SlideShare a Scribd company logo
1 of 20
Kurt Hagerman | Chief Information Security Officer
BECOME A SMARTER CLOUD
CONSUMERRipping through the Rhetoric to Find Your Cloud & Control Your Risk
05/18/2015
Kurt Hagerman
ABOUT KURT HAGERMAN
Expert in attaining and maintaining
compliance standards, including PCI, HIPAA,
ISO 27001, among others. Has conducted
hundreds of security reviews and audits
across a number of industries including the
payment space, healthcare, financial services
and higher education.
Industry Leadership
• Cloud Security Alliance SME Council
• ISACA
• CSA
• ISSA
Chief Information Security Officer
So, you’ve decided to explore
the cloud for your PHI but are
worried about HIPAA
compliance.
HITRUST 2015: Become a Smarter Cloud Consumer
Have you done your research and
come away confused about how
various cloud vendors
communicate about HIPAA
compliance?
It’s understandable given
what they are saying.
HITRUST 2015: Become a Smarter Cloud Consumer
IT’S NOT WHAT YOU SAY. IT’S WHAT YOU DO.
Do you know what
your vendor is really
doing for you?
Do you know who to
call when something
goes wrong?
What about the
privacy and
breach rule?
?
?
?
HITRUST 2014: PHI and the Cloud
What They’re Saying…
HITRUST 2014: PHI and the Cloud
SECURITY
• Outrageous statements being made
• They sound good but ring hollow
• What do they actually mean to you, the
cloud consumer, and how will your
vendor’s stance affect your compliance?
Are you Confused? Frustrated?
I know I am.
HITRUST 2014: PHI and the Cloud
SNAKE OIL, ANYONE?
• Vendors trivialize HIPAA
compliance
• Vendors over simplify
the requirements
to sell their services as a
“silver bullet”
• HIPAA is risk-based for
a reason
• There is no
“Easy Button”
HITRUST 2014: PHI and the Cloud
CONSIDER THE CLOUD MODELS
Role Clarity
HITRUST 2014: PHI and the Cloud
Consider the Cloud Models
HITRUST 2014: PHI and the Cloud
Your responsibilities, and those of your cloud vendor,
vary based on the model used by the vendor.
Providers: AWS, Azure, Rackspace, SoftLayer, etc.
• Typically only provide security for the
underlying infrastructure
• Any compliance attestations only apply
to underlying infrastructure with no
leverage available to customers
• Vendors forced into signing BAAs,
but theirs are typically weak
based on the lack of security
provided to the customer
• Customer owns nearly 100 percent
of the compliance responsibility
INFRASTRUCTURE AS A SERVICE (IAAS)
HITRUST 2014: PHI and the Cloud
Providers: AWS (Elastic Beanstalk), Salesforce (Force.com),
IBM SmartCloud, CloudFoundry, HP Helion, etc.
• Provide development tools and other building
blocks for applications and
secure these services
• Compliance attestations apply to the service
with limited leverage available
to customers
• Will sign BAAs, but typically provide
little in terms of liability protection
based on the limited security
provided to the customer
• Customer owns a majority of the compliance
responsibility
PLATFORM AS A SERVICE (PAAS)
HITRUST 2014: PHI and the Cloud
Providers: Salesforce, Box, Epic, Allscripts, Athena, etc.
• Own the entire stack up through
the application
• Any compliance attestations apply to the
entire service with significant available to
customers
• BAAs are typically stronger based
on security provided to customer
data and contain reasonable
liability language
• Customer owns very little of the
compliance responsibility (at least
for the HIPAA security rule)
SOFTWARE AS A SERVICE (SAAS)
HITRUST 2014: PHI and the Cloud
• IaaS and PaaS are fairly close in
terms of the split of responsibility
between customer and vendor (PaaS
more difficult to parse)
• Significant shift from PaaS to SaaS
in terms of vendor responsibility
• Risk to your organization increases
from IaaS to SaaS
THE MODELS COMPARED
HITRUST 2014: PHI and the Cloud
• Do you know what your vendor is really doing for you?
• Do they provide information on the specific security controls
that are included with their service?
• Have they mapped their services and security controls to the
HIPAA/HITECH requirements?
• Does your vendor use third parties to provide services to
you?
• Have they (and their third parties) been independently
assessed?
• Do you know who to call when something goes wrong?
• What about the privacy and breach rule?
• How do I manage a compliance program with multiple
vendors all providing my “cloud services”?
IT’S NOT WHAT YOU SAY. IT’S WHAT YOU DO.
HITRUST 2014: PHI and the Cloud
1. Identifying the division of responsibility
between you and your cloud vendor
2. Ensuring the services your vendor
is providing are properly mapped
to your risk assessment
3. Getting the evidence you need for
your audit
4. Obtaining objective attestation
documentation from the vendor for
the controls they have full or partial
responsibility for
5. Monitoring ongoing compliance
of your vendors
6. Receiving support from vendor
during a breach event
SIX COMPLIANCE CHALLENGES
HITRUST 2014: PHI and the Cloud
BE A SMARTER CLOUD CONSUMER
You need to deal with vendors who will
be transparent about what they do and
how it assists you in mitigating risk and
addressing compliance requirements.
CAVEAT EMPTOR
HITRUST 2014: PHI and the Cloud
Your Vendor Should:
• Provide a clear, concise explanation of the specific security
controls they include in their service and how these directly
assist you in meeting your compliance obligations
• Articulate the boundaries between their responsibility and yours
• Provide documentation that backs up assertions about being
“HIPAA Compliant,” including independent audit reports that
clearly state:
- the scope of the assessment
- the control framework used
- how compliance can be leveraged by you
BE A SMARTER CLOUD CONSUMERCAVEAT EMPTOR
HITRUST 2014: PHI and the Cloud
What about Business Associate Agreements?
Many vendors say they are “business associate-friendly”
and that they will sign a BAA.
• Does their BAA include language
that clearly states what services they
are providing and what responsibility they are taking for
security incidents?
• Do they suggest this language
when reviewing yours?
HITRUST 2014: PHI and the Cloud
Thank You
Questions?
Kurt Hagerman Email kurt.hagerman@firehost.com
Phone +1 877 262 3473
HITRUST 2014: PHI and the Cloud

More Related Content

What's hot

Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructurePing Identity
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCipherCloud
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniOWASP Delhi
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverPing Identity
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceFlexera
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyOkta-Inc
 
McKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & AutomationMcKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & AutomationForgeRock
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesAhmad Khan
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloudJulian Knight
 
Entitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold RushEntitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold RushForgeRock
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...AirTight Networks
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsForgeRock
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorPing Identity
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At CompliancePing Identity
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingJoshuaCiccone2
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESForgeRock
 

What's hot (20)

Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
CIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud AdoptionCIO's Guide to Enterprise Cloud Adoption
CIO's Guide to Enterprise Cloud Adoption
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav Chablani
 
API Security Needs AI Now More Than Ever
API Security Needs AI Now More Than EverAPI Security Needs AI Now More Than Ever
API Security Needs AI Now More Than Ever
 
Using Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and ComplianceUsing Automated Policies for SaaS Governance and Compliance
Using Automated Policies for SaaS Governance and Compliance
 
Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
McKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & AutomationMcKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & Automation
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practices
 
Security and governance in the cloud
Security and governance in the cloudSecurity and governance in the cloud
Security and governance in the cloud
 
Entitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold RushEntitlements: Taking Control of the Big Data Gold Rush
Entitlements: Taking Control of the Big Data Gold Rush
 
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
The New Economics of Wi-Fi _ Disruptive Forces Driving Innovation for Carrier...
 
Identity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management SystemsIdentity Summit 2015: Connect.gov and Identity Management Systems
Identity Summit 2015: Connect.gov and Identity Management Systems
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At ComplianceGDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
GDPR & Customer IAM: The Real Winners Won’t Stop At Compliance
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Identiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffingIdentiverse 2018 nathanael coffing
Identiverse 2018 nathanael coffing
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGESIdentity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
Identity Summit UK: STEPPING UP TO NEW DATA PROTECTION CHALLENGES
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 

Viewers also liked

MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...accenture
 
Počítačové sítě II, lekce 7: Telekomunikační přenosové technologie
Počítačové sítě II, lekce 7: Telekomunikační přenosové technologiePočítačové sítě II, lekce 7: Telekomunikační přenosové technologie
Počítačové sítě II, lekce 7: Telekomunikační přenosové technologieJiří Peterka
 
JHall Resume Logistics 2016 private
JHall Resume Logistics 2016 privateJHall Resume Logistics 2016 private
JHall Resume Logistics 2016 privateJeri Hall
 
Rzepnicki_thesis_presentation_2003(2) (1)
Rzepnicki_thesis_presentation_2003(2) (1)Rzepnicki_thesis_presentation_2003(2) (1)
Rzepnicki_thesis_presentation_2003(2) (1)Witold Rzepnicki
 
Lightning and Surge Protection for Potentially Explosive Atmospheres
Lightning and Surge Protection for Potentially Explosive AtmospheresLightning and Surge Protection for Potentially Explosive Atmospheres
Lightning and Surge Protection for Potentially Explosive AtmospheresInstrument Specialties, Inc.
 
Double click search fundamentals certification
Double click search fundamentals certificationDouble click search fundamentals certification
Double click search fundamentals certificationDionysis Konstantinopoulos
 

Viewers also liked (12)

MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
6
66
6
 
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
Navigating the Crude Cycle: 4 lines of attack for US E&P energy companies to ...
 
Mobile CRM
Mobile CRMMobile CRM
Mobile CRM
 
Počítačové sítě II, lekce 7: Telekomunikační přenosové technologie
Počítačové sítě II, lekce 7: Telekomunikační přenosové technologiePočítačové sítě II, lekce 7: Telekomunikační přenosové technologie
Počítačové sítě II, lekce 7: Telekomunikační přenosové technologie
 
JHall Resume Logistics 2016 private
JHall Resume Logistics 2016 privateJHall Resume Logistics 2016 private
JHall Resume Logistics 2016 private
 
Rzepnicki_thesis_presentation_2003(2) (1)
Rzepnicki_thesis_presentation_2003(2) (1)Rzepnicki_thesis_presentation_2003(2) (1)
Rzepnicki_thesis_presentation_2003(2) (1)
 
Lightning and Surge Protection for Potentially Explosive Atmospheres
Lightning and Surge Protection for Potentially Explosive AtmospheresLightning and Surge Protection for Potentially Explosive Atmospheres
Lightning and Surge Protection for Potentially Explosive Atmospheres
 
gen_linked in
gen_linked ingen_linked in
gen_linked in
 
Double click search fundamentals certification
Double click search fundamentals certificationDouble click search fundamentals certification
Double click search fundamentals certification
 
Engagement at work
Engagement at workEngagement at work
Engagement at work
 
Network fundamentals
Network fundamentalsNetwork fundamentals
Network fundamentals
 

Similar to BECOME A SMARTER CLOUD CONSUMER - Ripping through the Rhetoric to Find Your Cloud & Control Your Risk

Making Sense of Security and Compliance
Making Sense of Security and ComplianceMaking Sense of Security and Compliance
Making Sense of Security and ComplianceArmor
 
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 Build HIPAA Eligible Solutions with AWS and APN Partners PPT Build HIPAA Eligible Solutions with AWS and APN Partners PPT
Build HIPAA Eligible Solutions with AWS and APN Partners PPTAmazon Web Services
 
Cloud compliance test
Cloud compliance testCloud compliance test
Cloud compliance testPrancer Io
 
What Every Physician Needs to Know About Cloud Storage
What Every Physician Needs to Know About Cloud StorageWhat Every Physician Needs to Know About Cloud Storage
What Every Physician Needs to Know About Cloud StorageTexas Medical Liability Trust
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxTrish McGinity, CCSK
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainShawn Brown
 
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...Health IT Conference – iHT2
 
Public cloud and the state of security
Public cloud and the state of securityPublic cloud and the state of security
Public cloud and the state of securityOlivier Schmitt
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...Ajeet Singh
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Cloudera, Inc.
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudHappiest Minds Technologies
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...Dana Gardner
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containersAbhishek Sood
 
eFolder Partner Chat Webinar — Selling to Medical Clients: Anchor and HIPAA
eFolder Partner Chat Webinar — Selling to Medical Clients: Anchor and HIPAAeFolder Partner Chat Webinar — Selling to Medical Clients: Anchor and HIPAA
eFolder Partner Chat Webinar — Selling to Medical Clients: Anchor and HIPAAeFolder
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Happiest Minds Technologies
 
Comparison Between SaaS and On-Premise Services in Healthcare IT Solutions
Comparison Between SaaS and On-Premise Services in Healthcare IT SolutionsComparison Between SaaS and On-Premise Services in Healthcare IT Solutions
Comparison Between SaaS and On-Premise Services in Healthcare IT SolutionsEzovion
 

Similar to BECOME A SMARTER CLOUD CONSUMER - Ripping through the Rhetoric to Find Your Cloud & Control Your Risk (20)

Making Sense of Security and Compliance
Making Sense of Security and ComplianceMaking Sense of Security and Compliance
Making Sense of Security and Compliance
 
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 Build HIPAA Eligible Solutions with AWS and APN Partners PPT Build HIPAA Eligible Solutions with AWS and APN Partners PPT
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 
Cloud compliance test
Cloud compliance testCloud compliance test
Cloud compliance test
 
What Every Physician Needs to Know About Cloud Storage
What Every Physician Needs to Know About Cloud StorageWhat Every Physician Needs to Know About Cloud Storage
What Every Physician Needs to Know About Cloud Storage
 
Csa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghxCsa presentation november 2016 sloane ghx
Csa presentation november 2016 sloane ghx
 
Digital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychainDigital defence ds-vciso-supplychain
Digital defence ds-vciso-supplychain
 
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
Health IT Summit Beverly Hills 2014 – “A Use Case…Thoughts on How to Leverage...
 
Public cloud and the state of security
Public cloud and the state of securityPublic cloud and the state of security
Public cloud and the state of security
 
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
HIPAA Compliant Salesforce Health Cloud – Why Healthcare Organizations Must C...
 
Healthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major PriorityHealthcare Cloud Adoption – HIPAA Still the Major Priority
Healthcare Cloud Adoption – HIPAA Still the Major Priority
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containers
 
How it pros buy cloud servers
How it pros buy cloud serversHow it pros buy cloud servers
How it pros buy cloud servers
 
MindSHARE: Staying Secure Online
MindSHARE: Staying Secure OnlineMindSHARE: Staying Secure Online
MindSHARE: Staying Secure Online
 
eFolder Partner Chat Webinar — Selling to Medical Clients: Anchor and HIPAA
eFolder Partner Chat Webinar — Selling to Medical Clients: Anchor and HIPAAeFolder Partner Chat Webinar — Selling to Medical Clients: Anchor and HIPAA
eFolder Partner Chat Webinar — Selling to Medical Clients: Anchor and HIPAA
 
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
 
Comparison Between SaaS and On-Premise Services in Healthcare IT Solutions
Comparison Between SaaS and On-Premise Services in Healthcare IT SolutionsComparison Between SaaS and On-Premise Services in Healthcare IT Solutions
Comparison Between SaaS and On-Premise Services in Healthcare IT Solutions
 

Recently uploaded

Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabadgragmanisha42
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...indiancallgirl4rent
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Sheetaleventcompany
 
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetErnakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...russian goa call girl and escorts service
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...Ahmedabad Call Girls
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthanindiancallgirl4rent
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
Call Girls Patiala Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Patiala Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Patiala Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Patiala Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171Call Girls Service Gurgaon
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Memriyagarg453
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 

Recently uploaded (20)

Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
 
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
(Ajay) Call Girls in Dehradun- 8854095900 Escorts Service 50% Off with Cash O...
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
 
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetErnakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ernakulam Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
 
Call Girls Patiala Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Patiala Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Patiala Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Patiala Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
 
VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near MeRussian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
Russian Call Girls in Noida Pallavi 9711199171 High Class Call Girl Near Me
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetHubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Hubli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 

BECOME A SMARTER CLOUD CONSUMER - Ripping through the Rhetoric to Find Your Cloud & Control Your Risk

  • 1. Kurt Hagerman | Chief Information Security Officer BECOME A SMARTER CLOUD CONSUMERRipping through the Rhetoric to Find Your Cloud & Control Your Risk 05/18/2015
  • 2. Kurt Hagerman ABOUT KURT HAGERMAN Expert in attaining and maintaining compliance standards, including PCI, HIPAA, ISO 27001, among others. Has conducted hundreds of security reviews and audits across a number of industries including the payment space, healthcare, financial services and higher education. Industry Leadership • Cloud Security Alliance SME Council • ISACA • CSA • ISSA Chief Information Security Officer
  • 3. So, you’ve decided to explore the cloud for your PHI but are worried about HIPAA compliance. HITRUST 2015: Become a Smarter Cloud Consumer
  • 4. Have you done your research and come away confused about how various cloud vendors communicate about HIPAA compliance? It’s understandable given what they are saying. HITRUST 2015: Become a Smarter Cloud Consumer
  • 5. IT’S NOT WHAT YOU SAY. IT’S WHAT YOU DO. Do you know what your vendor is really doing for you? Do you know who to call when something goes wrong? What about the privacy and breach rule? ? ? ? HITRUST 2014: PHI and the Cloud
  • 6. What They’re Saying… HITRUST 2014: PHI and the Cloud
  • 7. SECURITY • Outrageous statements being made • They sound good but ring hollow • What do they actually mean to you, the cloud consumer, and how will your vendor’s stance affect your compliance? Are you Confused? Frustrated? I know I am. HITRUST 2014: PHI and the Cloud
  • 8. SNAKE OIL, ANYONE? • Vendors trivialize HIPAA compliance • Vendors over simplify the requirements to sell their services as a “silver bullet” • HIPAA is risk-based for a reason • There is no “Easy Button” HITRUST 2014: PHI and the Cloud
  • 9. CONSIDER THE CLOUD MODELS Role Clarity HITRUST 2014: PHI and the Cloud
  • 10. Consider the Cloud Models HITRUST 2014: PHI and the Cloud Your responsibilities, and those of your cloud vendor, vary based on the model used by the vendor.
  • 11. Providers: AWS, Azure, Rackspace, SoftLayer, etc. • Typically only provide security for the underlying infrastructure • Any compliance attestations only apply to underlying infrastructure with no leverage available to customers • Vendors forced into signing BAAs, but theirs are typically weak based on the lack of security provided to the customer • Customer owns nearly 100 percent of the compliance responsibility INFRASTRUCTURE AS A SERVICE (IAAS) HITRUST 2014: PHI and the Cloud
  • 12. Providers: AWS (Elastic Beanstalk), Salesforce (Force.com), IBM SmartCloud, CloudFoundry, HP Helion, etc. • Provide development tools and other building blocks for applications and secure these services • Compliance attestations apply to the service with limited leverage available to customers • Will sign BAAs, but typically provide little in terms of liability protection based on the limited security provided to the customer • Customer owns a majority of the compliance responsibility PLATFORM AS A SERVICE (PAAS) HITRUST 2014: PHI and the Cloud
  • 13. Providers: Salesforce, Box, Epic, Allscripts, Athena, etc. • Own the entire stack up through the application • Any compliance attestations apply to the entire service with significant available to customers • BAAs are typically stronger based on security provided to customer data and contain reasonable liability language • Customer owns very little of the compliance responsibility (at least for the HIPAA security rule) SOFTWARE AS A SERVICE (SAAS) HITRUST 2014: PHI and the Cloud
  • 14. • IaaS and PaaS are fairly close in terms of the split of responsibility between customer and vendor (PaaS more difficult to parse) • Significant shift from PaaS to SaaS in terms of vendor responsibility • Risk to your organization increases from IaaS to SaaS THE MODELS COMPARED HITRUST 2014: PHI and the Cloud
  • 15. • Do you know what your vendor is really doing for you? • Do they provide information on the specific security controls that are included with their service? • Have they mapped their services and security controls to the HIPAA/HITECH requirements? • Does your vendor use third parties to provide services to you? • Have they (and their third parties) been independently assessed? • Do you know who to call when something goes wrong? • What about the privacy and breach rule? • How do I manage a compliance program with multiple vendors all providing my “cloud services”? IT’S NOT WHAT YOU SAY. IT’S WHAT YOU DO. HITRUST 2014: PHI and the Cloud
  • 16. 1. Identifying the division of responsibility between you and your cloud vendor 2. Ensuring the services your vendor is providing are properly mapped to your risk assessment 3. Getting the evidence you need for your audit 4. Obtaining objective attestation documentation from the vendor for the controls they have full or partial responsibility for 5. Monitoring ongoing compliance of your vendors 6. Receiving support from vendor during a breach event SIX COMPLIANCE CHALLENGES HITRUST 2014: PHI and the Cloud
  • 17. BE A SMARTER CLOUD CONSUMER You need to deal with vendors who will be transparent about what they do and how it assists you in mitigating risk and addressing compliance requirements. CAVEAT EMPTOR HITRUST 2014: PHI and the Cloud
  • 18. Your Vendor Should: • Provide a clear, concise explanation of the specific security controls they include in their service and how these directly assist you in meeting your compliance obligations • Articulate the boundaries between their responsibility and yours • Provide documentation that backs up assertions about being “HIPAA Compliant,” including independent audit reports that clearly state: - the scope of the assessment - the control framework used - how compliance can be leveraged by you BE A SMARTER CLOUD CONSUMERCAVEAT EMPTOR HITRUST 2014: PHI and the Cloud
  • 19. What about Business Associate Agreements? Many vendors say they are “business associate-friendly” and that they will sign a BAA. • Does their BAA include language that clearly states what services they are providing and what responsibility they are taking for security incidents? • Do they suggest this language when reviewing yours? HITRUST 2014: PHI and the Cloud
  • 20. Thank You Questions? Kurt Hagerman Email kurt.hagerman@firehost.com Phone +1 877 262 3473 HITRUST 2014: PHI and the Cloud

Editor's Notes

  1. -- Quickly introduce yourself and the company. -- Establish your talk’s purpose. -- Explain what this presentation and discussion will and will not be; This is your preamble – expectation-setting and table-setting is key. -- Decide how you want to address questions. At the end? Or throughout. Set that expectation with the audience up front. (Depends on size of your audience, personalities in the room, and length of your prezo.)
  2. Throughout the prezo, you should give the audience a reminder of where you are in the logic flow so they have bearings. This is part one – macro industry perspective, which will lead you to provide bearings on where FireHost fits in this mix. Start by saying you will set the table on the cloud industry, its dynamics, and challenges. Remark how the challenges, when you get to them, are well-known but poorly addressed to date, especially if you look beyond vendor marketing. (This will set up FireHost’s bearings – why we even exist in the first place.)
  3. Bullets: DO YOU KNOW WHAT YOUR VENDOR IS REALLY DOING FOR YOU? WHAT ABOUT THE PRIVACY AND BREACH RULE? DO YOU KNOW WHO TO CALL WHEN SOMETHING GOES WRONG? Different cloud models – applicability to healthcare applications Every one is different Confusion in marketplace about BAA (Amazon) Omnibus changed rules – not a yard stick… Who’s taking responsibility ? Easier achieved with a single vendor who provides Transparency w/I vendors – understanding what your vendor does and how that helps you achieve compliance – go beyond jargon It’s not about what you say, it’s about what you do. Performance aspect – peoples lives depend on it
  4. Note to Casey/Josh: We did this slide for HIMSS 15.
  5. …There are serious gaps. There are areas of focus that are not getting enough attention to make cloud computing safe. Security and compliance are atop this list. And what they ultimately point to is risk… You need to reduce risk as data proliferates and security threats expand in parallel. The gap in managing risk, security, and compliance exists for multiple reasons. Acumen and expertise are limited across the industry. Price often trumps security. Performance (infrastructure and applications) also trumps security. As the momentum, innovation, and marketing of cloud continues with insufficient attention to risk, security, and compliance, the gap widens. This widening effect between innovation and risk/security makes it increasingly difficult for service providers and vendors to close the gap. Simply put, the cloud market risks innovating much faster than security can keep up. Today, how a business addresses these gaps carries major implications. And how a cloud provider addresses these gaps for its customers is one of those implications. We’ll get into this later, but do you do it yourself? Or do you offload the burden to a provider? If the latter, who? That choice is as strategic as it has ever been…
  6. Let’s put the data breach parade in perspective. Consider the healthcare industry. According to the U.S. Department of Health and Human Services (DHHS): 944 incidents affecting personal information from about 30.1 million people. theft (17.4 million) Data loss (7.2 million) Hacking (3.6 million) Unauthorized access accounts (1.9 million) Ponemon says the business community suffers $5.6B/year in damage caused by data breaches.
  7. Now turn these questions toward your industry. Whether that data is used for internal operations or is generated from interaction with patients, healthcare organizations demand data integrity, availability, and confidentiality. That’s what’s at stake. Triangulating security, compliance, and risk reduction enables this. It’s a critical need. Again, is this something you can or want to do on your own?
  8. Difference between compliance and security - misperceptions Just because you’re compliant and checking boxes, doesn’t mean you’re secure – don’t confuse the two Compliance should not lead your security efforts – security should Compliance is a reporting function of a security program – it’s how you demonstrate that you meet a set of requirements Just achieving compliance is like getting a C grade – it gets you by but doesn’t get you ahead. Too much outrageous marketing around cloud provider compliance It’s not about what they say it’s about what they do – For You. Secure providers need to understand the compliance challenges their customers face and be able to articulate how their security solution helps them reduce risk and make their compliance journey easier, quicker and cheaper. Need to have trained staff with experience across a wide range of security and compliance regulations
  9. As you consider the threat landscape and the security needed to protect your business, you also need to consider compliance as an additional variable in the risk reduction equation. Compliance requirements can be vague. They change over time. There are many parts to compliance and many vendors and consultants as a result. Amid the compliance “puzzle” is its relationship with security and risk management. All three are inter-related, right? You reduce risk by protecting data and meeting compliance requirements. Although many companies address security and compliance separately, you’d agree that they should be managed together as one risk management strategy. Easier said than done. Regardless of the size of your company or IT staff, you need experts. You need security and compliance specialists by your side. You need time. You need full-time attention. It’s a lot to ask. Which leads to the obvious questions: Can you manage compliance, security, and risk reduction yourself? Do you have the resources? Do you have the personnel, expertise, and time? And even if you do have the resources, do you want to manage it yourself? Or do you want to offload this burden and focus on other strategic priorities? If you want to offload, who can literally take on that burden? You need a highly secure cloud provider, not just any cloud provider. There is a difference. How do you distinguish providers beyond their sales pitches or marketing claims on websites? After all, actions speak louder than words.
  10. …Simply put… …We offload much of the burden of managing compliance and security. Whether you have resources and expertise on staff, we can do this for you, freeing you up to tackle more important initiatives. I know I’ve rhetorically asked this multiple times, but do you really want to manage security and compliance by yourself? We can help. We are full-time experts. This is what we do. We are an extension of your team
  11. (Pivot toward compliance now. Explain that you’ve spent some time on our approach to security contrary to the rest of the industry. Then acknowledge that this is inevitably setting your business up for innovative services that can help address more risk reduction efforts, such as compliance. Describe CaaS and its uniqueness in the market.) (Acknowledge the opportunity for additional services to be added to CaaS over time, such as cyber insurance.) FireHost reduces risk by combining security and compliance as one solution. Our offering is fluid and removes much of the hassle of managing various vendors. The community of partners you typically would engage are handled by us – we put the puzzle pieces together for you. Think about how much time and resources that can save you.
  12. DOCUMENTATION Security protocols PCI validation HITRUST certification SSAE 16 attestation ISO 27001 certification Documention provides structured, transparent compliance documentation, and reports about FH services – free of charge PCI validation; HITRUST certification, SSAE 16 attestation, ISO 27001 certification, etc. Outline of FireHost security protocols ________________________________________________ Rapid Compliance Portal Self-assessment & reporting tools, tech support for both PCI & HIPAA Tools to document, print and submit an SAQ to processor Tailored compliance guidance based on individual need ________________________________________________ External & Internal Vulnerability Scans Assesses technical vulnerabilities Clients can perform scans with any frequency Offers Attestation of Scan Compliance (PCI) and other reports Customers can access their scans directly Internal scans can be scheduled to run on-demand