• Like
  • Save

iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Services

  • 111 views
Uploaded on

iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Services …

iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Services

Presbyterian healthcare services is a not-for-profit system of hospitals, a health plan and a growing medical group located in New Mexico. For more than 100 years we have been committed to a single purpose Improving the health of the patients, members and communities we serve 15,000 employees, 3B+ revenue. More @ http://www.phs.org/PHS/about/

More in: Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
111
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. MinimallyInvasiveInformationSecurityKim Sassaman, CISSPInformation Security OfficerPresbyterian HealthcareServices
  • 2. Factoids Presbyterian healthcare services is a not-for-profit system of hospitals, a health planand a growing medical group located inNew Mexico. For more than 100 years we have beencommitted to a single purpose Improving the health of the patients,members and communities we serve 15,000 employees, 3B+ revenue More @ http://www.phs.org/PHS/about/
  • 3. What challenges exist Negative perception Desire to utilize cloud solution Social media Broader use of mobile devices Information anywhere, anytime fromanything Innovation center Reduction in resources, human andcapital
  • 4. What changed Created focused department Multi-year vision (36 month slidingwindow) Education of executives and peers Communication and Strategy
  • 5. How? Governance and Policy Implementing technologies CommunicationActually a change in perception wasneeded
  • 6. Perception
  • 7. The real challenge?
  • 8. The detrimental effects of no! „If I were to put you into an fMRI scanner—a hugedonut-shaped magnet that can take a video ofthe neural changes happening in your brain—andflash the word “NO” for less than one second,you‟d see a sudden release of dozens of stress-producing hormones and neurotransmitters. Thesechemicals immediately interrupt the normalfunctioning of your brain, impairing logic, reason,language processing, and communication.‟ An article from Psychology Today by AndrewNewberk, M.D. and Mark Robert Waldman“Neuroscience of communication”
  • 9. Principal adoptedYES, IF!
  • 10.  The optimist sees the donut, the pessimistsees the hole.”― Oscar Wilde
  • 11. Audience participation Each table, discuss a challenge you have Quickly elect a spokesperson 5 minutes What would the conversation sound like, ifyou utilized yes if?
  • 12. Bring Your Own Plastic Stuff(BYOPS) Business driver I want to use my plastic toys while at work I love my plastic toy IT response We like our plastic stuff too We can do this! IT security response Yes we can, IF Log(A+b/C^30+360days delay)
  • 13. How did you secure mobiledevices?With no budgetHey wait!What?Lofty expectations, strained resources and ashort time frame, sounds like a typical ITprojectYep!
  • 14. Simple Business made the configuration decision Governance works! Transparency on all changes Utilized current investments No MDM
  • 15. Security and Innovation Drive to improve quality Data sharing Big Data / Value Data Where do we go next? Security/Compliance is built in
  • 16. How we do it Department focused on innovation Innovation Lab Segregated and walled from organization Calculated approach for pilots Security has a seat at the innovation tableYes, communication again
  • 17. Audience participation Last one! What innovative approach are youchallenged with? Discuss at your table ( 5 minutes) How can security help enable?
  • 18. Parting thoughts Become the Yes, If man Security can enable and innovate Get involved early Be open minded Problem solve vs create Communicate, Communicate Be aware of perceptions!
  • 19. Thank you ksassaman@phs.org www.linkedin.com/in/kimsassaman 505-923-7748 I share knowledge, documents, ideas,etc…