford, Head of Product - Interoperability, Analytics and Big Data Exceptions to Information Blocking Defined in Proposed Rule: Here’s What You Need to Know Daniel Orenstein, JD, Senior VP, General Counsel, and Secretary Three Must-Haves for a Successful Healthcare Data Strategy David Grauer, MBA, MHSA, Senior VP Professional Services
  • 32. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Kevin is the Chief Information Security Officer at Health Catalyst. Prior to joining with Health Catalyst, he worked for Blue Cross of Idaho in Boise, Idaho as a Service Oriented Architecture (SOA) Development Manager and worked there for five years. Before Blue Cross of Idaho, Kevin worked in the Hi-Tech sector within e-commerce developing enabling technologies for Micron, a Semiconductor Manufacturer to sell and distribute their product portfolio to consumers. Kevin has an Associates in Political Science from BYI-Idaho, a Bachelor’s in Business Administration in Computer Information Systems from Boise State University and a Master’s of Science in Medical Informatics from Northwestern University. He continues to teach as an Instructor at Northwestern in the Masters of Medical Informatics Program and also Computer Science at a local community college. Other Clinical Quality Improvement Resources Click to read additional information at www.healthcatalyst.com Kevin Scharnhorst
  • 33. © 2021 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Other Clinical Quality Improvement Resources Click to read additional information at www.healthcatalyst.com Health Catalyst is a mission-driven data warehousing, analytics and outcomes-improvement company that helps healthcare organizations of all sizes improve clinical, financial, and operational outcomes needed to improve population health and accountable care. Our proven enterprise data warehouse (EDW) and analytics platform helps improve quality, add efficiency and lower costs in support of more than 65 million patients for organizations ranging from the largest US health system to forward-thinking physician practices. Health Catalyst was recently named as the leader in the enterprise healthcare BI market in improvement by KLAS, and has received numerous best-place-to work awards including Modern Healthcare in 2013, 2014, and 2015, as well as other recognitions such as “Best Place to work for Millenials, and a “Best Perks for Women.”