SlideShare a Scribd company logo
CASE STUDY  
  
www.ostendio.com  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
Regulatory Compliance Done Right  
Ensuring the confidentiality, integrity and availability of customer data.  
1
The Challenge
When ILLUMEN, an information technology
service company, was asked by one of their high
profile customers to host and manage
infrastructure containing electronic Personal
Health Information (ePHI), they knew that they
would have to implement a robust security and
compliance program. While their highly skilled
engineers were well equipped to deal with the
technical security components of protecting
sensitive data, they did not have a good way to
manage all the policies and procedures
necessary to maintain tough security and
compliance. In particular, a program that would
include meeting the requirements of the Health
Insurance Portability and Accountability Act
(HIPAA) and other regulatory standards such as,
the International Security Organization (ISO), and
the National Institutes Standards and
Technology (NIST) methodologies.
Added to this, their customer had a tight
deadline so they would have to setup a vigorous
security and compliance platform quickly if they
were going to be able to take on the work.
The Solution
ILLUMEN turned to Ostendio and their cloud
based solution - My Virtual Compliance
Manager (MyVCM™) - for help.
Ostendio started by conducting a high-level
control audit using MyVCM and quickly
“It is a beautiful thing to see all of our
critical policies and procedures in a
single console, and know that staff has
acknowledged them and is now
responsible for adhering to them.”
– CEO Mike Jenner - ILLUMEN  
2
determined the gaps and created a baseline
from which to work. Next, they worked with
ILLUMEN, creating policies and documenting
work processes, and uploading and
configuring audit tasks, policies, and setting
up training for all staff on the MyVCM platform.
ILLUMEN’s staff was fully engaged throughout
the process, and made certain that the
policies were in alignment with the business as
they worked through each document, asked
important questions, and came to a consensus
on what needed to be done.
 
  
©  2014  Ostendio,  Inc.    All  rights  Reserved  
About ILLUMEN
ILLUMEN delivers a unique
service model that integrates
people, process and
technology together that
enables the highest level of
productivity for our
clients. ILLUMEN’s mission is
to provide IT outsourcing
support that small and
medium-sized organizations
need to keep their computer
networks reliable and IT costs
under control. Find out more
at www.illumen.com
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
ABOUT OSTENDIO
Ostendio is an information security & risk management solutions provider that develops
affordable compliance solutions that demonstrate compliance for the healthcare industry.
ABOUT MyVCM
MyVCM helps Health Systems manage risk when working with innovative digital health
companies by providing a way for Health Systems to track vendor risk management and
compliance status in real-time. MyVCM helps innovative Digital Health companies
demonstrate compliance to Health Systems by providing a practical way to manage risk and
compliance and an easy way to share their risk and compliance status.  
Ostendio, Inc.
1400 Key Blvd, #100
Arlington, VA, 20009
Phone: 1 877 668 5658
Email: info@ostendio.com
twitter/ostendio
linkedin.com/company/3309477
fb.com/ostendio
Connect with us!
3
The Result
A second high-level risk assessment
was performed to assess the progress.
ILLUMEN was now scoring in mid-80’s
and low 90’s and greatly exceeding
the expectations of CEO Mike Jenner.
4
Shortly after implementation, MyVCM
proved itself. A critical security test in
ILLUMEN’s remote monitoring and
management platform triggered an
alert. ILLUMEN’s Incident Response
Team was immediately able to access
the newly created Incident
Management Policy and follow the
steps outlined in the policy. “We were
on the same page, speaking the same
language as we quickly stepped
through the process of managing the
incident.” said ILLUMEN GM, Greg
Oblack. Ultimately, the incident was a
5
result of a third party penetration test
that ILLUMEN passed with flying
colors. ILLUMEN now has custom
documentation that they use internally
and documentation they can share
6
with existing customers as
well as potential customers
wanting to know how they
are ensuring the
confidentiality, integrity and
availability of customer data.
ILLUMEN also has a better
handle on all of their
vendors, associated
contracts, and a clear
course of action for the next
steps in maintaining a robust
security and compliance
program.
7
ILLUMEN is able to share this
information quickly and easily using
the MyVCM Trust Network. “We are
impressed with the professionalism
and knowledge of the team and the
effectiveness of the tool; we receive
reminders when a policy is due for
update, or an audit tasks needs to be
completed and we can go in and see
if and who carried it out. MyVCM is a
great tool to have in the arsenal when
dealing with regulatory compliance.”
CEO Mike Jenner.

More Related Content

What's hot

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
TheAnfieldGroup
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
IBM Security
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
Jerod Brennen
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
IGN MANTRA
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
Dhani Ahmad
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
mariaidga
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
Jeff Miller
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
Anne ndolo
 
Thecavalryisus owasp eee-oct2015_v2
Thecavalryisus owasp eee-oct2015_v2Thecavalryisus owasp eee-oct2015_v2
Thecavalryisus owasp eee-oct2015_v2
Aurelijus Stanislovaitis
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
parves kamal
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
360factors
 
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
PECB
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
Barry Caplin
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
Robot Mode
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
nooralmousa
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
Ali Sadhik Shaik
 
It Policies
It PoliciesIt Policies
It Policies
James Sutter
 
The Next Disruptive Technology
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive Technology
RachelMullett
 

What's hot (20)

Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Infographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threatsInfographic: Mobile is growing and so are security threats
Infographic: Mobile is growing and so are security threats
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
Security and personnel
Security and personnelSecurity and personnel
Security and personnel
 
Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
IBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn SeriesIBM Security 2017 Lunch and Learn Series
IBM Security 2017 Lunch and Learn Series
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
 
Thecavalryisus owasp eee-oct2015_v2
Thecavalryisus owasp eee-oct2015_v2Thecavalryisus owasp eee-oct2015_v2
Thecavalryisus owasp eee-oct2015_v2
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
ISO 27001 control A17 (Continuity on Information Security), and ISO 22301: co...
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Fadi Mutlak - Information security governance
Fadi Mutlak - Information security governanceFadi Mutlak - Information security governance
Fadi Mutlak - Information security governance
 
Information Systems Policy
Information Systems PolicyInformation Systems Policy
Information Systems Policy
 
It Policies
It PoliciesIt Policies
It Policies
 
The Next Disruptive Technology
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive Technology
 

Similar to Regulatory Compliance Done Right

Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
Priyanka Aash
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
PECB
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
NA Putra
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Calgary Scientific Inc.
 
Xevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityXevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information Security
Michael Xevgenis
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
Insights success media and technology pvt ltd
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
vickeryr87
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
serve&solve
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
Danielle Bowers
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
William McBorrough
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
Mighty Guides, Inc.
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
Hiten Sethi
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
Devendra kashyap
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
ethnos
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
Iskcon Ahmedabad
 
CMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 | What the changes mean for organizations in the DIBCMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 | What the changes mean for organizations in the DIB
Ignyte Assurance Platform
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
William McBorrough
 
ENCYPHR_Brochure_V2
ENCYPHR_Brochure_V2ENCYPHR_Brochure_V2
ENCYPHR_Brochure_V2
Travis McDermott
 

Similar to Regulatory Compliance Done Right (20)

Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Xevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information SecurityXevgenis_Michail_CI7130 Network and Information Security
Xevgenis_Michail_CI7130 Network and Information Security
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 
Whitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdfWhitepaper Pro-active Security Management 2006.pdf
Whitepaper Pro-active Security Management 2006.pdf
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Iso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consultingIso 27001 2005- by netpeckers consulting
Iso 27001 2005- by netpeckers consulting
 
CMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 | What the changes mean for organizations in the DIBCMMC 2.0 | What the changes mean for organizations in the DIB
CMMC 2.0 | What the changes mean for organizations in the DIB
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
ENCYPHR_Brochure_V2
ENCYPHR_Brochure_V2ENCYPHR_Brochure_V2
ENCYPHR_Brochure_V2
 

Recently uploaded

NKTI Annual Report - Annual Report FY 2022
NKTI Annual Report - Annual Report FY 2022NKTI Annual Report - Annual Report FY 2022
NKTI Annual Report - Annual Report FY 2022
nktiacc3
 
Bringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured ApproachBringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured Approach
Brian Frerichs
 
GIT BS.pptx about human body their structure and
GIT BS.pptx about human body their structure andGIT BS.pptx about human body their structure and
GIT BS.pptx about human body their structure and
MuzafarBohio
 
Tips for Pet Care in winters How to take care of pets.
Tips for Pet Care in winters How to take care of pets.Tips for Pet Care in winters How to take care of pets.
Tips for Pet Care in winters How to take care of pets.
Dinesh Chauhan
 
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSONNEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
SHAMIN EABENSON
 
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdfMBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
bkling
 
Professional Secrecy: Forensic Medicine Lecture
Professional Secrecy: Forensic Medicine LectureProfessional Secrecy: Forensic Medicine Lecture
Professional Secrecy: Forensic Medicine Lecture
DIVYANSHU740006
 
CANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' CaregiversCANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' Caregivers
CANSA The Cancer Association of South Africa
 
Top Rated Massage Center In Ajman Chandrima Spa
Top Rated Massage Center In Ajman Chandrima SpaTop Rated Massage Center In Ajman Chandrima Spa
Top Rated Massage Center In Ajman Chandrima Spa
Chandrima Spa Ajman
 
PET CT beginners Guide covers some of the underrepresented topics in PET CT
PET CT  beginners Guide  covers some of the underrepresented topics  in PET CTPET CT  beginners Guide  covers some of the underrepresented topics  in PET CT
PET CT beginners Guide covers some of the underrepresented topics in PET CT
MiadAlsulami
 
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
rightmanforbloodline
 
FACIAL NERVE
FACIAL NERVEFACIAL NERVE
FACIAL NERVE
aditigupta1117
 
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
rightmanforbloodline
 
U Part Wigs_ A Natural Look with Minimal Effort Jokerwigs.in.pdf
U Part Wigs_ A Natural Look with Minimal Effort Jokerwigs.in.pdfU Part Wigs_ A Natural Look with Minimal Effort Jokerwigs.in.pdf
U Part Wigs_ A Natural Look with Minimal Effort Jokerwigs.in.pdf
Jokerwigs arts and craft
 
2024 HIPAA Compliance Training Guide to the Compliance Officers
2024 HIPAA Compliance Training Guide to the Compliance Officers2024 HIPAA Compliance Training Guide to the Compliance Officers
2024 HIPAA Compliance Training Guide to the Compliance Officers
Conference Panel
 
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Levi Shapiro
 
Letter to MREC - application to conduct study
Letter to MREC - application to conduct studyLetter to MREC - application to conduct study
Letter to MREC - application to conduct study
Azreen Aj
 
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and EngagementPrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx Program
 
Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...
Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...
Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...
nirahealhty
 
Bath patient Fundamental of Nursing.pptx
Bath patient Fundamental of Nursing.pptxBath patient Fundamental of Nursing.pptx
Bath patient Fundamental of Nursing.pptx
MianProductions
 

Recently uploaded (20)

NKTI Annual Report - Annual Report FY 2022
NKTI Annual Report - Annual Report FY 2022NKTI Annual Report - Annual Report FY 2022
NKTI Annual Report - Annual Report FY 2022
 
Bringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured ApproachBringing AI into a Mid-Sized Company: A structured Approach
Bringing AI into a Mid-Sized Company: A structured Approach
 
GIT BS.pptx about human body their structure and
GIT BS.pptx about human body their structure andGIT BS.pptx about human body their structure and
GIT BS.pptx about human body their structure and
 
Tips for Pet Care in winters How to take care of pets.
Tips for Pet Care in winters How to take care of pets.Tips for Pet Care in winters How to take care of pets.
Tips for Pet Care in winters How to take care of pets.
 
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSONNEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
NEEDLE STICK INJURY - JOURNAL CLUB PRESENTATION - DR SHAMIN EABENSON
 
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdfMBC Support Group for Black Women – Insights in Genetic Testing.pdf
MBC Support Group for Black Women – Insights in Genetic Testing.pdf
 
Professional Secrecy: Forensic Medicine Lecture
Professional Secrecy: Forensic Medicine LectureProfessional Secrecy: Forensic Medicine Lecture
Professional Secrecy: Forensic Medicine Lecture
 
CANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' CaregiversCANSA support - Caring for Cancer Patients' Caregivers
CANSA support - Caring for Cancer Patients' Caregivers
 
Top Rated Massage Center In Ajman Chandrima Spa
Top Rated Massage Center In Ajman Chandrima SpaTop Rated Massage Center In Ajman Chandrima Spa
Top Rated Massage Center In Ajman Chandrima Spa
 
PET CT beginners Guide covers some of the underrepresented topics in PET CT
PET CT  beginners Guide  covers some of the underrepresented topics  in PET CTPET CT  beginners Guide  covers some of the underrepresented topics  in PET CT
PET CT beginners Guide covers some of the underrepresented topics in PET CT
 
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...
 
FACIAL NERVE
FACIAL NERVEFACIAL NERVE
FACIAL NERVE
 
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
TEST BANK FOR Health Assessment in Nursing 7th Edition by Weber Chapters 1 - ...
 
U Part Wigs_ A Natural Look with Minimal Effort Jokerwigs.in.pdf
U Part Wigs_ A Natural Look with Minimal Effort Jokerwigs.in.pdfU Part Wigs_ A Natural Look with Minimal Effort Jokerwigs.in.pdf
U Part Wigs_ A Natural Look with Minimal Effort Jokerwigs.in.pdf
 
2024 HIPAA Compliance Training Guide to the Compliance Officers
2024 HIPAA Compliance Training Guide to the Compliance Officers2024 HIPAA Compliance Training Guide to the Compliance Officers
2024 HIPAA Compliance Training Guide to the Compliance Officers
 
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
Michigan HealthTech Market Map 2024 with Policy Makers, Academic Innovation C...
 
Letter to MREC - application to conduct study
Letter to MREC - application to conduct studyLetter to MREC - application to conduct study
Letter to MREC - application to conduct study
 
PrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and EngagementPrudentRx: A Resource for Patient Education and Engagement
PrudentRx: A Resource for Patient Education and Engagement
 
Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...
Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...
Can coffee help me lose weight? Yes, 25,422 users in the USA use it for that ...
 
Bath patient Fundamental of Nursing.pptx
Bath patient Fundamental of Nursing.pptxBath patient Fundamental of Nursing.pptx
Bath patient Fundamental of Nursing.pptx
 

Regulatory Compliance Done Right

  • 1. CASE STUDY     www.ostendio.com                                       Regulatory Compliance Done Right   Ensuring the confidentiality, integrity and availability of customer data.   1 The Challenge When ILLUMEN, an information technology service company, was asked by one of their high profile customers to host and manage infrastructure containing electronic Personal Health Information (ePHI), they knew that they would have to implement a robust security and compliance program. While their highly skilled engineers were well equipped to deal with the technical security components of protecting sensitive data, they did not have a good way to manage all the policies and procedures necessary to maintain tough security and compliance. In particular, a program that would include meeting the requirements of the Health Insurance Portability and Accountability Act (HIPAA) and other regulatory standards such as, the International Security Organization (ISO), and the National Institutes Standards and Technology (NIST) methodologies. Added to this, their customer had a tight deadline so they would have to setup a vigorous security and compliance platform quickly if they were going to be able to take on the work. The Solution ILLUMEN turned to Ostendio and their cloud based solution - My Virtual Compliance Manager (MyVCM™) - for help. Ostendio started by conducting a high-level control audit using MyVCM and quickly “It is a beautiful thing to see all of our critical policies and procedures in a single console, and know that staff has acknowledged them and is now responsible for adhering to them.” – CEO Mike Jenner - ILLUMEN   2 determined the gaps and created a baseline from which to work. Next, they worked with ILLUMEN, creating policies and documenting work processes, and uploading and configuring audit tasks, policies, and setting up training for all staff on the MyVCM platform. ILLUMEN’s staff was fully engaged throughout the process, and made certain that the policies were in alignment with the business as they worked through each document, asked important questions, and came to a consensus on what needed to be done.
  • 2.     ©  2014  Ostendio,  Inc.    All  rights  Reserved   About ILLUMEN ILLUMEN delivers a unique service model that integrates people, process and technology together that enables the highest level of productivity for our clients. ILLUMEN’s mission is to provide IT outsourcing support that small and medium-sized organizations need to keep their computer networks reliable and IT costs under control. Find out more at www.illumen.com                                                                       ABOUT OSTENDIO Ostendio is an information security & risk management solutions provider that develops affordable compliance solutions that demonstrate compliance for the healthcare industry. ABOUT MyVCM MyVCM helps Health Systems manage risk when working with innovative digital health companies by providing a way for Health Systems to track vendor risk management and compliance status in real-time. MyVCM helps innovative Digital Health companies demonstrate compliance to Health Systems by providing a practical way to manage risk and compliance and an easy way to share their risk and compliance status.   Ostendio, Inc. 1400 Key Blvd, #100 Arlington, VA, 20009 Phone: 1 877 668 5658 Email: info@ostendio.com twitter/ostendio linkedin.com/company/3309477 fb.com/ostendio Connect with us! 3 The Result A second high-level risk assessment was performed to assess the progress. ILLUMEN was now scoring in mid-80’s and low 90’s and greatly exceeding the expectations of CEO Mike Jenner. 4 Shortly after implementation, MyVCM proved itself. A critical security test in ILLUMEN’s remote monitoring and management platform triggered an alert. ILLUMEN’s Incident Response Team was immediately able to access the newly created Incident Management Policy and follow the steps outlined in the policy. “We were on the same page, speaking the same language as we quickly stepped through the process of managing the incident.” said ILLUMEN GM, Greg Oblack. Ultimately, the incident was a 5 result of a third party penetration test that ILLUMEN passed with flying colors. ILLUMEN now has custom documentation that they use internally and documentation they can share 6 with existing customers as well as potential customers wanting to know how they are ensuring the confidentiality, integrity and availability of customer data. ILLUMEN also has a better handle on all of their vendors, associated contracts, and a clear course of action for the next steps in maintaining a robust security and compliance program. 7 ILLUMEN is able to share this information quickly and easily using the MyVCM Trust Network. “We are impressed with the professionalism and knowledge of the team and the effectiveness of the tool; we receive reminders when a policy is due for update, or an audit tasks needs to be completed and we can go in and see if and who carried it out. MyVCM is a great tool to have in the arsenal when dealing with regulatory compliance.” CEO Mike Jenner.