SlideShare a Scribd company logo
Identifying vulnerabilities is a key first step, but what follows is the most important
The old adage, “success is 2% inspiration and 98% perspiration” also applies to HIPAA Privacy and Security. It is one thing
to know what you need to do, but it is another to actually follow through and do it.
With the requirements of HIPAA and Meaningful Use attestation, practice administrators are tasked with completing a
Security Risk Assessment – whether done internally or through a third party. The practice usually thinks that they have
done one, or plan on doing one internally or with an outsourced IT firm. However, in reality, IT folks have gone through
and checked on a few hardware or network items, and either updated those items or gave the administrator a proposal
to update everything. ALERT: THIS IS NOT THE SECURITY RISK ASESSMENT that HIPAA and Meaningful Use have in mind.
Furthermore, and equally important, is that this process usually does not generate a Corrective Action Plan (a.k.a.
Remediation Plan).
Commonly, a Corrective Action Plan is not fully understood by most healthcare organizations. A Corrective Action Plan
identifies the vulnerable areas of the practice (as it relates to PHi) and provides a way to track remediation efforts.
The Corrective Action Plan is a “living document” that is reflective of the findings from the most recent Security Risk
Assessment. The data of all the risk are then mapped back to the infrastructure (both IT and general) to help prioritize
the fixes. It is considered “living” because it contains tasks based on risk that need to be addressed by the
practice/covered entity. While the tasks are prioritized by risk level and impact to the organization, they generally can
never be done quickly. Therefore, the document “lives” by having the responsible person(s) updating the progress of
the tasks to be completed. This process is to be iterated throughout the year until the next Security Risk Assessment is
performed. At that time, a new and revised Corrective Action Plan is created.
The keys to successfully protecting PHi, is to understand how to complete a Security Risk Assessment that properly
identifies the risks, and how to generate a Corrective Action Plan that prioritizes those risks. By tackling these two items,
a strategy can be formed for how the majority of a covered entity’s vulnerabilities can be mitigated. Of equal
importance, is making sure that someone within in the organization is following through and completing the outstanding
tasks, or that you are working with someone to help you remediate them. Finally, comes updating the Corrective Action
Plan in preparation for the next risk assessment.
Bill Steuer
GSG Compliance, LLC
www.gsgcompliance.com

More Related Content

What's hot

How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?
Tieu Luu
 
Chapter003
Chapter003Chapter003
Chapter003
Jeanie Delos Arcos
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security Success
SecurityOn-Demand
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)
Siti Mustiani
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal Audit
Resolver Inc.
 
Risk Equation
Risk EquationRisk Equation
Risk Equation
Adesh Rampat
 
Bring Better Data to the Office Opinion Party
Bring Better Data to the Office Opinion PartyBring Better Data to the Office Opinion Party
Bring Better Data to the Office Opinion Party
Resolver Inc.
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
FirstMutualHoldings
 
7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM
Cigital
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
The Future of Your Security Operations - Part 2: Tech Integration
The Future of Your Security Operations - Part 2: Tech IntegrationThe Future of Your Security Operations - Part 2: Tech Integration
The Future of Your Security Operations - Part 2: Tech Integration
Resolver Inc.
 
App Showcase: Enterprise Risk Management
App Showcase: Enterprise Risk ManagementApp Showcase: Enterprise Risk Management
App Showcase: Enterprise Risk Management
Resolver Inc.
 
Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
Wesley Moore
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
Cigital
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Resolver Inc.
 
A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering
MuhammadTalha436
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Cultureladukepc
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
Keyaan Williams
 

What's hot (20)

How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?How Do You Define Continuous Monitoring?
How Do You Define Continuous Monitoring?
 
Chapter003
Chapter003Chapter003
Chapter003
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security Success
 
Security Metrics
Security MetricsSecurity Metrics
Security Metrics
 
Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)Bab 7 (assuring reliable and secure it services)
Bab 7 (assuring reliable and secure it services)
 
App Showcase: Internal Audit
App Showcase: Internal AuditApp Showcase: Internal Audit
App Showcase: Internal Audit
 
Risk Equation
Risk EquationRisk Equation
Risk Equation
 
Bring Better Data to the Office Opinion Party
Bring Better Data to the Office Opinion PartyBring Better Data to the Office Opinion Party
Bring Better Data to the Office Opinion Party
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM7 Lessons Learned From BSIMM
7 Lessons Learned From BSIMM
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
The Future of Your Security Operations - Part 2: Tech Integration
The Future of Your Security Operations - Part 2: Tech IntegrationThe Future of Your Security Operations - Part 2: Tech Integration
The Future of Your Security Operations - Part 2: Tech Integration
 
App Showcase: Enterprise Risk Management
App Showcase: Enterprise Risk ManagementApp Showcase: Enterprise Risk Management
App Showcase: Enterprise Risk Management
 
Information Security Risk Management Overview
Information Security Risk Management OverviewInformation Security Risk Management Overview
Information Security Risk Management Overview
 
Software Security Metrics
Software Security MetricsSoftware Security Metrics
Software Security Metrics
 
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
Why Your Organization Should Leverage Data Science for Risk Intelligence and ...
 
A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering A Risk Analysis and Management in Software Engineering
A Risk Analysis and Management in Software Engineering
 
Hardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing CultureHardwiring Safety 7 Tips For Changing Culture
Hardwiring Safety 7 Tips For Changing Culture
 
Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Risk Management and Security in Strategic Planning
Risk Management and Security in Strategic PlanningRisk Management and Security in Strategic Planning
Risk Management and Security in Strategic Planning
 

Similar to Protecting PHi- 1-2016

Risk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdfRisk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdf
harihelectronicspune
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
Running Head ENTERPRISE RISK MANAGEMENT 1ENTERPRISE RISK MANA.docx
Running Head ENTERPRISE RISK MANAGEMENT  1ENTERPRISE RISK MANA.docxRunning Head ENTERPRISE RISK MANAGEMENT  1ENTERPRISE RISK MANA.docx
Running Head ENTERPRISE RISK MANAGEMENT 1ENTERPRISE RISK MANA.docx
todd271
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Redspin, Inc.
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Redspin, Inc.
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
Cognizant
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloJohn Intindolo
 
HealthCare Information Security Program Guidelines
HealthCare Information Security Program GuidelinesHealthCare Information Security Program Guidelines
HealthCare Information Security Program GuidelinesSeema Mozaffar
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutions
Craig Tappel
 
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
joyjonna282
 
Executive Breach Response Playbook
Executive Breach Response PlaybookExecutive Breach Response Playbook
Executive Breach Response Playbook
Hewlett Packard Enterprise Business Value Exchange
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
AISHA232980
 
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
gilbertkpeters11344
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Week 1Defining the Safety Management SystemSeveral years .docx
Week 1Defining the Safety Management SystemSeveral years .docxWeek 1Defining the Safety Management SystemSeveral years .docx
Week 1Defining the Safety Management SystemSeveral years .docx
celenarouzie
 
The Top 10 Steps to a Successful HIPAA Risk Assessment in 2023
The Top 10 Steps to a Successful HIPAA Risk Assessment in 2023The Top 10 Steps to a Successful HIPAA Risk Assessment in 2023
The Top 10 Steps to a Successful HIPAA Risk Assessment in 2023
Conference Panel
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
FireEye, Inc.
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
Hanaysha
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
Edgar Alejandro Villegas
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIM
Anton Chuvakin
 

Similar to Protecting PHi- 1-2016 (20)

Risk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdfRisk assessment is the process which - identify hazards, analyzes an.pdf
Risk assessment is the process which - identify hazards, analyzes an.pdf
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Running Head ENTERPRISE RISK MANAGEMENT 1ENTERPRISE RISK MANA.docx
Running Head ENTERPRISE RISK MANAGEMENT  1ENTERPRISE RISK MANA.docxRunning Head ENTERPRISE RISK MANAGEMENT  1ENTERPRISE RISK MANA.docx
Running Head ENTERPRISE RISK MANAGEMENT 1ENTERPRISE RISK MANA.docx
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
 
ISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_IntindoloISSC471_Final_Project_Paper_John_Intindolo
ISSC471_Final_Project_Paper_John_Intindolo
 
HealthCare Information Security Program Guidelines
HealthCare Information Security Program GuidelinesHealthCare Information Security Program Guidelines
HealthCare Information Security Program Guidelines
 
White paper pragmatic safety solutions
White paper pragmatic safety solutionsWhite paper pragmatic safety solutions
White paper pragmatic safety solutions
 
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 
Executive Breach Response Playbook
Executive Breach Response PlaybookExecutive Breach Response Playbook
Executive Breach Response Playbook
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Week 1Defining the Safety Management SystemSeveral years .docx
Week 1Defining the Safety Management SystemSeveral years .docxWeek 1Defining the Safety Management SystemSeveral years .docx
Week 1Defining the Safety Management SystemSeveral years .docx
 
The Top 10 Steps to a Successful HIPAA Risk Assessment in 2023
The Top 10 Steps to a Successful HIPAA Risk Assessment in 2023The Top 10 Steps to a Successful HIPAA Risk Assessment in 2023
The Top 10 Steps to a Successful HIPAA Risk Assessment in 2023
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIM
 

Protecting PHi- 1-2016

  • 1. Identifying vulnerabilities is a key first step, but what follows is the most important The old adage, “success is 2% inspiration and 98% perspiration” also applies to HIPAA Privacy and Security. It is one thing to know what you need to do, but it is another to actually follow through and do it. With the requirements of HIPAA and Meaningful Use attestation, practice administrators are tasked with completing a Security Risk Assessment – whether done internally or through a third party. The practice usually thinks that they have done one, or plan on doing one internally or with an outsourced IT firm. However, in reality, IT folks have gone through and checked on a few hardware or network items, and either updated those items or gave the administrator a proposal to update everything. ALERT: THIS IS NOT THE SECURITY RISK ASESSMENT that HIPAA and Meaningful Use have in mind. Furthermore, and equally important, is that this process usually does not generate a Corrective Action Plan (a.k.a. Remediation Plan). Commonly, a Corrective Action Plan is not fully understood by most healthcare organizations. A Corrective Action Plan identifies the vulnerable areas of the practice (as it relates to PHi) and provides a way to track remediation efforts. The Corrective Action Plan is a “living document” that is reflective of the findings from the most recent Security Risk Assessment. The data of all the risk are then mapped back to the infrastructure (both IT and general) to help prioritize the fixes. It is considered “living” because it contains tasks based on risk that need to be addressed by the practice/covered entity. While the tasks are prioritized by risk level and impact to the organization, they generally can never be done quickly. Therefore, the document “lives” by having the responsible person(s) updating the progress of the tasks to be completed. This process is to be iterated throughout the year until the next Security Risk Assessment is performed. At that time, a new and revised Corrective Action Plan is created. The keys to successfully protecting PHi, is to understand how to complete a Security Risk Assessment that properly identifies the risks, and how to generate a Corrective Action Plan that prioritizes those risks. By tackling these two items, a strategy can be formed for how the majority of a covered entity’s vulnerabilities can be mitigated. Of equal importance, is making sure that someone within in the organization is following through and completing the outstanding tasks, or that you are working with someone to help you remediate them. Finally, comes updating the Corrective Action Plan in preparation for the next risk assessment. Bill Steuer GSG Compliance, LLC www.gsgcompliance.com