SlideShare a Scribd company logo
1 of 44
#HOAHITSEC14

Identity, Security and Healthcare
Geoff Webb
Senior Director, Solution Strategy
Identity, Security and Healthcare
Agenda –
How does identity and the changing practice of identity
management address the major challenges facing the
healthcare industry today?
•What

are the challenges and risks?

•How

is complexity having an effect?

•How

does the concept of identity solve these problems?

•Where

2

are we headed?

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Big Challenges Facing Healthcare
• Demand
• Financial
• Role

for healthcare is changing
model is changing

of the patient is changing

• Healthcare

itself is changing

• Competitive
• Role

landscape is changing

of government is also changing

Source: Business Drivers of Technology Decisions for Healthcare Providers – Gartner December 2013
3

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
In other words… a lot is changing, fast

4

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Change Increases Risk
These changes increase complexity
as well expectations among users
of systems and patients.
This “consumerization of
expectation” is a significant driver of
risk for organizations handling
sensitive data, such as patient and
employee records.

5

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Healthcare Breaches Overall

Source: A Look Back: U.S. Healthcare Data Breach Trends - Health Information Trust Alliance (HITRUST)
6

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
94%
7

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Causes Of Breaches

Source: Third Annual Benchmark Study on Patient Privacy & Data Security – Ponemon Research
8

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Type of Breach

Source: A Look Back: U.S. Healthcare Data Breach Trends - Health Information Trust Alliance (HITRUST)
9

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
A Changing Technology Landscape
Market Trends Driving Change
Cloud

Mobility

Information

Social

ENTERPRISE

11

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Mobility On The Move

Source: Third Annual Benchmark Study on Patient Privacy & Data Security – Ponemon Research
12

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Yet Much Remain Unsecured

Source: Third Annual Benchmark Study on Patient Privacy & Data Security – Ponemon Research
13

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Consumer Cloud Poses A Risk

14

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Let’s Get Social

15

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
More, More, More
•

More:
–
–

Devices

–

Users and participants

–

Collaboration and sharing

–

Mobility

–

•

Information

Risk and penalties

Less:
–
–

Visibility

–

16

Control
Ability to say “no”

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Complexity

All of the above is driving an
explosion in complexity

17

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Cutting Through Complexity

18

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Identity Is The Key
•

Identity management is the key to safely unlocking the
power of emergent trends such as:
–

Mobility

–

Cloud

–

Information use

–

Social Media

•

•

19

Good identity management improves outcomes and
reduces risk
And it’s cheaper…

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Building On The Power of Identity
What Is Identity Management?
•

Rapidly changing discipline that helps us
define:
– Who

people are

– What
– What

resources they should have access to

– What

•

privileges they should have
that access should be

In order to:
– Improve
– Reduce

21

productivity
risk

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
The Bottom Line

Identity Management ensures
that the right people have access
to the right resources and
services at the right time, in the
way they need it

22

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Changing Role Of Identity
• Gone

from highly IT-Centric to very
business-centric

• No

longer owned by the IT organization

• Increasingly

reflects the more
consumerized technology landscape
and expectations of users

23

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Identity Ties Together
• Relationships

of people, process and

information
• Regardless
• In

24

of technology

a way that is secure and manageable

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Concrete Challenges
• How

do I get people access quickly?

• How

do I monitor what they are doing?

• How

do I reduce the risk from privileged
users?

• How

do I know when I have been
breached?

• How

do I report on who has access to
what?

25

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
The Blind Spot

Employee Lifecycle

Source: http://www.gophoto.us/key/human%20life%20stages
26

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
The Blind Spot

Risk
Blind
Spot

27

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Who Is The Risk?

28

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Mistakes Are Costly

Source: Datalossdb.com
29

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Mistakes Are Costly

Source: Datalossdb.com
30

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
How Do We Solve These Issues?
• Identity

Context
• Adaptive Access
• Integrated Governance
• Identity-Powered Security

31

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Integrated Identity and Access Lifecycle
Powers the entire user lifecycle

32

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
What Does This Look Like?
Employees Needs Access…

• Self-service access request to healthcare applications
• Web, cloud and enterprise single sign-on
• Self-service password reset

34

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Managers Need to Manage…

• A complete view of her people and
resources
• Ability to review and approve
requests on-the-go
• Better information to make access
certification decisions, faster
35

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
And Auditors Need Visibility

• An Identity and Access Governance Platform
• Record and review policies and policy violations
• Analyze risk from unnecessary access rights
• Limit and monitor the activities of privileged users to reduce
insider risk
36

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Integrated Identity Management

These capabilities derive from
integrated, intelligent identity and
access management that extends up
to the cloud, incorporates mobile
computing, and reflects the
priorities and speed of business of
healthcare professionals

37

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
But Wait…

38

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Internet of EVERYTHING
25 billion and 1 trillion items by end of decade

39

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
And EVERYTHING is
going to want an Identity
(which is a lot)

40

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Identity Powered Healthcare
•

Identity management will define your interactions
with clinicians, partners, associates and patients

•

More devices, more data and more relationships
that ever

•

More opportunities to personalize and respond
than ever

BUT – the demand for everything to have an
identity will tax traditional thinking and approaches

41

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Next Up

Welcome to
Generation “I”

42

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Recommendations
• Evaluate

how your organization uses identity

• Plan

to integrate identity and access
management into the cloud and from mobile
devices

• Extend

identity intelligence into your security
management plans

• Plan

43

to manage the impact of social identity

© 2014 NetIQ Corporation and its affiliates. All Rights Reserved.

#HOAHITSEC14
Worldwide Headquarters
1233 West Loop South
Suite 810
Houston, TX 77027 USA
+1 713.548.1700 (Worldwide)
888.323.6768 (Toll-free)
info@netiq.com
NetIQ.com

44

© 2013 NetIQ Corporation and its affiliates. All Rights Reserved.

www.netiq.com/communities

More Related Content

What's hot

Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityJohn Rhoton
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...Ahmed Banafa
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities ForgeRock
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT Ahmed Banafa
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainAhmed Banafa
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainAltoros
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondAhmed Banafa
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtInfosecurity2010
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...Priyanka Aash
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicSecunoid Systems Inc
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video DataMrsAlways RigHt
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AIAhmed Banafa
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTForgeRock
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCastlebridge Associates
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 

What's hot (20)

Fintech & Blockchain
Fintech & BlockchainFintech & Blockchain
Fintech & Blockchain
 
Cloud Computing: New Approaches for Security
Cloud Computing: New Approaches for SecurityCloud Computing: New Approaches for Security
Cloud Computing: New Approaches for Security
 
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...IEEE 5G World Forum:  8 trends of iot in 2018 and beyond july 9th 2018 santa ...
IEEE 5G World Forum: 8 trends of iot in 2018 and beyond july 9th 2018 santa ...
 
IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities IAM for the Masses: Managing Consumer Identities
IAM for the Masses: Managing Consumer Identities
 
Secure and Smart IoT
Secure and Smart IoT Secure and Smart IoT
Secure and Smart IoT
 
Second line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : BlockchainSecond line of defense for cybersecurity : Blockchain
Second line of defense for cybersecurity : Blockchain
 
A Secure Model of IoT Using Blockchain
A Secure Model of IoT Using BlockchainA Secure Model of IoT Using Blockchain
A Secure Model of IoT Using Blockchain
 
The Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and BeyondThe Blockchain Wave in 2019 and Beyond
The Blockchain Wave in 2019 and Beyond
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
(SACON) Gauri Vishwas - Implementing a Privacy Program in a large Conglomerat...
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data2. Enterprise and Business Architecture Cloud Video Data
2. Enterprise and Business Architecture Cloud Video Data
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Secure and Smart IoT using Blockchain and AI
Secure and Smart  IoT using Blockchain and AISecure and Smart  IoT using Blockchain and AI
Secure and Smart IoT using Blockchain and AI
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Cookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspectiveCookies and Data Protection - a Practitioner's perspective
Cookies and Data Protection - a Practitioner's perspective
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 

Viewers also liked

BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014 NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesNetIQ
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility NetIQ
 
The UX + Design Process for Salesforce.com Communities
The UX + Design Process for Salesforce.com CommunitiesThe UX + Design Process for Salesforce.com Communities
The UX + Design Process for Salesforce.com CommunitiesRightpoint
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your BusinessNetIQ
 
Cers 20th anniversary customer experience (cx) seminar phil klaus
Cers 20th anniversary customer experience (cx) seminar phil klausCers 20th anniversary customer experience (cx) seminar phil klaus
Cers 20th anniversary customer experience (cx) seminar phil klausphilippklaus
 
L’institut de promotion des formations sur l'islam est né
L’institut de promotion des formations sur l'islam est néL’institut de promotion des formations sur l'islam est né
L’institut de promotion des formations sur l'islam est néThierry Debels
 
Patrick Decuyper liquideert NV Alles voor Antwerp
Patrick Decuyper liquideert NV Alles voor AntwerpPatrick Decuyper liquideert NV Alles voor Antwerp
Patrick Decuyper liquideert NV Alles voor AntwerpThierry Debels
 
What You Need to Know About Google Penguin 2.0
What You Need to Know About Google Penguin 2.0What You Need to Know About Google Penguin 2.0
What You Need to Know About Google Penguin 2.0DNN
 
A project report on different training offered and their benefits to the empl...
A project report on different training offered and their benefits to the empl...A project report on different training offered and their benefits to the empl...
A project report on different training offered and their benefits to the empl...Babasab Patil
 

Viewers also liked (14)

BrainShare 2014
BrainShare 2014 BrainShare 2014
BrainShare 2014
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility Big Payoffs With BYOD and Mobility
Big Payoffs With BYOD and Mobility
 
The UX + Design Process for Salesforce.com Communities
The UX + Design Process for Salesforce.com CommunitiesThe UX + Design Process for Salesforce.com Communities
The UX + Design Process for Salesforce.com Communities
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Mobile Apps in Your Business
Mobile Apps in Your BusinessMobile Apps in Your Business
Mobile Apps in Your Business
 
Cers 20th anniversary customer experience (cx) seminar phil klaus
Cers 20th anniversary customer experience (cx) seminar phil klausCers 20th anniversary customer experience (cx) seminar phil klaus
Cers 20th anniversary customer experience (cx) seminar phil klaus
 
L’institut de promotion des formations sur l'islam est né
L’institut de promotion des formations sur l'islam est néL’institut de promotion des formations sur l'islam est né
L’institut de promotion des formations sur l'islam est né
 
Patrick Decuyper liquideert NV Alles voor Antwerp
Patrick Decuyper liquideert NV Alles voor AntwerpPatrick Decuyper liquideert NV Alles voor Antwerp
Patrick Decuyper liquideert NV Alles voor Antwerp
 
社内LTへの道
社内LTへの道社内LTへの道
社内LTへの道
 
Zaragoza turismo 210
Zaragoza turismo 210Zaragoza turismo 210
Zaragoza turismo 210
 
What You Need to Know About Google Penguin 2.0
What You Need to Know About Google Penguin 2.0What You Need to Know About Google Penguin 2.0
What You Need to Know About Google Penguin 2.0
 
A project report on different training offered and their benefits to the empl...
A project report on different training offered and their benefits to the empl...A project report on different training offered and their benefits to the empl...
A project report on different training offered and their benefits to the empl...
 

Similar to Identity, Security and Healthcare

Lavacon 20014 Case Study: Securing Mobile Content at VITAS
Lavacon 20014 Case Study: Securing Mobile Content at VITASLavacon 20014 Case Study: Securing Mobile Content at VITAS
Lavacon 20014 Case Study: Securing Mobile Content at VITASJack Molisani
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of ThingsPECB
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front doorRyan Coleman
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Overcoming Cloud-Based Mobility Challenges in Healthcare
Overcoming Cloud-Based Mobility Challenges in HealthcareOvercoming Cloud-Based Mobility Challenges in Healthcare
Overcoming Cloud-Based Mobility Challenges in HealthcareAnyPresence
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknownsLisa Marie Martinez
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...ThousandEyes
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEKMarketing
 
The Other Side of Wireless - Connecting Medical Devices with Mobile, Cloud Co...
The Other Side of Wireless - Connecting Medical Devices with Mobile, Cloud Co...The Other Side of Wireless - Connecting Medical Devices with Mobile, Cloud Co...
The Other Side of Wireless - Connecting Medical Devices with Mobile, Cloud Co...Orthogonal
 
Three Strategies to Maximize Your Insurance Distribution Channel
Three Strategies to Maximize Your Insurance Distribution ChannelThree Strategies to Maximize Your Insurance Distribution Channel
Three Strategies to Maximize Your Insurance Distribution ChannelVlocity
 
Drupal and the Future of Healthcare
Drupal and the Future of HealthcareDrupal and the Future of Healthcare
Drupal and the Future of HealthcareAchieve Internet
 
Maninging Risk Exposure in Meaningful Use Stage 2
Maninging Risk Exposure in Meaningful Use Stage 2Maninging Risk Exposure in Meaningful Use Stage 2
Maninging Risk Exposure in Meaningful Use Stage 2Compliancy Group
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Oracle
 
Enterprise mHealth Strategy 2019
Enterprise mHealth Strategy 2019Enterprise mHealth Strategy 2019
Enterprise mHealth Strategy 2019CitiusTech
 
INTERFACE by apidays - Healthcare Interoperability: From Buzzword to APIs by ...
INTERFACE by apidays - Healthcare Interoperability: From Buzzword to APIs by ...INTERFACE by apidays - Healthcare Interoperability: From Buzzword to APIs by ...
INTERFACE by apidays - Healthcare Interoperability: From Buzzword to APIs by ...apidays
 
mHealth Israel_Health IT for Next Generation Care Delivery_Orna Berry, Ph.D.,...
mHealth Israel_Health IT for Next Generation Care Delivery_Orna Berry, Ph.D.,...mHealth Israel_Health IT for Next Generation Care Delivery_Orna Berry, Ph.D.,...
mHealth Israel_Health IT for Next Generation Care Delivery_Orna Berry, Ph.D.,...Levi Shapiro
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCloudIDSummit
 
Becoming a Customer Centric Bank
Becoming a Customer Centric BankBecoming a Customer Centric Bank
Becoming a Customer Centric BankNG DATA
 

Similar to Identity, Security and Healthcare (20)

Lavacon 20014 Case Study: Securing Mobile Content at VITAS
Lavacon 20014 Case Study: Securing Mobile Content at VITASLavacon 20014 Case Study: Securing Mobile Content at VITAS
Lavacon 20014 Case Study: Securing Mobile Content at VITAS
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Overcoming Cloud-Based Mobility Challenges in Healthcare
Overcoming Cloud-Based Mobility Challenges in HealthcareOvercoming Cloud-Based Mobility Challenges in Healthcare
Overcoming Cloud-Based Mobility Challenges in Healthcare
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
 
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
CTEK Summer Series: The State of Healthcare Security & Privacy | 2021’s Annua...
 
The Other Side of Wireless - Connecting Medical Devices with Mobile, Cloud Co...
The Other Side of Wireless - Connecting Medical Devices with Mobile, Cloud Co...The Other Side of Wireless - Connecting Medical Devices with Mobile, Cloud Co...
The Other Side of Wireless - Connecting Medical Devices with Mobile, Cloud Co...
 
Three Strategies to Maximize Your Insurance Distribution Channel
Three Strategies to Maximize Your Insurance Distribution ChannelThree Strategies to Maximize Your Insurance Distribution Channel
Three Strategies to Maximize Your Insurance Distribution Channel
 
Drupal and the Future of Healthcare
Drupal and the Future of HealthcareDrupal and the Future of Healthcare
Drupal and the Future of Healthcare
 
Maninging Risk Exposure in Meaningful Use Stage 2
Maninging Risk Exposure in Meaningful Use Stage 2Maninging Risk Exposure in Meaningful Use Stage 2
Maninging Risk Exposure in Meaningful Use Stage 2
 
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
Stop the fraudster! Pennsylvania Treasury, Industry Expert Chris Doxey and Fu...
 
Enterprise mHealth Strategy 2019
Enterprise mHealth Strategy 2019Enterprise mHealth Strategy 2019
Enterprise mHealth Strategy 2019
 
INTERFACE by apidays - Healthcare Interoperability: From Buzzword to APIs by ...
INTERFACE by apidays - Healthcare Interoperability: From Buzzword to APIs by ...INTERFACE by apidays - Healthcare Interoperability: From Buzzword to APIs by ...
INTERFACE by apidays - Healthcare Interoperability: From Buzzword to APIs by ...
 
mHealth Israel_Health IT for Next Generation Care Delivery_Orna Berry, Ph.D.,...
mHealth Israel_Health IT for Next Generation Care Delivery_Orna Berry, Ph.D.,...mHealth Israel_Health IT for Next Generation Care Delivery_Orna Berry, Ph.D.,...
mHealth Israel_Health IT for Next Generation Care Delivery_Orna Berry, Ph.D.,...
 
Connected devices
Connected devicesConnected devices
Connected devices
 
CIS14: Global Trends in BYOID
CIS14: Global Trends in BYOIDCIS14: Global Trends in BYOID
CIS14: Global Trends in BYOID
 
Becoming a Customer Centric Bank
Becoming a Customer Centric BankBecoming a Customer Centric Bank
Becoming a Customer Centric Bank
 

More from NetIQ

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows NetIQ
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerNetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessNetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQNetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerNetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNetIQ
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bankNetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQNetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQNetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed ServiceNetIQ
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...NetIQ
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud IdentityNetIQ
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense ReportNetIQ
 
Identity-Powered Security
Identity-Powered SecurityIdentity-Powered Security
Identity-Powered SecurityNetIQ
 
IT Disaster Recovery
IT Disaster RecoveryIT Disaster Recovery
IT Disaster RecoveryNetIQ
 

More from NetIQ (20)

Open Enterprise Server With Windows
Open Enterprise Server With Windows Open Enterprise Server With Windows
Open Enterprise Server With Windows
 
Paraca Inc.
Paraca Inc.Paraca Inc.
Paraca Inc.
 
The University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity ManagerThe University of Westminster Saves Time and Money with Identity Manager
The University of Westminster Saves Time and Money with Identity Manager
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
 
Swisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User AccessSwisscard Saves Time and Effort in Managing User Access
Swisscard Saves Time and Effort in Managing User Access
 
Vodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQVodacom Tightens Security with Identity Manager from NetIQ
Vodacom Tightens Security with Identity Manager from NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log ManagerUniversity of Dayton Ensures Compliance with Sentinel Log Manager
University of Dayton Ensures Compliance with Sentinel Log Manager
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQNippon Light Metal Forges a Disaster Recovery Solution with NetIQ
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations CenterNexus Differentiates Itself and Grows Its Capabilities with Operations Center
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
 
Netiq css huntington_bank
Netiq css huntington_bankNetiq css huntington_bank
Netiq css huntington_bank
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...Professional Services Company Boosts Security, Facilitates Compliance, Automa...
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal UniversityNetIQ Identity Manager Unites Hanshan Normal University
NetIQ Identity Manager Unites Hanshan Normal University
 
Handelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQHandelsbanken Takes Control of Identity Management with NetIQ
Handelsbanken Takes Control of Identity Management with NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQMillions of People Depend on Datang Xianyi Technology and NetIQ
Millions of People Depend on Datang Xianyi Technology and NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Servicebluesource Uses NetIQ AppManager to Offer Standout Managed Service
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report2014 Cyberthreat Defense Report
2014 Cyberthreat Defense Report
 
Identity-Powered Security
Identity-Powered SecurityIdentity-Powered Security
Identity-Powered Security
 
IT Disaster Recovery
IT Disaster RecoveryIT Disaster Recovery
IT Disaster Recovery
 

Recently uploaded

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Identity, Security and Healthcare

  • 1. #HOAHITSEC14 Identity, Security and Healthcare Geoff Webb Senior Director, Solution Strategy
  • 2. Identity, Security and Healthcare Agenda – How does identity and the changing practice of identity management address the major challenges facing the healthcare industry today? •What are the challenges and risks? •How is complexity having an effect? •How does the concept of identity solve these problems? •Where 2 are we headed? © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 3. Big Challenges Facing Healthcare • Demand • Financial • Role for healthcare is changing model is changing of the patient is changing • Healthcare itself is changing • Competitive • Role landscape is changing of government is also changing Source: Business Drivers of Technology Decisions for Healthcare Providers – Gartner December 2013 3 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 4. In other words… a lot is changing, fast 4 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 5. Change Increases Risk These changes increase complexity as well expectations among users of systems and patients. This “consumerization of expectation” is a significant driver of risk for organizations handling sensitive data, such as patient and employee records. 5 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 6. Healthcare Breaches Overall Source: A Look Back: U.S. Healthcare Data Breach Trends - Health Information Trust Alliance (HITRUST) 6 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 7. 94% 7 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 8. Causes Of Breaches Source: Third Annual Benchmark Study on Patient Privacy & Data Security – Ponemon Research 8 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 9. Type of Breach Source: A Look Back: U.S. Healthcare Data Breach Trends - Health Information Trust Alliance (HITRUST) 9 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 11. Market Trends Driving Change Cloud Mobility Information Social ENTERPRISE 11 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 12. Mobility On The Move Source: Third Annual Benchmark Study on Patient Privacy & Data Security – Ponemon Research 12 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 13. Yet Much Remain Unsecured Source: Third Annual Benchmark Study on Patient Privacy & Data Security – Ponemon Research 13 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 14. Consumer Cloud Poses A Risk 14 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 15. Let’s Get Social 15 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 16. More, More, More • More: – – Devices – Users and participants – Collaboration and sharing – Mobility – • Information Risk and penalties Less: – – Visibility – 16 Control Ability to say “no” © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 17. Complexity All of the above is driving an explosion in complexity 17 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 18. Cutting Through Complexity 18 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 19. Identity Is The Key • Identity management is the key to safely unlocking the power of emergent trends such as: – Mobility – Cloud – Information use – Social Media • • 19 Good identity management improves outcomes and reduces risk And it’s cheaper… © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 20. Building On The Power of Identity
  • 21. What Is Identity Management? • Rapidly changing discipline that helps us define: – Who people are – What – What resources they should have access to – What • privileges they should have that access should be In order to: – Improve – Reduce 21 productivity risk © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 22. The Bottom Line Identity Management ensures that the right people have access to the right resources and services at the right time, in the way they need it 22 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 23. Changing Role Of Identity • Gone from highly IT-Centric to very business-centric • No longer owned by the IT organization • Increasingly reflects the more consumerized technology landscape and expectations of users 23 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 24. Identity Ties Together • Relationships of people, process and information • Regardless • In 24 of technology a way that is secure and manageable © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 25. Concrete Challenges • How do I get people access quickly? • How do I monitor what they are doing? • How do I reduce the risk from privileged users? • How do I know when I have been breached? • How do I report on who has access to what? 25 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 26. The Blind Spot Employee Lifecycle Source: http://www.gophoto.us/key/human%20life%20stages 26 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved.
  • 27. The Blind Spot Risk Blind Spot 27 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 28. Who Is The Risk? 28 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 29. Mistakes Are Costly Source: Datalossdb.com 29 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 30. Mistakes Are Costly Source: Datalossdb.com 30 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 31. How Do We Solve These Issues? • Identity Context • Adaptive Access • Integrated Governance • Identity-Powered Security 31 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 32. Integrated Identity and Access Lifecycle Powers the entire user lifecycle 32 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 33. What Does This Look Like?
  • 34. Employees Needs Access… • Self-service access request to healthcare applications • Web, cloud and enterprise single sign-on • Self-service password reset 34 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 35. Managers Need to Manage… • A complete view of her people and resources • Ability to review and approve requests on-the-go • Better information to make access certification decisions, faster 35 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 36. And Auditors Need Visibility • An Identity and Access Governance Platform • Record and review policies and policy violations • Analyze risk from unnecessary access rights • Limit and monitor the activities of privileged users to reduce insider risk 36 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 37. Integrated Identity Management These capabilities derive from integrated, intelligent identity and access management that extends up to the cloud, incorporates mobile computing, and reflects the priorities and speed of business of healthcare professionals 37 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 38. But Wait… 38 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 39. Internet of EVERYTHING 25 billion and 1 trillion items by end of decade 39 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 40. And EVERYTHING is going to want an Identity (which is a lot) 40 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 41. Identity Powered Healthcare • Identity management will define your interactions with clinicians, partners, associates and patients • More devices, more data and more relationships that ever • More opportunities to personalize and respond than ever BUT – the demand for everything to have an identity will tax traditional thinking and approaches 41 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 42. Next Up Welcome to Generation “I” 42 © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 43. Recommendations • Evaluate how your organization uses identity • Plan to integrate identity and access management into the cloud and from mobile devices • Extend identity intelligence into your security management plans • Plan 43 to manage the impact of social identity © 2014 NetIQ Corporation and its affiliates. All Rights Reserved. #HOAHITSEC14
  • 44. Worldwide Headquarters 1233 West Loop South Suite 810 Houston, TX 77027 USA +1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) info@netiq.com NetIQ.com 44 © 2013 NetIQ Corporation and its affiliates. All Rights Reserved. www.netiq.com/communities

Editor's Notes

  1. Well, the good ones look like everything else! Not easy to spot: The intent speaks to the "A" in advanced -- the attackers aren't going to announce their intent. Hack employees – map using LinkedIn and Facebook You’ll need monitoring, logging, etc. Transition in to phishing As I discussed, the trophy is getting in…When it comes to APTs it is not about how good you are once inside, but that you use a totally new approach for entering the organization.  You don’t bother to just simply hack the organization and its infrastructure; you focus much more of your attention on hacking the employees. You can almost map the employees in an organization simply by using published information on LinkedIn. Facebook is another good place to find out where you work and when you are on vacation.