SlideShare a Scribd company logo
1 of 3
Download to read offline
BEARING FACT SHEET
Healthcare Security
 Bearing Solutions; Healthcare
Security
Bearing´s model for Healthcare security is built on the true
understanding of the important prerequisities needed to build an
integrated healthcare security solution where security and risk
management are treated and managed as any other basic
process within the organization.
 Management systems and process orientation
 Security Convergence
 Safety culture
 Systematic safety and security operations as integral
part of the Management system
 Functional safety and technical infrastructure
 Incident report systems as integral part of the
Management system
Security and safety at healthcare facilities are important for both
good quality healthcare and public safety. Hospitals are a safe
haven for those in physical and/or emotional need, and
increasingly seen as a place of refuge in the event of a large-scale
emergency such as a natural disaster or terrorist attack.
The systemic work regarding healthcare safety today is
multidisciplinary and holistic. The security threats that confront
us are no longer respecting the traditional categorization that
we would want to use in order to describe the risks and
vulnerabilities arising from such operations. Information security
and physical security, for example, can no longer be handled
independently without taking into account the convergence
taking place between these areas that rapidly draws entirely new
maps of what previously formed the basis of safety work.
 Healthcare Security issues today
Improving safety in healthcare is not just about technology but
also about safety in terms of responsibilities, attitudes, values
and the understanding management and employees have to
security issues in order to carry out a systematic and
constructive safety work.
Hospital security departments are challenged to provide safe
environments for employees, patients and visitors. Hospitals and
clinics are by their nature designed to be open and accessible to
the public, which means street crime and other dangers can
easily enter through hospital doors if not properly protected.
A survey conducted by the American Society for Industrial
Security (ASIS) determined that effective security has become a
part of the everyday operations of many healthcare
organizations, regardless of size, location, or type of hospital.
Security issues and concerns are identified and addressed daily
by management. Some top-rated security concerns and issues
were identified and ranked as shown below;
Security and Safety Priorities
1. Patients
2. Employees
3. Visitors
4. Vendors
Areas ranked for greatest risk of crime
1. Infant Units
2. Pediatric Units
3. Pharmacy
4. Psychiatric Units
 Conclusion
Patients have really high expectations for quality healthcare
today. State-of-the- art facilities, safety and security are a big
concern. In order to meet the higher expectations within this
really cost-sensitive market, hospitals must invest sensibly in
their facilities as a true strategic asset to serve patients, attract
well-qualified doctors and nurses, and also serve the greater
general public. New building management solutions are able to
increase security at healthcare facilities while also maximizing
energy efficiency and performance.
Technology must work effectively as a tool for well-trained
security staff. Evaluating perimeter and intrusion detection,
access control, and CCTV, require that the vendors show how
integration of these security functions can increase security and
minimize the training and burden to security personnel.
 References
Bearing has over the years gained vast experience from major
healthcare security projects in Sweden. Based on our unique
methodology and understanding of the prerequisites that build a
holistic based healthcare security model we have e.g. led a major
project in “Region Västra Götaland” (Gothenburg) with the goal
to improve the overall security and safety situation in all regional
hospitals and clinics. Areas that were covered involved;
 Inventory of physical and IT- based security equipment
 Extensive Physical and Information security risk
assessments
 Developing a model for security classification of
hospital premises
 Advising on how to build a new holistic based security
organization within the region
 How to implement a new security management
platform within the region
 Security as a business process
Security should naturally be seen as a business process that
manages a security function, a process that is very closely
connected with the principles of quality assurance and
quality control.
Management of the risk inherent in an organization used to be
seen upon as a function embedded within individual roles of the
Management level. Traditionally the approach was to treat risks
separately and assign responsibility to individuals or small teams.
To manage a singular type of risk became a distinct job and to
be successful in the job you had to focus on only one particular
area. The big problem with this “stove piped” approach was that
it ignored the interdependence of many risks and that it sub-
optimized the financing of total risk for an organization.
Breaking stovepipes and seeing risk management and security
programs more like processes means that we need to bring
different stakeholders in the problem together and set them to
solve the problem – together.
 Security convergence
© AESRM 2008
A major trend in the security arena today is security
convergence.
ASIS International define security convergence as;
“The identification of security risks and interdependencies between
business functions and processes within the enterprise and the
development of managed business process solutions to address those
risks and interdependencies.”
Imperatives driving convergence are;
 Rapid expansion of the Enterprise Ecosystem
 Value migration from physical to information-based
and intangible assets
 New protective technologies blurring functional
boundaries
 New compliance and regulatory regimes
 Continuing pressure to reduce cost
The convergence of IT and Physical Security is now a fact and as
IT has become a very important part of most organizations, new
international standards for physical security now also include IT
considerations for electronic documents.
Security convergence forces organizations to see beyond
security as a function and instead something that consists of
people, processes and strategies, being part of the overall
business life-cycle as a system.
Furthermore, organizations now start to appreciate the cost and
competitive advantages that can be leveraged when viewing
security not as a cost center but one of a value add - lowering
costs and providing cost efficiencies.
 Bearing and RiskWatch®
Bearing Consulting is a Partner and VAR of RiskWatch, the
leading Risk Assessment tool for regulatory compliance. For
regulatory compliance, RiskWatch is the most accurate,
comprehensive way to conduct governance, compliance and risk
assessments based on international standards including HIPAA,
ISO 17799, ISO 27001, COBIT 4.0 and Sarbanes Oxley (SOX).
The RiskWatch software includes an installed Windows
application and a simple web-based questionnaire application.
This can also be used on an internal server, or hosted, to
facilitate the gathering of responses from management and IT
system users. Respondents simply answer the questions, and
their answers are imported for analysis.
RiskWatch™ is the world top-rated provider of innovative
security risk assessment and compliance software that
automates the risk management process. RiskWatch clients
include over 2000 hospitals, health plans, investment banks,
business banks, credit unions, state agencies and Federal
agencies including the U.S. Federal Reserve Bank, the nuclear
Regulatory Commission and the Department of Defense.
 The Risk assessment process

More Related Content

What's hot

Due Diligence Requirements in the Health and Safety at Work Act
Due Diligence Requirements in the Health and Safety at Work ActDue Diligence Requirements in the Health and Safety at Work Act
Due Diligence Requirements in the Health and Safety at Work ActHans Buwalda
 
The adoption of it security standards in a healthcare environment
The adoption of it security standards in a healthcare environmentThe adoption of it security standards in a healthcare environment
The adoption of it security standards in a healthcare environmentRui Gomes
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planningWilliam Godwin
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityKym Canty
 
Event security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.ukEvent security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.ukAhsan Gill
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016Ben Browning
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementKeySys Health
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-levelDonald Tabone
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentdata brackets
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management Medigate
 

What's hot (18)

Due Diligence Requirements in the Health and Safety at Work Act
Due Diligence Requirements in the Health and Safety at Work ActDue Diligence Requirements in the Health and Safety at Work Act
Due Diligence Requirements in the Health and Safety at Work Act
 
The adoption of it security standards in a healthcare environment
The adoption of it security standards in a healthcare environmentThe adoption of it security standards in a healthcare environment
The adoption of it security standards in a healthcare environment
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Event security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.ukEvent security companies in london want www.ieventsecurity.co.uk
Event security companies in london want www.ieventsecurity.co.uk
 
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
AP_Cybersecurity_and_Risk_Management_Lead_from_the_C-suite_Mar_2016
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk Management
 
HIPAA Security Risk Assessment
HIPAA Security Risk Assessment HIPAA Security Risk Assessment
HIPAA Security Risk Assessment
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbiz
 
EHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample documentEHR meaningful use security risk assessment sample document
EHR meaningful use security risk assessment sample document
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management
 

Viewers also liked

gsmoverview-130705013748-phpapp02
gsmoverview-130705013748-phpapp02gsmoverview-130705013748-phpapp02
gsmoverview-130705013748-phpapp02Himank Mittal
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Lennart Bredberg
 
Healthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergHealthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergLennart Bredberg
 
Top 10 financial officer interview questions and answers
Top 10 financial officer interview questions and answersTop 10 financial officer interview questions and answers
Top 10 financial officer interview questions and answersCharlizeTheron345
 
Top 10 financial manager interview questions and answers
Top 10 financial manager interview questions and answersTop 10 financial manager interview questions and answers
Top 10 financial manager interview questions and answersCharlizeTheron345
 
Phần mềm về bảo vệ môi trường
Phần mềm về bảo vệ môi trườngPhần mềm về bảo vệ môi trường
Phần mềm về bảo vệ môi trườngGiang Thiết Hbl
 
Top 10 front desk officer interview questions and answers
Top 10 front desk officer interview questions and answersTop 10 front desk officer interview questions and answers
Top 10 front desk officer interview questions and answersCharlizeTheron345
 
Top 10 floor manager interview questions and answers
Top 10 floor manager interview questions and answersTop 10 floor manager interview questions and answers
Top 10 floor manager interview questions and answersCharlizeTheron345
 
Top 10 food and beverage manager interview questions and answers
Top 10 food and beverage manager interview questions and answersTop 10 food and beverage manager interview questions and answers
Top 10 food and beverage manager interview questions and answersCharlizeTheron345
 
Analisis Kondisi Lingkungan (AKL)
Analisis Kondisi Lingkungan (AKL)Analisis Kondisi Lingkungan (AKL)
Analisis Kondisi Lingkungan (AKL)Marselinus Richardo
 

Viewers also liked (13)

Miami Herald article
Miami Herald articleMiami Herald article
Miami Herald article
 
gsmoverview-130705013748-phpapp02
gsmoverview-130705013748-phpapp02gsmoverview-130705013748-phpapp02
gsmoverview-130705013748-phpapp02
 
Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010Security Governance by Risknavigator 2010
Security Governance by Risknavigator 2010
 
Healthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergHealthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart Bredberg
 
Top 10 financial officer interview questions and answers
Top 10 financial officer interview questions and answersTop 10 financial officer interview questions and answers
Top 10 financial officer interview questions and answers
 
Top 10 financial manager interview questions and answers
Top 10 financial manager interview questions and answersTop 10 financial manager interview questions and answers
Top 10 financial manager interview questions and answers
 
ENFS
ENFSENFS
ENFS
 
Phần mềm về bảo vệ môi trường
Phần mềm về bảo vệ môi trườngPhần mềm về bảo vệ môi trường
Phần mềm về bảo vệ môi trường
 
Top 10 front desk officer interview questions and answers
Top 10 front desk officer interview questions and answersTop 10 front desk officer interview questions and answers
Top 10 front desk officer interview questions and answers
 
Top 10 floor manager interview questions and answers
Top 10 floor manager interview questions and answersTop 10 floor manager interview questions and answers
Top 10 floor manager interview questions and answers
 
Top 10 food and beverage manager interview questions and answers
Top 10 food and beverage manager interview questions and answersTop 10 food and beverage manager interview questions and answers
Top 10 food and beverage manager interview questions and answers
 
Analisis Kondisi Lingkungan (AKL)
Analisis Kondisi Lingkungan (AKL)Analisis Kondisi Lingkungan (AKL)
Analisis Kondisi Lingkungan (AKL)
 
Sistem perwakilan kepentingan
Sistem perwakilan kepentinganSistem perwakilan kepentingan
Sistem perwakilan kepentingan
 

Similar to Bearing solutions healthcare security ver 0.1

Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...Redspin, Inc.
 
Improving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security BudgetsImproving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security BudgetsMatthew Rosenquist
 
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...Covance
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfkimangeloullero
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...Dejan Jeremic
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...Angie Miller
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
The Evolution of Corporate Security Trends and Innovations.pdf
The Evolution of Corporate Security Trends and Innovations.pdfThe Evolution of Corporate Security Trends and Innovations.pdf
The Evolution of Corporate Security Trends and Innovations.pdfSWC Security
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutionsCraig Tappel
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guideSergey Erohin
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS ProfileLeon Geldenhuys
 
How to handle Cyber Risk Management in Healthcare.docx.pdf
How to handle Cyber Risk Management in Healthcare.docx.pdfHow to handle Cyber Risk Management in Healthcare.docx.pdf
How to handle Cyber Risk Management in Healthcare.docx.pdfSecureCurve
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTDavid Sweigert
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseThe Economist Media Businesses
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTIJNSA Journal
 

Similar to Bearing solutions healthcare security ver 0.1 (20)

Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
 
Improving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security BudgetsImproving Healthcare Risk Assessments to Maximize Security Budgets
Improving Healthcare Risk Assessments to Maximize Security Budgets
 
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
Integrated Safety and Risk Management Solutions - Addressing the Needs of Sma...
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
The Evolution of Corporate Security Trends and Innovations.pdf
The Evolution of Corporate Security Trends and Innovations.pdfThe Evolution of Corporate Security Trends and Innovations.pdf
The Evolution of Corporate Security Trends and Innovations.pdf
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutions
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
The security risk management guide
The security risk management guideThe security risk management guide
The security risk management guide
 
Targeted Solutions BMS Profile
Targeted Solutions BMS ProfileTargeted Solutions BMS Profile
Targeted Solutions BMS Profile
 
How to handle Cyber Risk Management in Healthcare.docx.pdf
How to handle Cyber Risk Management in Healthcare.docx.pdfHow to handle Cyber Risk Management in Healthcare.docx.pdf
How to handle Cyber Risk Management in Healthcare.docx.pdf
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NISTHIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST
 
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterpriseData security: How a proactive C-suite can reduce cyber-risk for the enterprise
Data security: How a proactive C-suite can reduce cyber-risk for the enterprise
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENTTHE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
THE EFFECT OF INFORMATION TECHNOLOGY USING ENTERPRISE SECURITY RISK MANAGEMENT
 

Recently uploaded

No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...Vip call girls In Chandigarh
 
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipurseemahedar019
 
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service HyderabadCall Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliCall Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliHigh Profile Call Girls Chandigarh Aarushi
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Miss joya
 
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591adityaroy0215
 
Call Girls Service Chandigarh Gori WhatsApp ❤9115573837 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤9115573837 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤9115573837 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤9115573837 VIP Call Girls Chandi...Niamh verma
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhVip call girls In Chandigarh
 
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...delhimodelshub1
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyush Gupta
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service DehradunNiamh verma
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girls Service Chandigarh Ayushi
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknowgragteena
 

Recently uploaded (20)

No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
 
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
 
Call Girl Lucknow Gauri 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
Call Girl Lucknow Gauri 🔝 8923113531  🔝 🎶 Independent Escort Service LucknowCall Girl Lucknow Gauri 🔝 8923113531  🔝 🎶 Independent Escort Service Lucknow
Call Girl Lucknow Gauri 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
 
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service HyderabadCall Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
 
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliCall Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
 
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service DehradunCall Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
 
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
 
Call Girls Service Chandigarh Gori WhatsApp ❤9115573837 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤9115573837 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤9115573837 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤9115573837 VIP Call Girls Chandi...
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
 
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
 
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service DehradunDehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
Dehradun Call Girls Service ❤️🍑 9675010100 👄🫦Independent Escort Service Dehradun
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
 

Bearing solutions healthcare security ver 0.1

  • 1. BEARING FACT SHEET Healthcare Security  Bearing Solutions; Healthcare Security Bearing´s model for Healthcare security is built on the true understanding of the important prerequisities needed to build an integrated healthcare security solution where security and risk management are treated and managed as any other basic process within the organization.  Management systems and process orientation  Security Convergence  Safety culture  Systematic safety and security operations as integral part of the Management system  Functional safety and technical infrastructure  Incident report systems as integral part of the Management system Security and safety at healthcare facilities are important for both good quality healthcare and public safety. Hospitals are a safe haven for those in physical and/or emotional need, and increasingly seen as a place of refuge in the event of a large-scale emergency such as a natural disaster or terrorist attack. The systemic work regarding healthcare safety today is multidisciplinary and holistic. The security threats that confront us are no longer respecting the traditional categorization that we would want to use in order to describe the risks and vulnerabilities arising from such operations. Information security and physical security, for example, can no longer be handled independently without taking into account the convergence taking place between these areas that rapidly draws entirely new maps of what previously formed the basis of safety work.  Healthcare Security issues today Improving safety in healthcare is not just about technology but also about safety in terms of responsibilities, attitudes, values and the understanding management and employees have to security issues in order to carry out a systematic and constructive safety work. Hospital security departments are challenged to provide safe environments for employees, patients and visitors. Hospitals and clinics are by their nature designed to be open and accessible to the public, which means street crime and other dangers can easily enter through hospital doors if not properly protected.
  • 2. A survey conducted by the American Society for Industrial Security (ASIS) determined that effective security has become a part of the everyday operations of many healthcare organizations, regardless of size, location, or type of hospital. Security issues and concerns are identified and addressed daily by management. Some top-rated security concerns and issues were identified and ranked as shown below; Security and Safety Priorities 1. Patients 2. Employees 3. Visitors 4. Vendors Areas ranked for greatest risk of crime 1. Infant Units 2. Pediatric Units 3. Pharmacy 4. Psychiatric Units  Conclusion Patients have really high expectations for quality healthcare today. State-of-the- art facilities, safety and security are a big concern. In order to meet the higher expectations within this really cost-sensitive market, hospitals must invest sensibly in their facilities as a true strategic asset to serve patients, attract well-qualified doctors and nurses, and also serve the greater general public. New building management solutions are able to increase security at healthcare facilities while also maximizing energy efficiency and performance. Technology must work effectively as a tool for well-trained security staff. Evaluating perimeter and intrusion detection, access control, and CCTV, require that the vendors show how integration of these security functions can increase security and minimize the training and burden to security personnel.  References Bearing has over the years gained vast experience from major healthcare security projects in Sweden. Based on our unique methodology and understanding of the prerequisites that build a holistic based healthcare security model we have e.g. led a major project in “Region Västra Götaland” (Gothenburg) with the goal to improve the overall security and safety situation in all regional hospitals and clinics. Areas that were covered involved;  Inventory of physical and IT- based security equipment  Extensive Physical and Information security risk assessments  Developing a model for security classification of hospital premises  Advising on how to build a new holistic based security organization within the region  How to implement a new security management platform within the region  Security as a business process Security should naturally be seen as a business process that manages a security function, a process that is very closely connected with the principles of quality assurance and quality control. Management of the risk inherent in an organization used to be seen upon as a function embedded within individual roles of the Management level. Traditionally the approach was to treat risks separately and assign responsibility to individuals or small teams. To manage a singular type of risk became a distinct job and to be successful in the job you had to focus on only one particular area. The big problem with this “stove piped” approach was that it ignored the interdependence of many risks and that it sub- optimized the financing of total risk for an organization. Breaking stovepipes and seeing risk management and security programs more like processes means that we need to bring different stakeholders in the problem together and set them to solve the problem – together.  Security convergence © AESRM 2008 A major trend in the security arena today is security convergence. ASIS International define security convergence as; “The identification of security risks and interdependencies between business functions and processes within the enterprise and the development of managed business process solutions to address those risks and interdependencies.” Imperatives driving convergence are;  Rapid expansion of the Enterprise Ecosystem  Value migration from physical to information-based and intangible assets  New protective technologies blurring functional boundaries  New compliance and regulatory regimes  Continuing pressure to reduce cost The convergence of IT and Physical Security is now a fact and as
  • 3. IT has become a very important part of most organizations, new international standards for physical security now also include IT considerations for electronic documents. Security convergence forces organizations to see beyond security as a function and instead something that consists of people, processes and strategies, being part of the overall business life-cycle as a system. Furthermore, organizations now start to appreciate the cost and competitive advantages that can be leveraged when viewing security not as a cost center but one of a value add - lowering costs and providing cost efficiencies.  Bearing and RiskWatch® Bearing Consulting is a Partner and VAR of RiskWatch, the leading Risk Assessment tool for regulatory compliance. For regulatory compliance, RiskWatch is the most accurate, comprehensive way to conduct governance, compliance and risk assessments based on international standards including HIPAA, ISO 17799, ISO 27001, COBIT 4.0 and Sarbanes Oxley (SOX). The RiskWatch software includes an installed Windows application and a simple web-based questionnaire application. This can also be used on an internal server, or hosted, to facilitate the gathering of responses from management and IT system users. Respondents simply answer the questions, and their answers are imported for analysis. RiskWatch™ is the world top-rated provider of innovative security risk assessment and compliance software that automates the risk management process. RiskWatch clients include over 2000 hospitals, health plans, investment banks, business banks, credit unions, state agencies and Federal agencies including the U.S. Federal Reserve Bank, the nuclear Regulatory Commission and the Department of Defense.  The Risk assessment process