SlideShare a Scribd company logo
1 of 22
<Insert Picture Here>




Managing Risk and Enforcing Compliance in
Healthcare with Identity Analytics
Agenda

• Panel Discussion

• Challenges and Implementation Overview

• The Solution Behind the Implementation

• Q&A
Panel Discussion


      Jason W. Zellmer                    Rex Thexton                    Viresh Garg
Director, Strategy and Information   Managing Director, Advisory            Director
           Management                        Services
Kaiser Permanente Information
           Security                  PricewaterhouseCoopers        Oracle Identity Management
PwC
Health Information Privacy &
Security (HIPS) & Oracle
Security Practice Overview
PwC Healthcare Information Privacy & Security (HIPS) Service
offerings




PwC                                                            5
PwC - Oracle Security Overview
Our practice has years of experience in Security and Identity &
Access Management with over 1000 professionals in NA.
•PwC is the leading Oracle IdM partner for five consecutive years
•PwC has completed over 150 implementations over the last 4 years
•PwC is the only Oracle partner to be a four time Titan Award winner
•PwC has conducted more 11g implementations than any other Oracle partner
•PwC has been nominated to Oracle’s Deputy CTO program since its inception
•PwC is involved in a significant % of all large Security Deals at Oracle
•PwC is the only Diamond Partner with advanced specialization area in identity




PwC                                                                              6
Kaiser Implementation Overview
                                                                                      Kaiser
Permanente’s Goals

•    Resolve significant deficiencies identified by internal audit for access management controls
     across the enterprise
• Develop sustainable and cost effective compliance processes through the automation of
     access management and recertification
• Standardize on a new IAM product suite (Oracle – OIA/OIM) and retire the legacy IAM
     technology stack (IBM Tivoli)
• Collapse existing IAM functions (help desks, security admins) within the regional business
     units by expanding the footprint of centralized IAM services
• Implement self-service functionality to enable business users and reduce administrative
     burden for care delivery staff (doctors, nurses, etc.)
• Objectives to span across:
    • 7 major business units
    • 150+ SOX applications
PwC                                                                                                 7
    • 1300+ HIPAA applications
Kaiser Identity Management
      Identity Administration Overview at KP (Current State)
                                                          • Access Review by Applications
                                                          • Access Review performed by line
                                                            managers - view users access
                                                            specific to one application .

                                                          Key Pain Points:
                                                          • Lack of Holistic View
                                                          • Absence of automated remediation
                                                            and remediation validation
                                                            mechanisms.
                                                          • Inability to perform role certification.



        Identity Administration Overview at KP (Future State)

                                                                                         KP-OIM
                                        Refine                                           • Authoritative Source for Identities
                                                                                         • Automated Roles based
                                        Role Life-cycle                                    provisioning
                                         Management                                      • Identity Synchronization
                                                                    New
                                 Verify           Define            Users

                                                                   Identity Life-cycle
                                                                     Management

        KP- OIA                                                                  Users
                                                               Change            Leave
        • Authoritative Source for                             Events
          Roles
        • Role Life-cycle Management
        • Advanced Role Certification                                                                                            8
          Capability
PwC                                                                                                                                  8
Old data learns new tricks:
Managing patient privacy and security on a new data-sharing
playground

                                ublished: Fall 2011



                                ata is quickly becoming one of the health
                                industry’s most treasured commodities. Yet,
                                health organizations are acutely aware that
                                sensitive data can be easily compromised. In just
                                the last year and a half, a breach of personal
                                health information occurred, on average, every
                                other day. Breaches erode productivity and
                                patient trust. They’re costly, unpredictable, and
                                unfortunately quite common. More than half of
                                healthcare organizations surveyed by PwC have
                                had at least one privacy/security-related issue in
                                the last two years.


                                ownload this report from PwC at
                                www.PwC.com/us/HITprivacysecurity


PwC                                                                                  9
How to Engage with PwC


                            Rex Thexton                                                             Matthew Lawson
                            rex.thexton@us.pwc.com                                                  matthew.d.lawson@us.pwc.com
                            (908) 868-1386                                                          (415) 515-0276


                            Danielle Butke
                            danielle.i.butke@us.pwc.com
                            (617) 510-7432




 © 2011 PwC. All rights reserved. "PwC" refers to PricewaterhouseCoopers LLP, a Delaware limited liability
 partnership, which is a member firm of PricewaterhouseCoopers International Limited, each member firm of
 which is a separate legal entity. This document is for general information purposes only, and should not be used
 as a substitute for consultation with professional advisors.

PwC                                                                                                                               10
Managing Risk and Enforcing Compliance in
Healthcare with Identity Analytics
Viresh Garg, Director, Identity Management, Oracle
This document is for informational purposes. It is not a commitment
to deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release,
and timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
Healthcare Challenges Are Unique, Acute
  HITECH
                        Sarbanes-Oxley
           HIPAA    EHR Access
  IT/Helpdesk
  Costs                          Staff
            Meaningful Use
                                 Productivity
   VIP Cases
             Patient Care SLA
       Secure Access Control
       Sustainable Compliance Practices
Key Elements to The Solution
Building User’s Risk Profile

                                     Identity Warehouse
     Applications
                                           Risk Assignment
     Identity Data
         Sources
                     Resources    Identities    Entitlements    Roles      Events
              DB
                                         Risk Aggregation
       Mainframe


                                 Low Risk                  Med Risk     High Risk

                                 Auto Certify                    Cert360


                                               Approve

                                               Reject
Closed-Loop Feedback

       User On-
                                             • IT and Business Roles
       boarding                   SOD
                                Checking
                                               SOD Checks
                                                • Preventative
                  User Access

 User Off-
                    Change
                                Aggregate
                                                • Remedial
  board
                                Risk Score
                                             • Risk Feedback
                                                • User Administration
                                                • Access Certifications
Automating User Administration
                                                     Oracle Identity Manager

                                                                            GRANT
                                                                             REVOKE

                                                                            GRANT
                                                                             REVOKE

                                                                            GRANT
                                                                             REVOKE




   Employee             HR System                    Workflow                    Applications, Systems
• Automate Roles Based Provisioning / Deprovisioning
• Identify orphaned accounts and take remedial action
• Self-service requests including password management
• Provide risk feedback and audit trail for compliance reporting in Identity Analytics
Automating Compliance Certification

         1
              Set Up
             Periodic   2   Reviewer Is Notified
                                                   3   Automated Action
                                                                               4    Report Built
                            Goes to Self Service       is taken based on            And Results
             Review
                                                       Periodic Review              Stored in DB
                        Reviewer Selections
                                                                 Email
           What Is               Certify                         Result
          Reviewed?                                             to User


                                                               Automatically
                                 Reject                         Terminate
                                                                   User


           Who                  Decline                         Notify the
          Reviews                                                Process
                                                                  Owner
            It?                                                                      Archive
                               Delegate                           Notify
                                                                 Delegated         Attested Data
                                                                 Reviewer
                                                                                    Attestation
           Start                                                                     Actions
                              Comments
          When?                                                                     Delegation
           How                                                                        Paths
          Often?
Oracle Identity Management Solution Set
Complete, Innovative and Integrated
Platform Reduces Cost vs. Point Solutions


48%   Cost Savings


46%   More
      Responsive


35%   Fewer Audit
      Deficiencies




                     Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Summary

          • Boost Security & Compliance
            • Enforce and prove compliance, prevent privilege
              abuse with Identity Analytics
            • Improve patient care SLA, curb unauthorized
              access, reduce costs with Identity Manager tied
              to Identity Analytics
            • Boost user productivity by 80%
          • For More Information
            •   Contact: Richard.Caldwell@oracle.com
            •   Call him: 1-781-565-1779
            •   www.oracle.com/identity
            •   Blogs.oracle.com/OracleIDM
Q&A


      Jason W. Zellmer                    Rex Thexton                    Viresh Garg
Director, Strategy and Information   Managing Director, Advisory            Director
           Management                        Services
Kaiser Permanente Information
           Security                  PricewaterhouseCoopers        Oracle Identity Management

More Related Content

What's hot

Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in check
OracleIDM
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
OracleIDM
 
Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
OracleIDM
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
OracleIDM
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
OracleIDM
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
OracleIDM
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
debbanerjee
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
vraopolisetti
 

What's hot (17)

Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in check
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
 
Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 

Viewers also liked

E book ondernemen-met-sociale-netwerken
E book ondernemen-met-sociale-netwerkenE book ondernemen-met-sociale-netwerken
E book ondernemen-met-sociale-netwerken
Quietroom Label
 
20087067 choi mun jung presentation
20087067 choi mun jung presentation20087067 choi mun jung presentation
20087067 choi mun jung presentation
문정 최
 
Company Profile
Company ProfileCompany Profile
Company Profile
sach_76
 
Longfellow & Holmes
Longfellow & HolmesLongfellow & Holmes
Longfellow & Holmes
ms_faris
 
Tajuk 10 rumusan & ulang kaji [compatibility mode]
Tajuk 10 rumusan & ulang kaji [compatibility mode]Tajuk 10 rumusan & ulang kaji [compatibility mode]
Tajuk 10 rumusan & ulang kaji [compatibility mode]
Lim Kelly
 

Viewers also liked (20)

Identity Governance Solutions
Identity Governance SolutionsIdentity Governance Solutions
Identity Governance Solutions
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016
 
E book ondernemen-met-sociale-netwerken
E book ondernemen-met-sociale-netwerkenE book ondernemen-met-sociale-netwerken
E book ondernemen-met-sociale-netwerken
 
Kkp sce 3106
Kkp sce 3106Kkp sce 3106
Kkp sce 3106
 
20087067 choi mun jung presentation
20087067 choi mun jung presentation20087067 choi mun jung presentation
20087067 choi mun jung presentation
 
Hp allinone
Hp allinoneHp allinone
Hp allinone
 
Butterflies
ButterfliesButterflies
Butterflies
 
JMS PowerPoint for our Epals
JMS PowerPoint for our EpalsJMS PowerPoint for our Epals
JMS PowerPoint for our Epals
 
Mummys
MummysMummys
Mummys
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Comicus the greatest-2015
Comicus the greatest-2015Comicus the greatest-2015
Comicus the greatest-2015
 
affTA00 - 10 Daftar Isi
affTA00 - 10 Daftar IsiaffTA00 - 10 Daftar Isi
affTA00 - 10 Daftar Isi
 
Lakelyn
LakelynLakelyn
Lakelyn
 
Mark locations
Mark locationsMark locations
Mark locations
 
Longfellow & Holmes
Longfellow & HolmesLongfellow & Holmes
Longfellow & Holmes
 
Introduction to Density
Introduction to DensityIntroduction to Density
Introduction to Density
 
HAPPY NEW YEAR
HAPPY NEW YEARHAPPY NEW YEAR
HAPPY NEW YEAR
 
Tajuk 10 rumusan & ulang kaji [compatibility mode]
Tajuk 10 rumusan & ulang kaji [compatibility mode]Tajuk 10 rumusan & ulang kaji [compatibility mode]
Tajuk 10 rumusan & ulang kaji [compatibility mode]
 

Similar to Healthcare it consolidated

Oracle Quality of Service Management - Meeting SLAs in a Grid Environment
Oracle Quality of Service Management - Meeting SLAs in a Grid EnvironmentOracle Quality of Service Management - Meeting SLAs in a Grid Environment
Oracle Quality of Service Management - Meeting SLAs in a Grid Environment
Aris Prassinos
 
Improving Healthcare Delivery
Improving Healthcare DeliveryImproving Healthcare Delivery
Improving Healthcare Delivery
Dave DeBonis
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle BH
 
A-Check Executive Summary
A-Check Executive SummaryA-Check Executive Summary
A-Check Executive Summary
nikki_staley
 
Agile india 2012 sonali bhasin
Agile india 2012 sonali bhasinAgile india 2012 sonali bhasin
Agile india 2012 sonali bhasin
Sonali Bhasin
 
Webinar slides on Improving client value from microinsurance
Webinar slides on Improving client value from microinsuranceWebinar slides on Improving client value from microinsurance
Webinar slides on Improving client value from microinsurance
Impact Insurance Facility
 
Retail and Wholesale Consumer Centric Merchandising
Retail and Wholesale Consumer Centric MerchandisingRetail and Wholesale Consumer Centric Merchandising
Retail and Wholesale Consumer Centric Merchandising
Dave DeBonis
 

Similar to Healthcare it consolidated (20)

What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
 
Oracle Quality of Service Management - Meeting SLAs in a Grid Environment
Oracle Quality of Service Management - Meeting SLAs in a Grid EnvironmentOracle Quality of Service Management - Meeting SLAs in a Grid Environment
Oracle Quality of Service Management - Meeting SLAs in a Grid Environment
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Improving Healthcare Delivery
Improving Healthcare DeliveryImproving Healthcare Delivery
Improving Healthcare Delivery
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
QlikTalk: QlikView in Legal
QlikTalk: QlikView in LegalQlikTalk: QlikView in Legal
QlikTalk: QlikView in Legal
 
A-Check Executive Summary
A-Check Executive SummaryA-Check Executive Summary
A-Check Executive Summary
 
Option One Case Study
Option One Case StudyOption One Case Study
Option One Case Study
 
Agile india 2012 sonali bhasin
Agile india 2012 sonali bhasinAgile india 2012 sonali bhasin
Agile india 2012 sonali bhasin
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Top 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directoryTop 5 critical changes to audit for active directory
Top 5 critical changes to audit for active directory
 
Webinar slides on Improving client value from microinsurance
Webinar slides on Improving client value from microinsuranceWebinar slides on Improving client value from microinsurance
Webinar slides on Improving client value from microinsurance
 
Succes eller fiasko? Sådan håndteres Big Data i den finansielle sektor, Keith...
Succes eller fiasko? Sådan håndteres Big Data i den finansielle sektor, Keith...Succes eller fiasko? Sådan håndteres Big Data i den finansielle sektor, Keith...
Succes eller fiasko? Sådan håndteres Big Data i den finansielle sektor, Keith...
 
IBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance RequirementsIBM Banking: Automated Systems help meet new Compliance Requirements
IBM Banking: Automated Systems help meet new Compliance Requirements
 
US FICAM Overview
US FICAM OverviewUS FICAM Overview
US FICAM Overview
 
PeopleSoft Accelerate for Healthcare
PeopleSoft Accelerate for HealthcarePeopleSoft Accelerate for Healthcare
PeopleSoft Accelerate for Healthcare
 
Retail and Wholesale Consumer Centric Merchandising
Retail and Wholesale Consumer Centric MerchandisingRetail and Wholesale Consumer Centric Merchandising
Retail and Wholesale Consumer Centric Merchandising
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance framework
 
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
"NSTIC Pilots on the trust network" Webinar Slides 10-12-2012
 
Identity access management
Identity access management Identity access management
Identity access management
 

More from OracleIDM

Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 

More from OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Healthcare it consolidated

  • 1. <Insert Picture Here> Managing Risk and Enforcing Compliance in Healthcare with Identity Analytics
  • 2. Agenda • Panel Discussion • Challenges and Implementation Overview • The Solution Behind the Implementation • Q&A
  • 3. Panel Discussion Jason W. Zellmer Rex Thexton Viresh Garg Director, Strategy and Information Managing Director, Advisory Director Management Services Kaiser Permanente Information Security PricewaterhouseCoopers Oracle Identity Management
  • 4. PwC Health Information Privacy & Security (HIPS) & Oracle Security Practice Overview
  • 5. PwC Healthcare Information Privacy & Security (HIPS) Service offerings PwC 5
  • 6. PwC - Oracle Security Overview Our practice has years of experience in Security and Identity & Access Management with over 1000 professionals in NA. •PwC is the leading Oracle IdM partner for five consecutive years •PwC has completed over 150 implementations over the last 4 years •PwC is the only Oracle partner to be a four time Titan Award winner •PwC has conducted more 11g implementations than any other Oracle partner •PwC has been nominated to Oracle’s Deputy CTO program since its inception •PwC is involved in a significant % of all large Security Deals at Oracle •PwC is the only Diamond Partner with advanced specialization area in identity PwC 6
  • 7. Kaiser Implementation Overview Kaiser Permanente’s Goals • Resolve significant deficiencies identified by internal audit for access management controls across the enterprise • Develop sustainable and cost effective compliance processes through the automation of access management and recertification • Standardize on a new IAM product suite (Oracle – OIA/OIM) and retire the legacy IAM technology stack (IBM Tivoli) • Collapse existing IAM functions (help desks, security admins) within the regional business units by expanding the footprint of centralized IAM services • Implement self-service functionality to enable business users and reduce administrative burden for care delivery staff (doctors, nurses, etc.) • Objectives to span across: • 7 major business units • 150+ SOX applications PwC 7 • 1300+ HIPAA applications
  • 8. Kaiser Identity Management Identity Administration Overview at KP (Current State) • Access Review by Applications • Access Review performed by line managers - view users access specific to one application . Key Pain Points: • Lack of Holistic View • Absence of automated remediation and remediation validation mechanisms. • Inability to perform role certification. Identity Administration Overview at KP (Future State) KP-OIM Refine • Authoritative Source for Identities • Automated Roles based Role Life-cycle provisioning Management • Identity Synchronization New Verify Define Users Identity Life-cycle Management KP- OIA Users Change Leave • Authoritative Source for Events Roles • Role Life-cycle Management • Advanced Role Certification 8 Capability PwC 8
  • 9. Old data learns new tricks: Managing patient privacy and security on a new data-sharing playground ublished: Fall 2011 ata is quickly becoming one of the health industry’s most treasured commodities. Yet, health organizations are acutely aware that sensitive data can be easily compromised. In just the last year and a half, a breach of personal health information occurred, on average, every other day. Breaches erode productivity and patient trust. They’re costly, unpredictable, and unfortunately quite common. More than half of healthcare organizations surveyed by PwC have had at least one privacy/security-related issue in the last two years. ownload this report from PwC at www.PwC.com/us/HITprivacysecurity PwC 9
  • 10. How to Engage with PwC Rex Thexton Matthew Lawson rex.thexton@us.pwc.com matthew.d.lawson@us.pwc.com (908) 868-1386 (415) 515-0276 Danielle Butke danielle.i.butke@us.pwc.com (617) 510-7432 © 2011 PwC. All rights reserved. "PwC" refers to PricewaterhouseCoopers LLP, a Delaware limited liability partnership, which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity. This document is for general information purposes only, and should not be used as a substitute for consultation with professional advisors. PwC 10
  • 11. Managing Risk and Enforcing Compliance in Healthcare with Identity Analytics Viresh Garg, Director, Identity Management, Oracle
  • 12. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 13. Healthcare Challenges Are Unique, Acute HITECH Sarbanes-Oxley HIPAA EHR Access IT/Helpdesk Costs Staff Meaningful Use Productivity VIP Cases Patient Care SLA  Secure Access Control  Sustainable Compliance Practices
  • 14. Key Elements to The Solution
  • 15. Building User’s Risk Profile Identity Warehouse Applications Risk Assignment Identity Data Sources Resources Identities Entitlements Roles Events DB Risk Aggregation Mainframe Low Risk Med Risk High Risk Auto Certify Cert360 Approve Reject
  • 16. Closed-Loop Feedback User On- • IT and Business Roles boarding SOD Checking SOD Checks • Preventative User Access User Off- Change Aggregate • Remedial board Risk Score • Risk Feedback • User Administration • Access Certifications
  • 17. Automating User Administration Oracle Identity Manager GRANT REVOKE GRANT REVOKE GRANT REVOKE Employee HR System Workflow Applications, Systems • Automate Roles Based Provisioning / Deprovisioning • Identify orphaned accounts and take remedial action • Self-service requests including password management • Provide risk feedback and audit trail for compliance reporting in Identity Analytics
  • 18. Automating Compliance Certification 1 Set Up Periodic 2 Reviewer Is Notified 3 Automated Action 4 Report Built Goes to Self Service is taken based on And Results Review Periodic Review Stored in DB Reviewer Selections Email What Is Certify Result Reviewed? to User Automatically Reject Terminate User Who Decline Notify the Reviews Process Owner It? Archive Delegate Notify Delegated Attested Data Reviewer Attestation Start Actions Comments When? Delegation How Paths Often?
  • 19. Oracle Identity Management Solution Set Complete, Innovative and Integrated
  • 20. Platform Reduces Cost vs. Point Solutions 48% Cost Savings 46% More Responsive 35% Fewer Audit Deficiencies Source: Aberdeen “Analyzing point solutions vs. platform” 2011
  • 21. Summary • Boost Security & Compliance • Enforce and prove compliance, prevent privilege abuse with Identity Analytics • Improve patient care SLA, curb unauthorized access, reduce costs with Identity Manager tied to Identity Analytics • Boost user productivity by 80% • For More Information • Contact: Richard.Caldwell@oracle.com • Call him: 1-781-565-1779 • www.oracle.com/identity • Blogs.oracle.com/OracleIDM
  • 22. Q&A Jason W. Zellmer Rex Thexton Viresh Garg Director, Strategy and Information Managing Director, Advisory Director Management Services Kaiser Permanente Information Security PricewaterhouseCoopers Oracle Identity Management

Editor's Notes

  1. Events include: Last Attestation History, Open Audit Violations and Provisioning Method. Based on the resources the use has access to, the entitlements privileges, the way access was granted or the user assigned to a role, all these factors contribute to a user’s risk profile. The Identity Warehouse aggregates this info from across all resources and builds the user’s risk profile. To take the subjectiveness out of it, instead of assigning a risk #, the users are bucketed into Low Risk, Med Risk, High Risk making risk aggregation objective &amp; intuitive. Since the reviewers focus should rightfully be on high and med risk profiles rather than the low risk ones, you can use the risk aggregation to build checks &amp; balances for your med &amp; high risk profiles, do a Cert360 on those users to completely assess their entitlements profiles while low risk users can even be bulk certified using an automated, intuitive web interface. Risk analytics really takes advantage of the new interface, where your reviewers can now really focus on &quot;what matters most&quot; and quickly access users, roles, accounts, etc. with ease
  2. Identity Administration helps solve the provisioning/de-provisioning challenge and many other common issues. Let’s take a look at how this works. Oracle Identity Manager automates all aspects of administering user identities. It’s key capabilities can be broadly broken down into 3 buckets It automates provisioning and de-provisioning of users. Typically when an employee joins the company, they are entered into the HR system. OIM can automatically detect this addition/change, and kick off a workflow process for provisioning them with access to the systems they would need. After receiving the necessary approvals, OIM automatically creates accounts for this user in all the relevant applications. Similarly, when an employee departs, since OIM knows everything she has access to, it can quickly revoke access from all systems. Additionally, as folks change roles they are automatically de-provisioned from systems they no longer need, and added to new ones relevant to their new role. This ensures that users do not “collect” privileges over time, another common security vulnerability. Another immediate benefit organizations realize as soon as they implement OIM is they’re quickly able to identify and remediate orphaned accounts – live accounts whose owners are no longer with the organization OIM also provides much improved visibility across enterprise-wide security controls, quickly able to produce reports such as “who has access to what”. As we’ll discuss later, this also greatly eases the cost of compliance. Finally, another great source of cost savings is through end user self-service. Users can use a web interface to reset forgotten passwords, request new accounts and more, thus eliminating a significant volume of help-desk calls
  3. Access Certification or attestation is a key part of Sarbanes-Oxley compliance and a highly recommended security best-practice.  Oracle Identity Analytics offers a best-in-class attestation feature that can be deployed quickly to enable an enterprise-wide attestation process that features automated report generation, delivery and notification.  Attestation reviewers can review fine-grained access reports within an interactive user interface that supports fine-grained certify, reject, decline, and delegate actions.  All report data and reviewers’ actions are captured for future auditing needs.  Reviewer actions can optionally trigger corrective action using Oracle Identity Manager’s workflow engine. The new OIA attestation UI is quite dynamic. Like the ipad, There really is no wrong way of holding it. u can sort and filter and view users and their access the way u want to, but always go back to that &quot;original&quot; view
  4. Complimentary functionalities must be harnessed to achieve true end to end enterprise class security. Oracle has the most complete identity and access management offering in the industry because we are executing on a complete vision of security. Oracle Identity Management is a comprehensive offering of several best of breed products. Oracle IdM is the most complete and integrated IDM suite in the industry today. It is hot-pluggable and supports most leading third party platforms and applications. It is built on a unique architectural approach called Service Oriented Security which enables security to be externalized from applications and centralized using a standards based IDM framework. At Oracle, we like to think of IdM as being composed of some distinct functional areas:   We have Identity Administration which is all about user provisioning and role lifecycle management. Oracle Identity Manager - our two flagship product in the Id Admin space.   Then we have Access Management which is all about access control – authentication, authorization, single sign on and federation. In addition, Oracle also offers next gen access management technologies for risk based access control, for fine grained authorizaton, for web services security and information rights management for securing sensitive, unstructured business information.   We also have Directory Services for centralizing and consolidating user identities. With Oracle Id analytics and the new Oracle Security Governor, we now offer comprehensive Identity &amp; Access Governance. Of course, OPSS is the security foundation across all of Middleware and Fusion apps.