Minimally
Invasive
Information
Security
Kim Sassaman, CISSP
Information Security Officer
Presbyterian Healthcare
Services
Factoids
 Presbyterian healthcare services is a not-
for-profit system of hospitals, a health plan
and a growing medical group located in
New Mexico.
 For more than 100 years we have been
committed to a single purpose
 Improving the health of the patients,
members and communities we serve
 15,000 employees, 3B+ revenue
 More @ http://www.phs.org/PHS/about/
What challenges exist
 Negative perception
 Desire to utilize cloud solution
 Social media
 Broader use of mobile devices
 Information anywhere, anytime from
anything
 Innovation center
 Reduction in resources, human and
capital
What changed
 Created focused department
 Multi-year vision (36 month sliding
window)
 Education of executives and peers
 Communication and Strategy
How?
 Governance and Policy
 Implementing technologies
 Communication
Actually a change in perception was
needed
Perception
The real challenge?
The detrimental effects of no!
 „If I were to put you into an fMRI scanner—a huge
donut-shaped magnet that can take a video of
the neural changes happening in your brain—and
flash the word “NO” for less than one second,
you‟d see a sudden release of dozens of stress-
producing hormones and neurotransmitters. These
chemicals immediately interrupt the normal
functioning of your brain, impairing logic, reason,
language processing, and communication.‟
 An article from Psychology Today by Andrew
Newberk, M.D. and Mark Robert Waldman
“Neuroscience of communication”
Principal adopted
YES, IF!
 The optimist sees the donut, the pessimist
sees the hole.”
― Oscar Wilde
Audience participation
 Each table, discuss a challenge you have
 Quickly elect a spokesperson
 5 minutes
 What would the conversation sound like, if
you utilized yes if?
Bring Your Own Plastic Stuff
(BYOPS)
 Business driver
 I want to use my plastic toys while at work
 I love my plastic toy
 IT response
 We like our plastic stuff too
 We can do this!
 IT security response
 Yes we can, IF
 Log(A+b/C^30+360days delay)
How did you secure mobile
devices?
With no budget
Hey wait!
What?
Lofty expectations, strained resources and a
short time frame, sounds like a typical IT
project
Yep!
Simple
 Business made the configuration decision
 Governance works!
 Transparency on all changes
 Utilized current investments
 No MDM
Security and Innovation
 Drive to improve quality
 Data sharing
 Big Data / Value Data
 Where do we go next?
 Security/Compliance is built in
How we do it
 Department focused on innovation
 Innovation Lab
 Segregated and walled from organization
 Calculated approach for pilots
 Security has a seat at the innovation table
Yes, communication again
Audience participation
 Last one!
 What innovative approach are you
challenged with?
 Discuss at your table ( 5 minutes)
 How can security help enable?
Parting thoughts
 Become the Yes, If man
 Security can enable and innovate
 Get involved early
 Be open minded
 Problem solve vs create
 Communicate, Communicate
 Be aware of perceptions!
Thank you
 ksassaman@phs.org
 www.linkedin.com/in/kimsassaman
 505-923-7748
 I share knowledge, documents, ideas,
etc…

iHT² Health IT Summit Fort Lauderdale 2013 – Kim Sassaman, Chief Information Security Officer, Presbyterian Healthcare Services

  • 1.
    Minimally Invasive Information Security Kim Sassaman, CISSP InformationSecurity Officer Presbyterian Healthcare Services
  • 2.
    Factoids  Presbyterian healthcareservices is a not- for-profit system of hospitals, a health plan and a growing medical group located in New Mexico.  For more than 100 years we have been committed to a single purpose  Improving the health of the patients, members and communities we serve  15,000 employees, 3B+ revenue  More @ http://www.phs.org/PHS/about/
  • 5.
    What challenges exist Negative perception  Desire to utilize cloud solution  Social media  Broader use of mobile devices  Information anywhere, anytime from anything  Innovation center  Reduction in resources, human and capital
  • 6.
    What changed  Createdfocused department  Multi-year vision (36 month sliding window)  Education of executives and peers  Communication and Strategy
  • 7.
    How?  Governance andPolicy  Implementing technologies  Communication Actually a change in perception was needed
  • 8.
  • 9.
  • 10.
    The detrimental effectsof no!  „If I were to put you into an fMRI scanner—a huge donut-shaped magnet that can take a video of the neural changes happening in your brain—and flash the word “NO” for less than one second, you‟d see a sudden release of dozens of stress- producing hormones and neurotransmitters. These chemicals immediately interrupt the normal functioning of your brain, impairing logic, reason, language processing, and communication.‟  An article from Psychology Today by Andrew Newberk, M.D. and Mark Robert Waldman “Neuroscience of communication”
  • 11.
  • 12.
     The optimistsees the donut, the pessimist sees the hole.” ― Oscar Wilde
  • 13.
    Audience participation  Eachtable, discuss a challenge you have  Quickly elect a spokesperson  5 minutes  What would the conversation sound like, if you utilized yes if?
  • 14.
    Bring Your OwnPlastic Stuff (BYOPS)  Business driver  I want to use my plastic toys while at work  I love my plastic toy  IT response  We like our plastic stuff too  We can do this!  IT security response  Yes we can, IF  Log(A+b/C^30+360days delay)
  • 15.
    How did yousecure mobile devices? With no budget Hey wait! What? Lofty expectations, strained resources and a short time frame, sounds like a typical IT project Yep!
  • 16.
    Simple  Business madethe configuration decision  Governance works!  Transparency on all changes  Utilized current investments  No MDM
  • 18.
    Security and Innovation Drive to improve quality  Data sharing  Big Data / Value Data  Where do we go next?  Security/Compliance is built in
  • 20.
    How we doit  Department focused on innovation  Innovation Lab  Segregated and walled from organization  Calculated approach for pilots  Security has a seat at the innovation table Yes, communication again
  • 21.
    Audience participation  Lastone!  What innovative approach are you challenged with?  Discuss at your table ( 5 minutes)  How can security help enable?
  • 22.
    Parting thoughts  Becomethe Yes, If man  Security can enable and innovate  Get involved early  Be open minded  Problem solve vs create  Communicate, Communicate  Be aware of perceptions!
  • 24.
    Thank you  ksassaman@phs.org www.linkedin.com/in/kimsassaman  505-923-7748  I share knowledge, documents, ideas, etc…