SlideShare a Scribd company logo
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Top Cyber Risk Mitigation
Strategies
________
● Steven Sarros, Chief Information Officer Baptist Health Care Pensacola
FL●
#LEAD15
A CHIME Leadership Education and Development Forum in collaboration with iHT2
• Department of Homeland Security Daily Open Source Infrastructure
Report (DOSIR) – 16 Critical Infrastructures
• Healthcare and Public Health
• Information Technology
• Defense Industrial Base
• United States Computer Emergency Readiness Team (US-CERT)
• Weekly Briefs and Situational Alerts
• FBI InfraGuard Program
Top Cybersecurity Risk Mitigation Strategies Gathering
Threat Intelligence to Establish Situational Awareness
A CHIME Leadership Education and Development Forum in collaboration with iHT2
• Awareness training
• Vetting (Team Members and Non-Team Members)
• User lifecycle management and granting access
• Monitoring
• FairWarning
• Web, Email and Chat Activity
• Workstation monitoring
• More awareness training
Top Cybersecurity Risk Mitigation Strategies
The “People Factor” Creating the Human Firewall
Q & A
Speaker(s) Contact Information
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Insert Twitter
handle(s) here
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Overall Words of Wisdom
________
Stuff I learned the hard way
● David Finn, Health IT Officer, Symantec ●
#LEAD15
A CHIME Leadership Education and Development Forum in collaboration with iHT2
You
are
here.
Privacy and Security
today in Healthcare
(foot of the hill)
The Changes You
Need to Make
(the summit)
A CHIME Leadership Education and Development Forum in collaboration with iHT2
• Security and usability are often inversely
proportional. (Security is not convenient)
• Security is an investment, not an expense.
• "Good enough" security now, is better than
"perfect" security . . . never.
• There is no such thing as “complete
security” in a usable system.
• A false sense of security is worse than a
true sense of insecurity.
• Your absolute security is only as strong as
your weakest link.
• Concentrate on known, probable threats.
• Security is not a static end state, it is an
iterative process.
• Security is directly related to the education
and ethics of your users.
• There are few forces in the universe
stronger than the desire of an individual to
get his or her job accomplished.
• Security is a people problem. Corollary:
People cause security problems, they don't
just happen.
• You only get to pick two: fast, secure,
cheap.
• In the absence of other factors, always use
the most secure options available. (You are
either serious about security, or you're just
fooling around).
Security Dogma . . . (after 30 years of doing this)
• Roles &
Responsibilities
• Risk Framework
• Reporting
• Build, Deploy &
Maintain
• Patch Management
• Log & Event Mgmt.
8
Copyright © 2015 Symantec Corporation
BusinessStrategy
andGovernance
On-GoingCompliance
andSecurityOperations
• Policies & Procedures
• Risk Mgmt. Process
• Establish Controls
• On-going Risk Analysis
• Impact Assessment
• Remediation &
Mitigation
• Access Management
Principles & Policy
• Org. Mapping
• Roles &
Responsibilities
• Accountability
• Digital Trust
• Identity Management
• Authentication
• Activity Review
• Document Lifecycle
• Data Criticality
• Communications Plan
• Training & Education
• Utilization Mgmt.
• Data Classification
• Encryption
• Mobile Security
• Email Security
• Lifecycle & Change
Management
• Maintenance Policies
• Inventory & Classification
• Digital Media Mgmt.
• Contract & BA Mgmt.
Informa
tion
Protection
Infrastruct
ure
Managem
ent
• Threat Intelligence
• Contingency Planning
• Executive Reporting
• Security Management
• Incident Response
• Anomaly Detection
• Malware Protection
• Audit Support
• Incident Response
Infrastruct
ure
Protection
Secure
Info
Access
A Mature Compliance and Security Model
Business Strategy and Governance driving Security Operations
Governance
(security,
privacy,
compliance)
Q & A
A CHIME Leadership Education and Development Forum in collaboration with iHT2
#LEAD15
• David_Finn@Symantec.com
• @DavidSFinn
• 832.816.2206

More Related Content

What's hot

PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
Pace IT at Edmonds Community College
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
CGTI
 
Cyber threat enterprise leadership required march 2014
Cyber threat   enterprise leadership required  march 2014Cyber threat   enterprise leadership required  march 2014
Cyber threat enterprise leadership required march 2014
Peter ODell
 
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Michele Marius
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
Adrian Wright
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
John Gilligan
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
Phil Huggins FBCS CITP
 
Managing Insider Risk
Managing Insider RiskManaging Insider Risk
Managing Insider Risk
Phil Huggins FBCS CITP
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
Resilient Systems
 
Blue Ocean IT Security
Blue Ocean IT SecurityBlue Ocean IT Security
Blue Ocean IT Security
Jonathan Sinclair
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
John Gilligan
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
Wynyard Group
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
Roger Hagedorn
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
timnolan1961
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
Papadakis K.-Cyber-Information Warfare Analyst & Cyber Defense/Security Consultant-Hellenic MoD
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
EC-Council
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
Leon Fouche
 
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform -  Paul FenwickDelivering Security with the MAX RemoteManagement Platform -  Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
MAXfocus
 
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
EC-Council
 

What's hot (20)

PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd PartiesPACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
PACE-IT, Security+ 2.2: Integrating Data and Systems with 3rd Parties
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Cyber threat enterprise leadership required march 2014
Cyber threat   enterprise leadership required  march 2014Cyber threat   enterprise leadership required  march 2014
Cyber threat enterprise leadership required march 2014
 
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)Jamaica: victim or perpetrator of cyber crime and intrusions (final)
Jamaica: victim or perpetrator of cyber crime and intrusions (final)
 
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
Managing Insider Risk
Managing Insider RiskManaging Insider Risk
Managing Insider Risk
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 
Blue Ocean IT Security
Blue Ocean IT SecurityBlue Ocean IT Security
Blue Ocean IT Security
 
Top Level Cyber Security Strategy
Top Level Cyber Security Strategy Top Level Cyber Security Strategy
Top Level Cyber Security Strategy
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
 
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
ISMS-Information Security Management System-Σύστημα Διαχείρισης Πληροφοριακής...
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezThe Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform -  Paul FenwickDelivering Security with the MAX RemoteManagement Platform -  Paul Fenwick
Delivering Security with the MAX RemoteManagement Platform - Paul Fenwick
 
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
Breach Fixation: How Breaches Distort Reality And How We Should Respond- John...
 

Viewers also liked

Υγεία και Παιδί
Υγεία και ΠαιδίΥγεία και Παιδί
Υγεία και Παιδί
Dora Kalantzi
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Carolyn Slade, MS-HIM
 
production operator
production operatorproduction operator
production operator
GURU JOY
 
lr_4Stepanova
lr_4Stepanovalr_4Stepanova
lr_4Stepanova
StepanovaJulia98
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Carolyn Slade, MS-HIM
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Carolyn Slade, MS-HIM
 
Unit 6 pedegogy[1]
Unit 6 pedegogy[1]Unit 6 pedegogy[1]
Unit 6 pedegogy[1]
neethukeerthi
 
La confianza de los consumidores vascos. Cuarto trimestre 2015
La confianza de los consumidores vascos. Cuarto trimestre 2015La confianza de los consumidores vascos. Cuarto trimestre 2015
La confianza de los consumidores vascos. Cuarto trimestre 2015
bancaparaempresasLABORALKutxa
 
Before the day
Before the dayBefore the day
Before the day
DominicDavidBell
 
Unit 3 reflective_practice[1]
Unit 3 reflective_practice[1]Unit 3 reflective_practice[1]
Unit 3 reflective_practice[1]
neethukeerthi
 
La haine dans le contre transfert
La haine dans le contre transfertLa haine dans le contre transfert
La haine dans le contre transfert
alexispanam
 
Unit 5 pedegpgy[1]
Unit 5 pedegpgy[1]Unit 5 pedegpgy[1]
Unit 5 pedegpgy[1]
neethukeerthi
 
What is Crohns Disease
What is Crohns Disease What is Crohns Disease
What is Crohns Disease
Khawar Khan
 
10.12 SMMForum 2015: Панель 2/ Intertop
10.12 SMMForum 2015: Панель 2/ Intertop10.12 SMMForum 2015: Панель 2/ Intertop
10.12 SMMForum 2015: Панель 2/ Intertop
b2bhub
 
Hardy_Justin_PPP
Hardy_Justin_PPPHardy_Justin_PPP
Hardy_Justin_PPP
Justin Togail
 
Catálago ASTRA - ABC - BANCOS PARA VEÍCULOS PESADOS
Catálago ASTRA - ABC - BANCOS PARA VEÍCULOS PESADOSCatálago ASTRA - ABC - BANCOS PARA VEÍCULOS PESADOS
Catálago ASTRA - ABC - BANCOS PARA VEÍCULOS PESADOS
astraabc
 

Viewers also liked (18)

Υγεία και Παιδί
Υγεία και ΠαιδίΥγεία και Παιδί
Υγεία και Παιδί
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
production operator
production operatorproduction operator
production operator
 
lr_4Stepanova
lr_4Stepanovalr_4Stepanova
lr_4Stepanova
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Unit 6 pedegogy[1]
Unit 6 pedegogy[1]Unit 6 pedegogy[1]
Unit 6 pedegogy[1]
 
La confianza de los consumidores vascos. Cuarto trimestre 2015
La confianza de los consumidores vascos. Cuarto trimestre 2015La confianza de los consumidores vascos. Cuarto trimestre 2015
La confianza de los consumidores vascos. Cuarto trimestre 2015
 
Before the day
Before the dayBefore the day
Before the day
 
HARDWARE CERTIFICATE PDF
HARDWARE CERTIFICATE PDFHARDWARE CERTIFICATE PDF
HARDWARE CERTIFICATE PDF
 
Unit 3 reflective_practice[1]
Unit 3 reflective_practice[1]Unit 3 reflective_practice[1]
Unit 3 reflective_practice[1]
 
La haine dans le contre transfert
La haine dans le contre transfertLa haine dans le contre transfert
La haine dans le contre transfert
 
Unit 5 pedegpgy[1]
Unit 5 pedegpgy[1]Unit 5 pedegpgy[1]
Unit 5 pedegpgy[1]
 
Уралмаш
УралмашУралмаш
Уралмаш
 
What is Crohns Disease
What is Crohns Disease What is Crohns Disease
What is Crohns Disease
 
10.12 SMMForum 2015: Панель 2/ Intertop
10.12 SMMForum 2015: Панель 2/ Intertop10.12 SMMForum 2015: Панель 2/ Intertop
10.12 SMMForum 2015: Панель 2/ Intertop
 
Hardy_Justin_PPP
Hardy_Justin_PPPHardy_Justin_PPP
Hardy_Justin_PPP
 
Catálago ASTRA - ABC - BANCOS PARA VEÍCULOS PESADOS
Catálago ASTRA - ABC - BANCOS PARA VEÍCULOS PESADOSCatálago ASTRA - ABC - BANCOS PARA VEÍCULOS PESADOS
Catálago ASTRA - ABC - BANCOS PARA VEÍCULOS PESADOS
 

Similar to 2015 Atlanta CHIME Lead Forum

mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
Levi Shapiro
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
Lumension
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Health IT Conference – iHT2
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
Art Ocain
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
AmitPandey388410
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
Health IT Conference – iHT2
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
Health IT Conference – iHT2
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
Health IT Conference – iHT2
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
Health IT Conference – iHT2
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Health IT Conference – iHT2
 
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
Health IT Conference – iHT2
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
JayeshGadhave1
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
Resilient Systems
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
Atlantic Security Conference
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
Edinburgh Napier University
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
Craig McGill
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
Infonaligy
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
Dan Michaluk
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
George Goodall
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 

Similar to 2015 Atlanta CHIME Lead Forum (20)

mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 

Recently uploaded

PrudentRx's Function in the Management of Chronic Illnesses
PrudentRx's Function in the Management of Chronic IllnessesPrudentRx's Function in the Management of Chronic Illnesses
PrudentRx's Function in the Management of Chronic Illnesses
PrudentRx Program
 
HUMAN BRAIN.pptx.PRIYA BHOJWANI@GAMIL.COM
HUMAN BRAIN.pptx.PRIYA BHOJWANI@GAMIL.COMHUMAN BRAIN.pptx.PRIYA BHOJWANI@GAMIL.COM
HUMAN BRAIN.pptx.PRIYA BHOJWANI@GAMIL.COM
priyabhojwani1200
 
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
The Lifesciences Magazine
 
Rate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdfRate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdf
Rajarambapu College of Pharmacy Kasegaon Dist Sangli
 
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and EngagementPrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx Program
 
Top massage center in ajman chandrima Spa
Top massage center in ajman chandrima  SpaTop massage center in ajman chandrima  Spa
Top massage center in ajman chandrima Spa
Chandrima Spa Ajman
 
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)
blessyjannu21
 
Tips for Pet Care in winters How to take care of pets.
Tips for Pet Care in winters How to take care of pets.Tips for Pet Care in winters How to take care of pets.
Tips for Pet Care in winters How to take care of pets.
Dinesh Chauhan
 
Trauma Outpatient Center .
Trauma Outpatient Center                       .Trauma Outpatient Center                       .
Trauma Outpatient Center .
TraumaOutpatientCent
 
Under Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's StrategyUnder Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's Strategy
Kenneth Kruk
 
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac CareStem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Dr. David Greene Arizona
 
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Levi Shapiro
 
The Power of Superfoods and Exercise.pdf
The Power of Superfoods and Exercise.pdfThe Power of Superfoods and Exercise.pdf
The Power of Superfoods and Exercise.pdf
Dr Rachana Gujar
 
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGYTime line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
DianaRodriguez639773
 
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdfMBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
bkling
 
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdfChampions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
eurohealthleaders
 
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in CardiologyDr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
R3 Stem Cell
 
Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.
Vishal kr Thakur
 
Feeding plate for a newborn with Cleft Palate.pptx
Feeding plate for a newborn with Cleft Palate.pptxFeeding plate for a newborn with Cleft Palate.pptx
Feeding plate for a newborn with Cleft Palate.pptx
SatvikaPrasad
 
Bringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured ApproachBringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured Approach
Brian Frerichs
 

Recently uploaded (20)

PrudentRx's Function in the Management of Chronic Illnesses
PrudentRx's Function in the Management of Chronic IllnessesPrudentRx's Function in the Management of Chronic Illnesses
PrudentRx's Function in the Management of Chronic Illnesses
 
HUMAN BRAIN.pptx.PRIYA BHOJWANI@GAMIL.COM
HUMAN BRAIN.pptx.PRIYA BHOJWANI@GAMIL.COMHUMAN BRAIN.pptx.PRIYA BHOJWANI@GAMIL.COM
HUMAN BRAIN.pptx.PRIYA BHOJWANI@GAMIL.COM
 
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...
 
Rate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdfRate Controlled Drug Delivery Systems.pdf
Rate Controlled Drug Delivery Systems.pdf
 
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and EngagementPrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and Engagement
 
Top massage center in ajman chandrima Spa
Top massage center in ajman chandrima  SpaTop massage center in ajman chandrima  Spa
Top massage center in ajman chandrima Spa
 
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)
INFECTION OF THE BRAIN -ENCEPHALITIS ( PPT)
 
Tips for Pet Care in winters How to take care of pets.
Tips for Pet Care in winters How to take care of pets.Tips for Pet Care in winters How to take care of pets.
Tips for Pet Care in winters How to take care of pets.
 
Trauma Outpatient Center .
Trauma Outpatient Center                       .Trauma Outpatient Center                       .
Trauma Outpatient Center .
 
Under Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's StrategyUnder Pressure : Kenneth Kruk's Strategy
Under Pressure : Kenneth Kruk's Strategy
 
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac CareStem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
Stem Cell Solutions: Dr. David Greene's Path to Non-Surgical Cardiac Care
 
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
 
The Power of Superfoods and Exercise.pdf
The Power of Superfoods and Exercise.pdfThe Power of Superfoods and Exercise.pdf
The Power of Superfoods and Exercise.pdf
 
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGYTime line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
Time line.ppQAWSDRFTGYUIOPÑLKIUYTREWASDFTGY
 
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdfMBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
 
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdfChampions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
Champions of Health Spotlight On Leaders Shaping Germany's Healthcare.pdf
 
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in CardiologyDr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
Dr. David Greene R3 stem cell Breakthroughs: Stem Cell Therapy in Cardiology
 
Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.
 
Feeding plate for a newborn with Cleft Palate.pptx
Feeding plate for a newborn with Cleft Palate.pptxFeeding plate for a newborn with Cleft Palate.pptx
Feeding plate for a newborn with Cleft Palate.pptx
 
Bringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured ApproachBringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured Approach
 

2015 Atlanta CHIME Lead Forum

  • 1. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Top Cyber Risk Mitigation Strategies ________ ● Steven Sarros, Chief Information Officer Baptist Health Care Pensacola FL● #LEAD15
  • 2. A CHIME Leadership Education and Development Forum in collaboration with iHT2 • Department of Homeland Security Daily Open Source Infrastructure Report (DOSIR) – 16 Critical Infrastructures • Healthcare and Public Health • Information Technology • Defense Industrial Base • United States Computer Emergency Readiness Team (US-CERT) • Weekly Briefs and Situational Alerts • FBI InfraGuard Program Top Cybersecurity Risk Mitigation Strategies Gathering Threat Intelligence to Establish Situational Awareness
  • 3. A CHIME Leadership Education and Development Forum in collaboration with iHT2 • Awareness training • Vetting (Team Members and Non-Team Members) • User lifecycle management and granting access • Monitoring • FairWarning • Web, Email and Chat Activity • Workstation monitoring • More awareness training Top Cybersecurity Risk Mitigation Strategies The “People Factor” Creating the Human Firewall
  • 4. Q & A Speaker(s) Contact Information A CHIME Leadership Education and Development Forum in collaboration with iHT2 Insert Twitter handle(s) here
  • 5. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Overall Words of Wisdom ________ Stuff I learned the hard way ● David Finn, Health IT Officer, Symantec ● #LEAD15
  • 6. A CHIME Leadership Education and Development Forum in collaboration with iHT2 You are here. Privacy and Security today in Healthcare (foot of the hill) The Changes You Need to Make (the summit)
  • 7. A CHIME Leadership Education and Development Forum in collaboration with iHT2 • Security and usability are often inversely proportional. (Security is not convenient) • Security is an investment, not an expense. • "Good enough" security now, is better than "perfect" security . . . never. • There is no such thing as “complete security” in a usable system. • A false sense of security is worse than a true sense of insecurity. • Your absolute security is only as strong as your weakest link. • Concentrate on known, probable threats. • Security is not a static end state, it is an iterative process. • Security is directly related to the education and ethics of your users. • There are few forces in the universe stronger than the desire of an individual to get his or her job accomplished. • Security is a people problem. Corollary: People cause security problems, they don't just happen. • You only get to pick two: fast, secure, cheap. • In the absence of other factors, always use the most secure options available. (You are either serious about security, or you're just fooling around). Security Dogma . . . (after 30 years of doing this)
  • 8. • Roles & Responsibilities • Risk Framework • Reporting • Build, Deploy & Maintain • Patch Management • Log & Event Mgmt. 8 Copyright © 2015 Symantec Corporation BusinessStrategy andGovernance On-GoingCompliance andSecurityOperations • Policies & Procedures • Risk Mgmt. Process • Establish Controls • On-going Risk Analysis • Impact Assessment • Remediation & Mitigation • Access Management Principles & Policy • Org. Mapping • Roles & Responsibilities • Accountability • Digital Trust • Identity Management • Authentication • Activity Review • Document Lifecycle • Data Criticality • Communications Plan • Training & Education • Utilization Mgmt. • Data Classification • Encryption • Mobile Security • Email Security • Lifecycle & Change Management • Maintenance Policies • Inventory & Classification • Digital Media Mgmt. • Contract & BA Mgmt. Informa tion Protection Infrastruct ure Managem ent • Threat Intelligence • Contingency Planning • Executive Reporting • Security Management • Incident Response • Anomaly Detection • Malware Protection • Audit Support • Incident Response Infrastruct ure Protection Secure Info Access A Mature Compliance and Security Model Business Strategy and Governance driving Security Operations Governance (security, privacy, compliance)
  • 9. Q & A A CHIME Leadership Education and Development Forum in collaboration with iHT2 #LEAD15 • David_Finn@Symantec.com • @DavidSFinn • 832.816.2206