SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Creating an Effective
Cyber Security Strategy
________
Key Attributes for Success, Challenges and Critical Success
Factors
● Tony Evans, Chief Information Officer, Enloe Medical Center ●
#LEAD15
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Raise Awareness
• At all levels of the organization, not just C-Suite
• We are not alone – High level state of data security
nationwide
• Create a dynamic data security roadmap
– 6 months, year 1, year 2 (with estimated costs)
• Data security includes physical security
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Tell a Scary Story
• Baseline your organization against others in your industry
leveraging graphs and charts
• Use examples that are close to home
• Short presentation at as many department and key
stakeholders meetings as possible
• Real impact that resonates with the intended audience
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Create a Cyber Security
Scorecard
• Know your target audience
• Use categories that relate to how your audience sees the
world, not IT.
• Examples of Categories: Work environment, Employee
Education/Security Awareness, Data Protection, Disaster
Recovery
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Create a Cyber Security
Scorecard (cont.)
• Create a Risk Key
• Create a Score Key
– A, B, C, D
• Present overall score against industry
• Measurable activity – Communicate often
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Cyber Security Scorecard
Example
A CHIME Leadership Education and Development Forum in collaboration with iHT2
You May Feel Like You Are Alone
• Have an incident management strategy
• Set expectation of a continuing effort with no end date
• Balance transparency with risk of exposing security
vulnerabilities
May require a special funding track
• Number one asset is our reputation
– Must invest in Data Security for the long-term
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Data Security, Value and
Efficiency
• Data security doesn’t always have to be restrictive and a
productivity drain
• Look for ways to improve the organization while enhancing
data security
– Secure Texting
– Disaster Recovery Planning
– User Access Control
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Creating an Effective
Cyber Security Strategy
________
Key Attributes for Success, Challenges and Critical Success
Factors
● Josh Kohrumel, Director, PMO, Rady Children’s Hospital San Diego ●
● Blaine Hebert, Information Security Officer, Rady Children’s Hospital San Diego ●
Resource Alignment
Financial Alignment
Organizational Alignment
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Resource Alignment
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Portfolio
Management
Office
Clinical
Systems
Business
Systems
Infrastructure
Bio
Med
HIM
Project
Services
InfoSec
Emerging
Tech
Testing
Mgmt
Enterprise
Architecture
Financial
Mgmt (IM)
Resource Alignment
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Financial Alignment
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Financial Alignment
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Organizational Alignment
A CHIME Leadership Education and Development Forum in collaboration with iHT2

Weitere ähnliche Inhalte

Andere mochten auch

The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
at MicroFocus Italy ❖✔
 
Denning_Todd_Report
Denning_Todd_ReportDenning_Todd_Report
Denning_Todd_Report
Todd Denning
 

Andere mochten auch (20)

The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Denning_Todd_Report
Denning_Todd_ReportDenning_Todd_Report
Denning_Todd_Report
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Data security risks and the cost of business continuity (slideshare) tmcs q...
Data security risks and the cost of business continuity (slideshare)   tmcs q...Data security risks and the cost of business continuity (slideshare)   tmcs q...
Data security risks and the cost of business continuity (slideshare) tmcs q...
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 
ICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attackICT Security: Defence strategies against targeted attack
ICT Security: Defence strategies against targeted attack
 
2015 Cyber Security Strategy
2015 Cyber Security Strategy 2015 Cyber Security Strategy
2015 Cyber Security Strategy
 
Data-Ed Online: How Safe is Your Data? Data Security Webinar
Data-Ed Online: How Safe is Your Data?  Data Security WebinarData-Ed Online: How Safe is Your Data?  Data Security Webinar
Data-Ed Online: How Safe is Your Data? Data Security Webinar
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
Managed Security Services Overview
Managed Security Services OverviewManaged Security Services Overview
Managed Security Services Overview
 
AGC Networks’ Profile
AGC Networks’ ProfileAGC Networks’ Profile
AGC Networks’ Profile
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer GroupsTapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
Tapping into the Growth Goldmine: Why MSPs Should Join Peer Groups
 
Key Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP OfferingKey Ingredients for Your MSSP Offering
Key Ingredients for Your MSSP Offering
 
IBM Security Software Solutions
IBM Security Software Solutions IBM Security Software Solutions
IBM Security Software Solutions
 
A toolbox of modern management practices for a Digital World and the role EA ...
A toolbox of modern management practices for a Digital World and the role EA ...A toolbox of modern management practices for a Digital World and the role EA ...
A toolbox of modern management practices for a Digital World and the role EA ...
 

Ähnlich wie CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strategy: Key Attributes for Success, Challenges, and Critical Success Factors"

Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
Kimberly Hood
 
Agenda_WCDTC_ENG_DEL-5
Agenda_WCDTC_ENG_DEL-5Agenda_WCDTC_ENG_DEL-5
Agenda_WCDTC_ENG_DEL-5
Lissette Rojas
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
360 BSI
 
HIT Leader 3.0 Cornerstone Boston CHIME 2015 - HIT Leader 3.0 Cornerstone: Se...
HIT Leader 3.0 Cornerstone Boston CHIME 2015 - HIT Leader 3.0 Cornerstone: Se...HIT Leader 3.0 Cornerstone Boston CHIME 2015 - HIT Leader 3.0 Cornerstone: Se...
HIT Leader 3.0 Cornerstone Boston CHIME 2015 - HIT Leader 3.0 Cornerstone: Se...
Health IT Conference – iHT2
 

Ähnlich wie CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strategy: Key Attributes for Success, Challenges, and Critical Success Factors" (20)

CHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYCCHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYC
 
Why Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To Start
 
The future NGO is agile, entrepreneurial and digital
The future NGO is agile, entrepreneurial and digitalThe future NGO is agile, entrepreneurial and digital
The future NGO is agile, entrepreneurial and digital
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
CHIME LEAD New York 2014 "Creating an Effective Cyber Security Strategy: Key ...
CHIME LEAD New York 2014 "Creating an Effective Cyber Security Strategy: Key ...CHIME LEAD New York 2014 "Creating an Effective Cyber Security Strategy: Key ...
CHIME LEAD New York 2014 "Creating an Effective Cyber Security Strategy: Key ...
 
Information resources, mis, csvtu
Information resources, mis, csvtuInformation resources, mis, csvtu
Information resources, mis, csvtu
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
How to write a great digital strategy
How to write a great digital strategyHow to write a great digital strategy
How to write a great digital strategy
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
Agenda_WCDTC_ENG_DEL-5
Agenda_WCDTC_ENG_DEL-5Agenda_WCDTC_ENG_DEL-5
Agenda_WCDTC_ENG_DEL-5
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAEIT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
IT Risk Management & Leadership 30 March - 02 April 2014 Dubai UAE
 
HIT Leader 3.0 Cornerstone Boston CHIME 2015 - HIT Leader 3.0 Cornerstone: Se...
HIT Leader 3.0 Cornerstone Boston CHIME 2015 - HIT Leader 3.0 Cornerstone: Se...HIT Leader 3.0 Cornerstone Boston CHIME 2015 - HIT Leader 3.0 Cornerstone: Se...
HIT Leader 3.0 Cornerstone Boston CHIME 2015 - HIT Leader 3.0 Cornerstone: Se...
 
Ana Villegas, Dell - Using Data, Technology and Creativity to Break Through T...
Ana Villegas, Dell - Using Data, Technology and Creativity to Break Through T...Ana Villegas, Dell - Using Data, Technology and Creativity to Break Through T...
Ana Villegas, Dell - Using Data, Technology and Creativity to Break Through T...
 

Mehr von Health IT Conference – iHT2

Mehr von Health IT Conference – iHT2 (20)

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 
Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly HillsWelcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
 

Kürzlich hochgeladen

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strategy: Key Attributes for Success, Challenges, and Critical Success Factors"

  • 1. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Creating an Effective Cyber Security Strategy ________ Key Attributes for Success, Challenges and Critical Success Factors ● Tony Evans, Chief Information Officer, Enloe Medical Center ● #LEAD15
  • 2. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Raise Awareness • At all levels of the organization, not just C-Suite • We are not alone – High level state of data security nationwide • Create a dynamic data security roadmap – 6 months, year 1, year 2 (with estimated costs) • Data security includes physical security
  • 3. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Tell a Scary Story • Baseline your organization against others in your industry leveraging graphs and charts • Use examples that are close to home • Short presentation at as many department and key stakeholders meetings as possible • Real impact that resonates with the intended audience
  • 4. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Create a Cyber Security Scorecard • Know your target audience • Use categories that relate to how your audience sees the world, not IT. • Examples of Categories: Work environment, Employee Education/Security Awareness, Data Protection, Disaster Recovery
  • 5. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Create a Cyber Security Scorecard (cont.) • Create a Risk Key • Create a Score Key – A, B, C, D • Present overall score against industry • Measurable activity – Communicate often
  • 6. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Cyber Security Scorecard Example
  • 7. A CHIME Leadership Education and Development Forum in collaboration with iHT2 You May Feel Like You Are Alone • Have an incident management strategy • Set expectation of a continuing effort with no end date • Balance transparency with risk of exposing security vulnerabilities May require a special funding track • Number one asset is our reputation – Must invest in Data Security for the long-term
  • 8. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Data Security, Value and Efficiency • Data security doesn’t always have to be restrictive and a productivity drain • Look for ways to improve the organization while enhancing data security – Secure Texting – Disaster Recovery Planning – User Access Control
  • 9. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Creating an Effective Cyber Security Strategy ________ Key Attributes for Success, Challenges and Critical Success Factors ● Josh Kohrumel, Director, PMO, Rady Children’s Hospital San Diego ● ● Blaine Hebert, Information Security Officer, Rady Children’s Hospital San Diego ●
  • 10. Resource Alignment Financial Alignment Organizational Alignment A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 11. Resource Alignment A CHIME Leadership Education and Development Forum in collaboration with iHT2 Portfolio Management Office Clinical Systems Business Systems Infrastructure Bio Med HIM Project Services InfoSec Emerging Tech Testing Mgmt Enterprise Architecture Financial Mgmt (IM)
  • 12. Resource Alignment A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 13. Financial Alignment A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 14. Financial Alignment A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 15. Organizational Alignment A CHIME Leadership Education and Development Forum in collaboration with iHT2