MinimallyInvasiveInformationSecurityKim Sassaman, CISSPInformation Security OfficerPresbyterian HealthcareServices
Factoids Presbyterian healthcare services is a not-for-profit system of hospitals, a health planand a growing medical gro...
What challenges exist Negative perception Desire to utilize cloud solution Social media Broader use of mobile devices...
What changed Created focused department Multi-year vision (36 month slidingwindow) Education of executives and peers C...
How? Governance and Policy Implementing technologies CommunicationActually a change in perception wasneeded
Perception
The real challenge?
The detrimental effects of no! „If I were to put you into an fMRI scanner—a hugedonut-shaped magnet that can take a video...
Principal adoptedYES, IF!
 The optimist sees the donut, the pessimistsees the hole.”― Oscar Wilde
Audience participation Each table, discuss a challenge you have Quickly elect a spokesperson 5 minutes What would the ...
Bring Your Own Plastic Stuff(BYOPS) Business driver I want to use my plastic toys while at work I love my plastic toy ...
How did you secure mobiledevices?With no budgetHey wait!What?Lofty expectations, strained resources and ashort time frame,...
Simple Business made the configuration decision Governance works! Transparency on all changes Utilized current investm...
Security and Innovation Drive to improve quality Data sharing Big Data / Value Data Where do we go next? Security/Com...
How we do it Department focused on innovation Innovation Lab Segregated and walled from organization Calculated approa...
Audience participation Last one! What innovative approach are youchallenged with? Discuss at your table ( 5 minutes) H...
Parting thoughts Become the Yes, If man Security can enable and innovate Get involved early Be open minded Problem so...
Thank you ksassaman@phs.org www.linkedin.com/in/kimsassaman 505-923-7748 I share knowledge, documents, ideas,etc…
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Ser...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Ser...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Ser...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Ser...
iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Ser...
Upcoming SlideShare
Loading in...5
×

iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Services

152

Published on

iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Services

Presbyterian healthcare services is a not-for-profit system of hospitals, a health plan and a growing medical group located in New Mexico. For more than 100 years we have been committed to a single purpose Improving the health of the patients, members and communities we serve 15,000 employees, 3B+ revenue. More @ http://www.phs.org/PHS/about/

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
152
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Services"

  1. 1. MinimallyInvasiveInformationSecurityKim Sassaman, CISSPInformation Security OfficerPresbyterian HealthcareServices
  2. 2. Factoids Presbyterian healthcare services is a not-for-profit system of hospitals, a health planand a growing medical group located inNew Mexico. For more than 100 years we have beencommitted to a single purpose Improving the health of the patients,members and communities we serve 15,000 employees, 3B+ revenue More @ http://www.phs.org/PHS/about/
  3. 3. What challenges exist Negative perception Desire to utilize cloud solution Social media Broader use of mobile devices Information anywhere, anytime fromanything Innovation center Reduction in resources, human andcapital
  4. 4. What changed Created focused department Multi-year vision (36 month slidingwindow) Education of executives and peers Communication and Strategy
  5. 5. How? Governance and Policy Implementing technologies CommunicationActually a change in perception wasneeded
  6. 6. Perception
  7. 7. The real challenge?
  8. 8. The detrimental effects of no! „If I were to put you into an fMRI scanner—a hugedonut-shaped magnet that can take a video ofthe neural changes happening in your brain—andflash the word “NO” for less than one second,you‟d see a sudden release of dozens of stress-producing hormones and neurotransmitters. Thesechemicals immediately interrupt the normalfunctioning of your brain, impairing logic, reason,language processing, and communication.‟ An article from Psychology Today by AndrewNewberk, M.D. and Mark Robert Waldman“Neuroscience of communication”
  9. 9. Principal adoptedYES, IF!
  10. 10.  The optimist sees the donut, the pessimistsees the hole.”― Oscar Wilde
  11. 11. Audience participation Each table, discuss a challenge you have Quickly elect a spokesperson 5 minutes What would the conversation sound like, ifyou utilized yes if?
  12. 12. Bring Your Own Plastic Stuff(BYOPS) Business driver I want to use my plastic toys while at work I love my plastic toy IT response We like our plastic stuff too We can do this! IT security response Yes we can, IF Log(A+b/C^30+360days delay)
  13. 13. How did you secure mobiledevices?With no budgetHey wait!What?Lofty expectations, strained resources and ashort time frame, sounds like a typical ITprojectYep!
  14. 14. Simple Business made the configuration decision Governance works! Transparency on all changes Utilized current investments No MDM
  15. 15. Security and Innovation Drive to improve quality Data sharing Big Data / Value Data Where do we go next? Security/Compliance is built in
  16. 16. How we do it Department focused on innovation Innovation Lab Segregated and walled from organization Calculated approach for pilots Security has a seat at the innovation tableYes, communication again
  17. 17. Audience participation Last one! What innovative approach are youchallenged with? Discuss at your table ( 5 minutes) How can security help enable?
  18. 18. Parting thoughts Become the Yes, If man Security can enable and innovate Get involved early Be open minded Problem solve vs create Communicate, Communicate Be aware of perceptions!
  19. 19. Thank you ksassaman@phs.org www.linkedin.com/in/kimsassaman 505-923-7748 I share knowledge, documents, ideas,etc…

×