SlideShare a Scribd company logo
1 of 33
HIPAA 2011: Five
  Security Strategies to
  Protect ePHI


Join the conversation:
    #hipaa2011
Chris Konrad, Fortrex Technologies
                         Cindy Valladares, Tripwire Inc.

Join the conversation:
    #hipaa2011
Today’s Speakers



                         SVP Client Services




Join the conversation:
    #hipaa2011
• 2010 in review
  • Five Security Strategies to
    Protect ePHI
  • Recommendations
  • Q&A




Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
•
         •

         •

         •


         •




Join the conversation:
    #hipaa2011
Raw Log Data

                              Dynamic Policy Testing



                             Auto-retest to policy
                            Change Process Analysis
                            Close breach-to-discovery time gap
                                                          
                            Immediate time-to-value
                            Reconcile toto usual
                             Business Authorization
                             Exclusive as Tripwire!
                            Change windows
                            User ID
                            Multiple conditions




Join the conversation:
    #hipaa2011
Raw Log Data



                                         Normalization
                                         & Correlation




           •   High Speed Log Archival                   •   Events of Interest
           •   Google like Index                         •   Structured Data
           •   Fast Search                               •   Complex Reporting
           •   Intelligent Reporting                     •   Data visualization




Join the conversation:
    #hipaa2011
Maintain
        Desired State




                                           Non-stop monitoring & collection
                                           Dynamic analysis to find suspicious activities
                         Assess &
                         Achieve           Alert on impact to policy
                                           Remediate options to speed remedy




                                              Time


Join the conversation:
    #hipaa2011
Correlate to     Correlate to
       Bad Changes       Suspicious Events




Join the conversation:
    #hipaa2011
5 failed logins

          Login successful

          Windows event log cleared

          Logging turned off


          Host not generating events

           Policy test fails



Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
Join the conversation:
    #hipaa2011
•
    •



    •
    •
    •




Join the conversation:
    #hipaa2011
•
    •
    •
    •
    •


    •




Join the conversation:
    #hipaa2011
Questions?
• Chris Konrad                 • Cindy Valladares
  Fortrex Technologies           Tripwire, Inc.
  Website: www.fortrex.com       Website: www.tripwire.com
  Email: info@fortrex.com        Email: cvalladares@tripwire.com
  Phone: 877-FORTREX             Twitter: @cindyv & @tripwireinc
  LinkedIn: Fortrex SME Club
  Twitter: @cjkonrad &
  @FORTREXTECH
Chris Konrad                                                      Cindy Valladares
Fortrex Technologies                                                      Tripwire, Inc.
Website: www.fortrex.com          www.tripwire.com    Email: cvalladares@tripwire.com
Email: info@fortrex.com                              Twitter: @cindyv and @tripwireinc
Phone: 877-FORTREX
LinkedIn: Fortrex SME Club
Twitter: @cjkonrad @FORTREXTECH

More Related Content

More from Tripwire

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughTripwire
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyTripwire
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationTripwire
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportTripwire
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!Tripwire
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationTripwire
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...Tripwire
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkTripwire
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 

More from Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

HIPAA – Five Security Strategies to Protect ePHI

Editor's Notes

  1. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  2. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  3. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  4. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  5. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  6. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  7. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  8. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  9. Patient Protection and Affordable Care Act and subsequent Health Care and Education Reconciliation Act of 2010 are passedHITECH Act extends HIPAA Privacy and Security requirement to business associatesHHS proposes HIPAA Privacy, Security and Enforcement Rules modificationsHHS National Coordinator, Office of the National Coordinator for Health IT, Dr. David Blumenthal forms Privacy and Security “tiger team”United States Health Human Services (HHS) publication of breaches of unprotected PHI affecting over 500 individuals totals 3,608,753Connecticut Attorney General, now Senator Richard Blumenthal, issues suit against Health Net for failing to secure the information of 446,000 individuals whose data was on a lost, unencrypted hard driveSettled for $250,000Conditional $500,000 to be paid in the event that the breach proves to have lead to the access of personal information2010 Healthcare Information and Management Systems Society (HIMSS) Security Survey 31% of all healthcare providers experienced a breach to patient information Fewer than one in 10 of 600 surveyed could meet most of the meaningful-use requirementsPonemon Institute and security firm ID Expert research released Hospitals are exposed to a loss of $6 billion dollars annually as a result of breaches 70% of respondents indicated that patient data protection is not a priority
  10. Change management is the cornerstone of many regulationsChange management and testingStart with a baseline w/hardened configurationsDynamic policy testingChange process analysisReconcile to authorization
  11. Monitor activity Capture logsAnalyze for high-risk eventsCorrelate change and events
  12. ER: This is really what you want to know. 5 failed logins on it’s own followed by a successful login is probably a medium to low alert. In fact, this is so common it’s contributing to SIEM overload. But, getting an unrelated alert for each one of these every step along the way won’t help. We think you need this context to see all of these happening in concert so you can quickly see these complicated patterns that impact security. TZ (to transition to next slide): so what does Tripwire do to help solve this?