SlideShare a Scribd company logo
1 of 19
Lisa Copp
Chief Privacy Officer & Assistant General Counsel
CNO Financial Group
Meredith Phillips
Chief Information Privacy & Security Officer
Henry Ford Health System
• Publicly traded insurance holding company
• CNO affiliated insurance brands provide life and supplemental
health insurance products to middle income Americans
• Not all products are HIPAA governed – life, annuity, accident, disability
income
• CNO insurance companies are licensed in all States, DC and PR
CHIEF PRIVACY OFFICER
• Reports through Law Department
• Oversees regulatory compliance
• Primary accountability for “non-
technical” incidents
• Metrics focused on incidents as an
impact on privacy as an objective –
incidents (quantity/root
cause/character of data)
DIRECTOR OF
INFORMATION SECURITY
• Reports through IT Infrastructure
• Oversees technical control environment
• Primary accountability for “technical”
incidents
• Metrics focused on incidents as impact
on function of security processes
Coordinated Activities Between Privacy & Security Teams
• Metrics reported to Enterprise Risk Mgt Committee
• RADAR web form single intake point for all types of incidents
• RADAR incident management tool for all types of incidents
• Consistency between check lists and analysis tools
governance
accountability
AND
Building Security
Primary
investigators for
loss and theft of
equipment or
materials
containing PII
Effective incident management requires a variety of skill sets to perform a variety of functions
Privacy & Security
Incident Management
Teamwork Across the CNO Enterprise
Technology tools for incident reporting and management allow efficiency and consistency
IT Security
Expertise in
systems security
Investigation and
analysis check lists
for technical
incidents
Technical incident
management
Fraud Unit
Primary
investigators for
internal and
external fraud
involving misuse of
PII
Enterprise Risk
Mgt
Conduct root
cause analysis for
process-related
incidents
Consumer
Relations
Process incidents
in RADAR
Issue consumer
breach notification
letters
Manage credit
monitoring codes
Regulatory
Affairs
Liaison with state
Departments of
Insurance
Privacy
Compliance
Provide attorney
oversight
Investigation and
analysis check lists
for non-technical
incidents
Non-technical
incident mgt
Framework for
sanctions
Issue regulator
breach notification
letters
value of automated
• Investigate incident
• Investigate impacted consumers
• Understand breach standards in relevant jurisdictions
• Understand consumer notice standards in relevant jurisdictions
• Understand regulator notice standards in relevant jurisdictions
• Investigate root cause(s)
• Develop corrective action
• Monitor corrective action
• Recommend sanctions
• Monitor sanctions
incident management
Single
Source
of
Truth
• Repeatable analysis
• “Evidence room”
• Single intake point with customized Web
Form regardless of incident type
• Stolen briefcase
• Misdirected mail
• Malware
• Social engineering
Coordinates
a
Non-linear
Workflow
• Risk thresholds
• Risk based metrics
• Number of individuals
impacted
• Character of data
• Root cause
Automates selection of breach
notification letter
• Jurisdiction
• HIPAA or non-HIPAA
• Mandatory or voluntary
notice
• Special states
key elements of our program
ideas to share
Risk assessment
Check lists
• Loss/theft
• Process issues/root cause
• Corrective action plans
• Sanctions
“Letter picker”
Common repository
• Evidence of repeatable process
• Consistent analysis
• Consistent documentation
• Then…Prior to 2012
– Privacy was a subset of Corporate Compliance
– Security was a subset of Information Technology
– Decentralized approach throughout the System with lean resources to carry out the
Privacy & Security Mission
• Observation
– Due to lean resources (i.e., budget, FTEs, etc.), competing priorities and fragmented
oversight, Privacy & Security compliance was at times misaligned with the HFHS Mission
& Vision
– Organizational mindset saw privacy & security compliance as a “necessary evil” –
Regulatory issue…not clinical!
– We struggled with being a part of the solution and was seen as a barrier to patient care
– Roles were not clearly defined thus creating misalignment during incident response
THEN vs. NOW
• Now…
– Named the System’s Chief Information Privacy & Security Officer
– Combined the Information Privacy & Information Security into one department under one leader
– Launched a System-wide internal marketing campaign to communicate the new governance
structure, responsibility, mission, vision, goals, etc.
– Priorities have further been streamlined and standardized within the IPSO to establish Service Level
Agreements with each Business Unit
– Investigative process & re-education will be managed by the IPSO team while maintaining
coordination with the key stakeholders (i.e., business unit leadership, Privacy/Security Champions,
Human Resources, etc.)
• Observations
– HFHS entered into new territory to ensure synergy between Privacy & Security – Culture of
Confidentiality – through organizational structure
– Incident reporting has increased by 26% from 2013 to 2014
– Employees “Think Privacy & Security First”…when in doubt, they call the IPSO…we are here to save
the day!
– The “necessary evil” mindset has diminished…we are now a welcomed partner and resource to the
organization and leaders
THEN vs. NOW
IPSO GOVERNANCE STRUCTURE
• Any routine investigations that may result in a breach must be forwarded to the IPSO for a Code
A(ssessment) and potential Code B Alert
• Investigations are led by the IPSO (i.e., privacy & security) in conjunction with operational or medical staff
management, Human Resources, Legal Affairs, Risk Management & the Police Authority Unit
• All investigative documentation (i.e., notes, interview transcripts, audit logs, etc.) should be stored in our
centralized repository to ensure the ability for metric reporting
• All incidents must be receive a breach risk assessment using RADAR to ensure consistent assessments are
performed and documented
• Corrective Action always recommended by the IPSO in accordance with the outcome of the investigation
– Application of corrective action is consistent across business units and employee types
• Re-education required for the entire department within 30 days of investigation closure not just the
offender
CENTRALIZED INVESTIGATIVE
PROCESS
• The HFHS Privacy & Security Council is an oversight council that
approves System policies and procedures related to privacy & security
regulations
• The Code B Alert Team is a rapid-response workgroup established to
centrally respond and manage all System data breaches & incidents
• The Office for Civil Rights Response Team will review all OCR data
requests related to privacy & security violations and respond on behalf
of the System and/or specific business unit
“These teams are coordinated by our office and have been added to the BFF
circle of collaboration. We all are working towards the common goal of
ensuring our Culture of Confidentiality is maintained for all of our patients,
members, guests and employees. Without each other, we would definitely
fail!”
-Meredith Phillips
IPSO COUNCILS &
RESPONSE TEAMS
IPSO
Resources
1. Presentation Slides: To download a copy of these
presentation slides please go to:
http://www.idexpertscorp.com/IAPPwebinar1214
2. Download Whitepaper: The CISO’s Secret Weapon for
Reducing Enterprise Risk
http://www2.idexpertscorp.com/resources/single/incident-
response-management-software-the-cisos-secret-weapon-for-
reducing/r-radar
A Word from our Sponsors
Security and privacy incident
response software
www.idexpertscorp.com/radar-software
For a copy of these presentation slides and to view the recording of this web conference
(to be posted approximately 48 hours following the live event) please go to:
http://www.idexpertscorp.com/IAPPwebinar1214
Questions & Answers
Lisa Copp
Chief Privacy Officer &
Assistant General Counsel
CNO Financial Group
Lisa.Copp@CNOinc.com
Meredith Phillips
Chief Information Privacy & Security Officer
Henry Ford Health System
mphilli2@hfhs.org
Web Conference
Participant Feedback Survey
’
Coordinating Privacy and Security Incident Response

More Related Content

What's hot

Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Information classification
Information classificationInformation classification
Information classificationJyothsna Sridhar
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceJTLeekley
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by FirstMutualHoldings
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerEnclaveSecurity
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptShruthi48
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernancePECB
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaSee You Rise Holdings
 

What's hot (20)

Lesson 2- Information Asset Valuation
Lesson 2- Information Asset ValuationLesson 2- Information Asset Valuation
Lesson 2- Information Asset Valuation
 
Lesson 3- Fair Approach
Lesson 3- Fair ApproachLesson 3- Fair Approach
Lesson 3- Fair Approach
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Information classification
Information classificationInformation classification
Information classification
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Its time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primerIts time to rethink everything a governance risk compliance primer
Its time to rethink everything a governance risk compliance primer
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
Gtag 1 information risk and control
Gtag 1 information risk and controlGtag 1 information risk and control
Gtag 1 information risk and control
 
Chapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.pptChapter 5 Planning for Security-students.ppt
Chapter 5 Planning for Security-students.ppt
 
Using ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and GovernanceUsing ISO 31000 as a strategic tool for National Planning and Governance
Using ISO 31000 as a strategic tool for National Planning and Governance
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Introduction to information security - by Ivan Nganda
Introduction to information security - by Ivan NgandaIntroduction to information security - by Ivan Nganda
Introduction to information security - by Ivan Nganda
 

Viewers also liked

Incident Response Management - Metrics, Data, Visualize & Apply
Incident Response Management - Metrics, Data, Visualize & ApplyIncident Response Management - Metrics, Data, Visualize & Apply
Incident Response Management - Metrics, Data, Visualize & ApplyAline Tran
 
OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?ID Experts
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserAnton Chuvakin
 
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...Health IT Conference – iHT2
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response SwimlanesDaniel P Wallace
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response Darren Pauli
 

Viewers also liked (6)

Incident Response Management - Metrics, Data, Visualize & Apply
Incident Response Management - Metrics, Data, Visualize & ApplyIncident Response Management - Metrics, Data, Visualize & Apply
Incident Response Management - Metrics, Data, Visualize & Apply
 
OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?OCR HIPAA Audits…Will You Be Prepared?
OCR HIPAA Audits…Will You Be Prepared?
 
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny ZeltserSecurity Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
Security Incident Log Review Checklist by Dr Anton Chuvakin and Lenny Zeltser
 
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...
iHT² Health IT Atlanta Summit 2014 - Opening Keynote "The Radical Transformat...
 
Incident Response Swimlanes
Incident Response SwimlanesIncident Response Swimlanes
Incident Response Swimlanes
 
The Six Stages of Incident Response
The Six Stages of Incident Response The Six Stages of Incident Response
The Six Stages of Incident Response
 

Similar to Coordinating Privacy and Security Incident Response

Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)U.S. News Healthcare of Tomorrow
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptxStevenTharp2
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsJayeshGadhave1
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickJacqueline Fick
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeCloud Watchmen Inc.
 
nist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptxnist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptxssuser0f83b7
 
nist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptxnist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptxAbdulSalamSagir1
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisEvan Francen
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Factsresourceone
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 

Similar to Coordinating Privacy and Security Incident Response (20)

Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
Safeguarding Patient Privacy in a Digital Age (Meredith Phillips)
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
L1_Introduction.pptx
L1_Introduction.pptxL1_Introduction.pptx
L1_Introduction.pptx
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Cyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fickCyber forensic readiness cybercon2012 adv j fick
Cyber forensic readiness cybercon2012 adv j fick
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 
HIPAA omnibus rule update
HIPAA omnibus rule updateHIPAA omnibus rule update
HIPAA omnibus rule update
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance Office
 
nist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptxnist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptx
 
nist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptxnist_privacy_risk_workshop_6.5.17.pptx
nist_privacy_risk_workshop_6.5.17.pptx
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
 
You and HIPAA - Get the Facts
You and HIPAA - Get the FactsYou and HIPAA - Get the Facts
You and HIPAA - Get the Facts
 
Security Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOVSecurity Governance Primer - Eric Vanderburg - JURINNOV
Security Governance Primer - Eric Vanderburg - JURINNOV
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Coordinating Privacy and Security Incident Response

  • 1.
  • 2. Lisa Copp Chief Privacy Officer & Assistant General Counsel CNO Financial Group Meredith Phillips Chief Information Privacy & Security Officer Henry Ford Health System
  • 3. • Publicly traded insurance holding company • CNO affiliated insurance brands provide life and supplemental health insurance products to middle income Americans • Not all products are HIPAA governed – life, annuity, accident, disability income • CNO insurance companies are licensed in all States, DC and PR
  • 4. CHIEF PRIVACY OFFICER • Reports through Law Department • Oversees regulatory compliance • Primary accountability for “non- technical” incidents • Metrics focused on incidents as an impact on privacy as an objective – incidents (quantity/root cause/character of data) DIRECTOR OF INFORMATION SECURITY • Reports through IT Infrastructure • Oversees technical control environment • Primary accountability for “technical” incidents • Metrics focused on incidents as impact on function of security processes Coordinated Activities Between Privacy & Security Teams • Metrics reported to Enterprise Risk Mgt Committee • RADAR web form single intake point for all types of incidents • RADAR incident management tool for all types of incidents • Consistency between check lists and analysis tools governance accountability AND
  • 5. Building Security Primary investigators for loss and theft of equipment or materials containing PII Effective incident management requires a variety of skill sets to perform a variety of functions Privacy & Security Incident Management Teamwork Across the CNO Enterprise Technology tools for incident reporting and management allow efficiency and consistency IT Security Expertise in systems security Investigation and analysis check lists for technical incidents Technical incident management Fraud Unit Primary investigators for internal and external fraud involving misuse of PII Enterprise Risk Mgt Conduct root cause analysis for process-related incidents Consumer Relations Process incidents in RADAR Issue consumer breach notification letters Manage credit monitoring codes Regulatory Affairs Liaison with state Departments of Insurance Privacy Compliance Provide attorney oversight Investigation and analysis check lists for non-technical incidents Non-technical incident mgt Framework for sanctions Issue regulator breach notification letters
  • 6. value of automated • Investigate incident • Investigate impacted consumers • Understand breach standards in relevant jurisdictions • Understand consumer notice standards in relevant jurisdictions • Understand regulator notice standards in relevant jurisdictions • Investigate root cause(s) • Develop corrective action • Monitor corrective action • Recommend sanctions • Monitor sanctions incident management Single Source of Truth • Repeatable analysis • “Evidence room” • Single intake point with customized Web Form regardless of incident type • Stolen briefcase • Misdirected mail • Malware • Social engineering Coordinates a Non-linear Workflow
  • 7. • Risk thresholds • Risk based metrics • Number of individuals impacted • Character of data • Root cause Automates selection of breach notification letter • Jurisdiction • HIPAA or non-HIPAA • Mandatory or voluntary notice • Special states key elements of our program ideas to share Risk assessment Check lists • Loss/theft • Process issues/root cause • Corrective action plans • Sanctions “Letter picker” Common repository • Evidence of repeatable process • Consistent analysis • Consistent documentation
  • 8. • Then…Prior to 2012 – Privacy was a subset of Corporate Compliance – Security was a subset of Information Technology – Decentralized approach throughout the System with lean resources to carry out the Privacy & Security Mission • Observation – Due to lean resources (i.e., budget, FTEs, etc.), competing priorities and fragmented oversight, Privacy & Security compliance was at times misaligned with the HFHS Mission & Vision – Organizational mindset saw privacy & security compliance as a “necessary evil” – Regulatory issue…not clinical! – We struggled with being a part of the solution and was seen as a barrier to patient care – Roles were not clearly defined thus creating misalignment during incident response THEN vs. NOW
  • 9. • Now… – Named the System’s Chief Information Privacy & Security Officer – Combined the Information Privacy & Information Security into one department under one leader – Launched a System-wide internal marketing campaign to communicate the new governance structure, responsibility, mission, vision, goals, etc. – Priorities have further been streamlined and standardized within the IPSO to establish Service Level Agreements with each Business Unit – Investigative process & re-education will be managed by the IPSO team while maintaining coordination with the key stakeholders (i.e., business unit leadership, Privacy/Security Champions, Human Resources, etc.) • Observations – HFHS entered into new territory to ensure synergy between Privacy & Security – Culture of Confidentiality – through organizational structure – Incident reporting has increased by 26% from 2013 to 2014 – Employees “Think Privacy & Security First”…when in doubt, they call the IPSO…we are here to save the day! – The “necessary evil” mindset has diminished…we are now a welcomed partner and resource to the organization and leaders THEN vs. NOW
  • 11. • Any routine investigations that may result in a breach must be forwarded to the IPSO for a Code A(ssessment) and potential Code B Alert • Investigations are led by the IPSO (i.e., privacy & security) in conjunction with operational or medical staff management, Human Resources, Legal Affairs, Risk Management & the Police Authority Unit • All investigative documentation (i.e., notes, interview transcripts, audit logs, etc.) should be stored in our centralized repository to ensure the ability for metric reporting • All incidents must be receive a breach risk assessment using RADAR to ensure consistent assessments are performed and documented • Corrective Action always recommended by the IPSO in accordance with the outcome of the investigation – Application of corrective action is consistent across business units and employee types • Re-education required for the entire department within 30 days of investigation closure not just the offender CENTRALIZED INVESTIGATIVE PROCESS
  • 12. • The HFHS Privacy & Security Council is an oversight council that approves System policies and procedures related to privacy & security regulations • The Code B Alert Team is a rapid-response workgroup established to centrally respond and manage all System data breaches & incidents • The Office for Civil Rights Response Team will review all OCR data requests related to privacy & security violations and respond on behalf of the System and/or specific business unit “These teams are coordinated by our office and have been added to the BFF circle of collaboration. We all are working towards the common goal of ensuring our Culture of Confidentiality is maintained for all of our patients, members, guests and employees. Without each other, we would definitely fail!” -Meredith Phillips IPSO COUNCILS & RESPONSE TEAMS IPSO
  • 13. Resources 1. Presentation Slides: To download a copy of these presentation slides please go to: http://www.idexpertscorp.com/IAPPwebinar1214 2. Download Whitepaper: The CISO’s Secret Weapon for Reducing Enterprise Risk http://www2.idexpertscorp.com/resources/single/incident- response-management-software-the-cisos-secret-weapon-for- reducing/r-radar
  • 14. A Word from our Sponsors Security and privacy incident response software www.idexpertscorp.com/radar-software
  • 15. For a copy of these presentation slides and to view the recording of this web conference (to be posted approximately 48 hours following the live event) please go to: http://www.idexpertscorp.com/IAPPwebinar1214 Questions & Answers Lisa Copp Chief Privacy Officer & Assistant General Counsel CNO Financial Group Lisa.Copp@CNOinc.com Meredith Phillips Chief Information Privacy & Security Officer Henry Ford Health System mphilli2@hfhs.org
  • 17.
  • 18.