SlideShare a Scribd company logo
Moderator: Pam Matthews, RN, MBA, CPHIMS, FHIMSS, Vice President, Education & 
Business Development, CHIME 
Neal Ganguly, MBA, 
FCHIME, FHIMSS, CHCIO 
VP & CIO 
JFK Health System 
Username 
Password 
A CHIME Leadership Education and Development Forum in collaboration with iHT2 
#LEAD14 
Case Studies from the Field 
________ 
Putting Cyber Security Strategies into Action 
Miroslav Belote 
Director of IT – Infrastructure 
and Information Security 
Officer 
JFK Health System 
Sponsors: 
Nassar Nizami 
CISO 
Yale-New Haven Health 
System
Case Studies from the Field 
________ 
Putting Cyber Security Strategies into Action 
● Speaker: Nassar Nizami, CISO, Yale-New Haven Health System ● 
A CHIME Leadership Education and Development Forum in collaboration with iHT2 
#LEAD14
Yale New Haven Health System 
Who We Are 
• Four Member Delivery Network 
• Multiple Clinical Affiliations 
• Affiliated with Yale University 
• Destination Hospital for Patients Throughout the 
United States 
• Currently Going Through an Affiliation and 
Acquisition Period
Enterprise-Wide Clinical Systems
Application Inventory 
• Inventory of applications in a spreadsheet with key information 
• Information we are interested in 
Information 
we require
External Data Flow
Data Loss Prevention 
Email 
Desktop/ 
Laptops 
Web 
File shares 
Cloud 
Mobile 
Devices
Exact Data Match 
• Patten based matches 
• Common 
• xxx-xx-xxx 
• Potential SSN 
• False Positives 
• Exact Data Match 
• Match on known and indexed data 
• First Name, Last Name, MRN from EMR 
• First Name, Last Name,, Employee ID 
from HR system 
• False positives decrease 
significantly
Desktop/Laptop 
• Client installed on desktops and 
laptops 
• Scans for 
• Files copied to removable 
media 
• Internet traffic 
• Local drive scan 
• Pattern based matching (HIPAA 
Policies) 
• Data scanned when copied to 
removable media
Desktop 
Challenges 
Computer Slow 
Down 
Hardware 
Refresh 
Complete Desktop 
Scan 
Selective Scan 
Good Support for 
Windows OS 
Support Lacking for 
non-Windows OS
Web 
• Dedicated servers for HTTP 
• ~80% of our overall traffic 
• Dedicated servers to scan select protocols like FTP, IRC etc. 
• Traditionally not been a problem area 
• Ended up blocking many protocols 
• Challenges: 
• Encrypted traffic is tough to scan 
• Solution requires robust proxy server infrastructure and 
proper certificate deployment
Email 
• Policy requires that the emails with PHI or sensitive information must be 
encrypted manually 
• Keyword in subject line 
• Require prior approval 
• All outbound emails are scanned for PHI 
• Encrypted if PHI is found 
EDM 
HIPAA 
Lexicons 
Internet 
Internal 
Network 
• Challenges: 
• Images, especially screen shots 
• PDF files scanned as images 
• Encrypted attachments 
• False positives 
• Marketing & HR
File Shares 
• Started with ad-hoc scanning 
– First 2-3 years 
• Periodic since last year 
– Scanning has improved 
• Several terabytes in a couple of days
File Share Management 
• File share permission and auditing tool 
– Who has access to what shares? 
• Thousands of shares 
– Many more folders and sub-folders 
• Integrated with DLP 
– Flags folders with sensitive information 
– Extremely helpful in prioritizing
Governance & Timeline 
• Acquired solution 
• Implemented Email & Web 
– Email was a quick win 
• Desktop – four years for 80% coverage 
• Committee to direct implementation
Cloud & Mobile Devices 
• Hosted emails, Office365, 
Box.net etc. 
• No good solution 
• Some vendors offer 
basic DLP capabilities 
• Scanning maybe 
possible if data 
orginiates from 
corporate network 
• No good solution 
• Computing capability 
• Different OS 
• Limited access to API 
• VPN back to corporate 
• Slow 
• Can be bypassed
Lessons Learned 
User Communication Skilled Team Multiple Servers 
Part of Solution Slowness
Lessons Learned 
• User communication 
• Dedicated & skilled team 
– Takes time to understand false positives 
• Scalability 
– Plan for multiple servers with lots of processing power 
• DLP alone is not effective tool against someone 
who is trying to bypass controls 
– Part of a solution 
• Desktop client may cause slowness
Next Steps/Wish List 
• Notification to management 
• Active blocking of network protocols 
• Incorporate SSL 
– Technically challenging 
• Apple computers 
• Mobile device integration 
• Cloud based storage 
• Involve business*
reference
Facts & Figures 
• Medical staff 5675 
• Employees 18,345 
• Total Licensed Beds 2130 
• Inpatient Discharges 93,923 
• Outpatient Visits 1,397,632 
• Total Assets $3.6 billion 
• Net Revenue $2.6 billion
Q & A 
Contact Information 
Nassar Nizami 
A CHIME Leadership Education and Development Forum in collaboration with iHT2

More Related Content

What's hot

ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
Kabul Education University
 
GWAVA Keynote
GWAVA KeynoteGWAVA Keynote
GWAVA Keynote
GWAVA
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud
Andy Milsark
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
Kabul Education University
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
Kabul Education University
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
John Secondari
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Spiceworks
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
SafetyChain Software
 
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOETeam NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Edward Ehnow
 
Key challanges information management
Key challanges information managementKey challanges information management
Key challanges information management
Employee
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne
 

What's hot (11)

ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
GWAVA Keynote
GWAVA KeynoteGWAVA Keynote
GWAVA Keynote
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
 
Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...Winning the war against data- Strategies to beat your arch nemesis: files - G...
Winning the war against data- Strategies to beat your arch nemesis: files - G...
 
Reducing Human Error in GMP with Automation
Reducing Human Error in GMP with AutomationReducing Human Error in GMP with Automation
Reducing Human Error in GMP with Automation
 
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOETeam NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
Team NEW3 Week 8 PowerPoint_FinalDraftEDITBYJOE
 
Key challanges information management
Key challanges information managementKey challanges information management
Key challanges information management
 
CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)CNIT 160 4e Security Program Management (Part 5)
CNIT 160 4e Security Program Management (Part 5)
 

Similar to CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security Strategies into Action"

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
BVU
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
irfanullahkhan64
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
Aptera Inc
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
Health IT Conference – iHT2
 
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
Adlib - The PDF Experts
 
Agility for big data
Agility for big data Agility for big data
Agility for big data
Charlie Cheng
 
Sabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseSabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large Enterprise
Orchestra Networks
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
Community IT Innovators
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
Imperva
 
[AIIM17] Facilitating Business Process Improvement in Information Management...
[AIIM17]  Facilitating Business Process Improvement in Information Management...[AIIM17]  Facilitating Business Process Improvement in Information Management...
[AIIM17] Facilitating Business Process Improvement in Information Management...
AIIM International
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
SylCotter
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
HPCC Systems
 
Online LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 WebinarOnline LSNTAP / PBN 2014 Webinar
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
Compliancy Group
 
Chapter01
Chapter01Chapter01
Chapter01
Muhammad Ahad
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
Bill LeFurgy
 
OSU Big Data Conference, Oklahoma City
OSU Big Data Conference, Oklahoma CityOSU Big Data Conference, Oklahoma City
OSU Big Data Conference, Oklahoma City
Daniel Murray
 
Informs Conference, Huntington Beach
Informs Conference, Huntington BeachInforms Conference, Huntington Beach
Informs Conference, Huntington Beach
Daniel Murray
 
Office 365 and using SharePoint Online
Office 365 and using SharePoint OnlineOffice 365 and using SharePoint Online
Office 365 and using SharePoint Online
Cliff Ashcroft
 
Data warehouseold
Data warehouseoldData warehouseold
Data warehouseold
Shwetabh Jaiswal
 

Similar to CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security Strategies into Action" (20)

The Changing Role of IT Staff
The Changing Role of IT StaffThe Changing Role of IT Staff
The Changing Role of IT Staff
 
Identity and User Access Management.pptx
Identity and User Access Management.pptxIdentity and User Access Management.pptx
Identity and User Access Management.pptx
 
Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365Learning about Security and Compliance in Office 365
Learning about Security and Compliance in Office 365
 
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
CHIME LEAD Fourm Houston - "Creating an Effective Cyber Security Strategy: Ke...
 
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
 
Agility for big data
Agility for big data Agility for big data
Agility for big data
 
Sabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large EnterpriseSabre: Master Reference Data in the Large Enterprise
Sabre: Master Reference Data in the Large Enterprise
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
[AIIM17] Facilitating Business Process Improvement in Information Management...
[AIIM17]  Facilitating Business Process Improvement in Information Management...[AIIM17]  Facilitating Business Process Improvement in Information Management...
[AIIM17] Facilitating Business Process Improvement in Information Management...
 
Dna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing PresentationDna It Solutions Cloud Computing Presentation
Dna It Solutions Cloud Computing Presentation
 
Data Analytics Governance and Ethics
Data Analytics Governance and EthicsData Analytics Governance and Ethics
Data Analytics Governance and Ethics
 
Online LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 WebinarOnline LSNTAP / PBN 2014 Webinar
Online LSNTAP / PBN 2014 Webinar
 
The must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challengeThe must have tools to address your HIPAA compliance challenge
The must have tools to address your HIPAA compliance challenge
 
Chapter01
Chapter01Chapter01
Chapter01
 
Introduction to Digital Preservation
Introduction to Digital PreservationIntroduction to Digital Preservation
Introduction to Digital Preservation
 
OSU Big Data Conference, Oklahoma City
OSU Big Data Conference, Oklahoma CityOSU Big Data Conference, Oklahoma City
OSU Big Data Conference, Oklahoma City
 
Informs Conference, Huntington Beach
Informs Conference, Huntington BeachInforms Conference, Huntington Beach
Informs Conference, Huntington Beach
 
Office 365 and using SharePoint Online
Office 365 and using SharePoint OnlineOffice 365 and using SharePoint Online
Office 365 and using SharePoint Online
 
Data warehouseold
Data warehouseoldData warehouseold
Data warehouseold
 

More from Health IT Conference – iHT2

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
Health IT Conference – iHT2
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
Health IT Conference – iHT2
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
Health IT Conference – iHT2
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
Health IT Conference – iHT2
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
Health IT Conference – iHT2
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
Health IT Conference – iHT2
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
Health IT Conference – iHT2
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
Health IT Conference – iHT2
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
Health IT Conference – iHT2
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
Health IT Conference – iHT2
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
Health IT Conference – iHT2
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Health IT Conference – iHT2
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Health IT Conference – iHT2
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Health IT Conference – iHT2
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
Health IT Conference – iHT2
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
Health IT Conference – iHT2
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
Health IT Conference – iHT2
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
Health IT Conference – iHT2
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
Health IT Conference – iHT2
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
Health IT Conference – iHT2
 

More from Health IT Conference – iHT2 (20)

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 

Recently uploaded

Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
Taste
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 

Recently uploaded (20)

Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 

CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security Strategies into Action"

  • 1. Moderator: Pam Matthews, RN, MBA, CPHIMS, FHIMSS, Vice President, Education & Business Development, CHIME Neal Ganguly, MBA, FCHIME, FHIMSS, CHCIO VP & CIO JFK Health System Username Password A CHIME Leadership Education and Development Forum in collaboration with iHT2 #LEAD14 Case Studies from the Field ________ Putting Cyber Security Strategies into Action Miroslav Belote Director of IT – Infrastructure and Information Security Officer JFK Health System Sponsors: Nassar Nizami CISO Yale-New Haven Health System
  • 2. Case Studies from the Field ________ Putting Cyber Security Strategies into Action ● Speaker: Nassar Nizami, CISO, Yale-New Haven Health System ● A CHIME Leadership Education and Development Forum in collaboration with iHT2 #LEAD14
  • 3. Yale New Haven Health System Who We Are • Four Member Delivery Network • Multiple Clinical Affiliations • Affiliated with Yale University • Destination Hospital for Patients Throughout the United States • Currently Going Through an Affiliation and Acquisition Period
  • 5. Application Inventory • Inventory of applications in a spreadsheet with key information • Information we are interested in Information we require
  • 7. Data Loss Prevention Email Desktop/ Laptops Web File shares Cloud Mobile Devices
  • 8. Exact Data Match • Patten based matches • Common • xxx-xx-xxx • Potential SSN • False Positives • Exact Data Match • Match on known and indexed data • First Name, Last Name, MRN from EMR • First Name, Last Name,, Employee ID from HR system • False positives decrease significantly
  • 9. Desktop/Laptop • Client installed on desktops and laptops • Scans for • Files copied to removable media • Internet traffic • Local drive scan • Pattern based matching (HIPAA Policies) • Data scanned when copied to removable media
  • 10. Desktop Challenges Computer Slow Down Hardware Refresh Complete Desktop Scan Selective Scan Good Support for Windows OS Support Lacking for non-Windows OS
  • 11. Web • Dedicated servers for HTTP • ~80% of our overall traffic • Dedicated servers to scan select protocols like FTP, IRC etc. • Traditionally not been a problem area • Ended up blocking many protocols • Challenges: • Encrypted traffic is tough to scan • Solution requires robust proxy server infrastructure and proper certificate deployment
  • 12. Email • Policy requires that the emails with PHI or sensitive information must be encrypted manually • Keyword in subject line • Require prior approval • All outbound emails are scanned for PHI • Encrypted if PHI is found EDM HIPAA Lexicons Internet Internal Network • Challenges: • Images, especially screen shots • PDF files scanned as images • Encrypted attachments • False positives • Marketing & HR
  • 13. File Shares • Started with ad-hoc scanning – First 2-3 years • Periodic since last year – Scanning has improved • Several terabytes in a couple of days
  • 14. File Share Management • File share permission and auditing tool – Who has access to what shares? • Thousands of shares – Many more folders and sub-folders • Integrated with DLP – Flags folders with sensitive information – Extremely helpful in prioritizing
  • 15. Governance & Timeline • Acquired solution • Implemented Email & Web – Email was a quick win • Desktop – four years for 80% coverage • Committee to direct implementation
  • 16. Cloud & Mobile Devices • Hosted emails, Office365, Box.net etc. • No good solution • Some vendors offer basic DLP capabilities • Scanning maybe possible if data orginiates from corporate network • No good solution • Computing capability • Different OS • Limited access to API • VPN back to corporate • Slow • Can be bypassed
  • 17. Lessons Learned User Communication Skilled Team Multiple Servers Part of Solution Slowness
  • 18. Lessons Learned • User communication • Dedicated & skilled team – Takes time to understand false positives • Scalability – Plan for multiple servers with lots of processing power • DLP alone is not effective tool against someone who is trying to bypass controls – Part of a solution • Desktop client may cause slowness
  • 19. Next Steps/Wish List • Notification to management • Active blocking of network protocols • Incorporate SSL – Technically challenging • Apple computers • Mobile device integration • Cloud based storage • Involve business*
  • 21. Facts & Figures • Medical staff 5675 • Employees 18,345 • Total Licensed Beds 2130 • Inpatient Discharges 93,923 • Outpatient Visits 1,397,632 • Total Assets $3.6 billion • Net Revenue $2.6 billion
  • 22. Q & A Contact Information Nassar Nizami A CHIME Leadership Education and Development Forum in collaboration with iHT2