SlideShare a Scribd company logo
Identity Management: Front and
Center for Healthcare Providers
2SailPoint Technologies Confidential & Proprietary Do Not Distribute
Welcome
 Thank You for attending today’s webinar
 The webcast is being recorded and will be available shortly after the event
 Webcast audio is in listen only mode. You can communicate via the
GoToWebinar question panel.
Glossary of Terms
IDENTITY GOVERNANCE – Next-Generation approach to identity management that goes
beyond provisioning, allowing clients to sustainably govern how they manage access. Enabling
organizations to determine who has access to what resources, if that access is appropriate and if
it threatens security or compliance posture.
ROLE LIFECYCLE MANAGEMENT (RLM) – Process that enables organizations to mine, map,
manage and report on the complex relationships of users, business rules and the entitlements
assigned to them within the IT infrastructure.
PREVENTATIVE AND DETECTIVE CONTROLS – Preventative controls are designed to keep
errors or irregularities from occurring in the first place. Detective controls are designed to detect
errors and irregularities which have already occurred and to assure their prompt correction.
3SailPoint Technologies Confidential & Proprietary Do Not Distribute
Agenda
 Speaker Introductions
 Healthcare Providers
 Changing Landscape of Business and IT
 Identity and Access Management Business Drivers
 Case Study: Presbyterian Healthcare Services
 IAM Journey
 IAM Revelation and Program
 Lesson Learned
 A Word from Our Sponsors
4SailPoint Technologies Confidential & Proprietary Do Not Distribute
Speakers
Andrew Ames
VP Marketing
Logic Trends
Larry Wolf
Regional Director
Logic Trends
Aaron Frankel
Security Operations
Manager,
Presbyterian
Health Systems
Jackie Gilbert
VP Marketing &
Founder
SailPoint
5SailPoint Technologies Confidential & Proprietary Do Not Distribute
Company Overview
 National services, consulting and systems integration firm focused on
Security, Identity and Access Management (IAM)
 Proven, repeatable IAM deployment methodology: IAM5™
 Hundreds of successful IAM Engagements executed in nearly every industry
 Regional offices: Atlanta, Dallas, Chicago, New York
 New Mexico’s only private, non-profit healthcare system serving over 700,000
patients at over 30 different clinics and 7 hospitals
 Largest health care provider and managed care organization in New Mexico
 Fastest growing physician group, employing more than 500 physicians
and practitioners
 Award-winning identity governance software, SailPoint IdentityIQ™, provides
superior visibility into and control over user access to sensitive applications
and data while streamlining the access request and delivery process
 Helps the world’s largest organizations to mitigate risk, reduce IT costs and
ensure compliance
 Customers include top healthcare, pharmaceutical, health/life insurers,
financial services, property & casualty insurers, and other highly regulated
industries
6SailPoint Technologies Confidential & Proprietary Do Not Distribute
IAM BUSINESS DRIVERS FOR
HEALTHCARE PROVIDERS
Section 1
7SailPoint Technologies Confidential & Proprietary Do Not Distribute
Business Drivers for Healthcare Providers
CURRENT STATE
HIPAA audit; HHS Oversight
HITRUST Maturity & CSF, SAS70
CURRENT STATE
Clinician survey results:
#1 request: Simplified app access.
Approx. 40% of help desk calls
were password reset.
CURRENT STATE
IT teams pale in comparison to
corporate standards. HITECH
driving more IT adoption.
Increased security scrutiny.
CURRENT STATE
30% of Stage 1 Meaningful Use
Criteria are IAM related.
Increased scrutiny and penalties
assoc with HIPAA alignment.
Risk and Compliance
End User Experience
Operational Efficiency
Meaningful Use
8SailPoint Technologies Confidential & Proprietary Do Not Distribute
Healthcare Provider Industry Survey Results
 Industry survey provided by Zoomerang
 Polled 600 healthcare decision makers
10%
38%
38%
10%
4%
Inadequate application
access security
Breach of confidential
information
Unauthorized access to
clinical applications
and patient data
Audit failure
Other
1%
2%
15%
29%
53%
They aren't considered very
much
They aren't a factor at all
They are the primary drivers
They are an influence
They are strongly considered
What is your greatest security concern? How much do HIPAA/HITECH drive your
organization’s IT purchasing decision?
Direct correlation between “security concerns” and purchasing decisions.
9SailPoint Technologies Confidential & Proprietary Do Not Distribute
40%
24%
6%
12%
6%
9%
3%
Top 3 IAM Drivers for Healthcare Providers
70% of registered attendees identified:
1. Improved user experience
2. Automated user lifecycle mgmt
3. Tighter compliance related controls
10SailPoint Technologies Confidential & Proprietary Do Not Distribute
PRESBYTERIAN HEALTHCARE
SERVICES’ CASE STUDY
Section 2
11SailPoint Technologies Confidential & Proprietary Do Not Distribute
Company Overview
Established in 1908, New Mexico’s largest non-profit
healthcare system, largest health care provider and largest
managed care organization with:
 7 hospitals and 40 clinics
 Over 9,000 employees, including 500+ physicians &
clinicians and 3,000+ contractors
 Over 700,000 patients generating over 1.2M visits/yr
 Top 10 integrated healthcare delivery network
INDUSTRY, PERSONNEL AND COMMUNITY EXCELLENCE
12SailPoint Technologies Confidential & Proprietary Do Not Distribute
IAM Journey @ PHS
2008 20112009 2010
Influential and vocal Cardiology
Group seeks to invest heavily in IT to
improve patient care. Heart Glass
(single pane) initiative begins to
address patient data management
for cardiology physicians. Auditors
seek more granular insight into
access and IT controls.
PHS seeks to address
several business & IT
requirements with IAM.
Conducts internal discovery,
and interfaces with IT
analyst. Initial focus was
technical in nature, with an
appetite for eProvisioning.
PHS’ users clamor for
improved experience and
self-service. IT and
Security collaborate to
build upon the IAM
platform to enable these
end-user services.
ARRA & HITECH Act
provide PHS with a
renewed vision on
simplification, both
infrastructure and
clinical IT.
Multiple PHS groups
collaborate to understand
and define key IT, audit,
security, clinical and
business goals, and the
role of IAM. Logic Trends
works as advisor to
establish program that
aligns with key initiatives.
PHS looks to further
leverage the eProvisioning
platform and introduces
Patient Context
Management to support
data integration of several
key clinical applications.
13SailPoint Technologies Confidential & Proprietary Do Not Distribute
IAM Revelation & Goals
2008 20112009 2010
Influential and vocal Cardiology Group seeks
to invest heavily in IT to improve patient care.
Heart Glass (single pane) initiative begins to
address patient data management for
cardiology physicians. Internal and external
audit seek more granular insight to access
and IT Controls.
Presbyterian Healthcare seeks to
address several business & IT
requirements with IAM…conducts
internal discovery, purchases and
implements a solution. Initial focus
was technical in nature, with an
appetite for eProvisioning.
PHS’s user community clamors
for improved experience and self-
service. IT and Security
collaborate to build upon the IAM
platform to enable these end-user
services.
ARRA & Health Information
Technology for Economic and
Clinical Health (HITECH) Act
provides PHS with a renewed
vision on simplification, both
infrastructure and clinical IT.
PHS looks to further leverage
the eProvisioning platform
and introduce Context
Management, supporting the
data integration of several key
clinical applications.
IAM is a business challenge first and a technology issue,
second. What does the business need?
Multiple PHS groups collaborate to
understand and define key IT,
Audit, Security, Clinical and
Business goals, and the role of
IAM. Logic Trends works as
advisor to establish program that
aligns with key initiatives.
Multiple PHS groups
collaborate to understand
and define key IT, Audit,
Security, Clinical and
Business goals, and the
role of IAM. Logic Trends
works as advisor to
establish program that
aligns with key initiatives.
Enable simplified access reporting and
demonstration of IT controls to best support the
many needs of Audit
Expose user-friendly entitlements to business
users so access decisions can be made efficiently
and effectively
Automate application access based on
authoritative user events, to create agility and
speed when dealing with patient-care
Improve and simplify the user experience thereby
empowering users with the tools to do their job
Mature the IT, Identity and Application
infrastructure to enable more rapid adoption
of solutions
14SailPoint Technologies Confidential & Proprietary Do Not Distribute
IAM Program Development
 With a clear understanding of the
business needs, PHS set out to
align the proper activities
 Leveraging the Logic Trends IAM5
methodology, PHS embraced:
 Phased approach with prioritization
of initiatives
 Data & process focus first
 Maturity model to enable future
functionality
 Business case and frequent solution
release schedule
15SailPoint Technologies Confidential & Proprietary Do Not Distribute
Role Development
 “smart” eProvisioning of new users
based upon roles
 Full user lifecycle with approval and
controls
 Zero-day user and application
enablement
 Enterprise risk management
 Strengthen IT controls
 Compliance reporting alignment
IAM Program Execution
Phase 1
Phase 2
Phase 3
 Top Down (business) and Bottom-Up
(app / entitlement) analysis
 Business and technical role
development (model)
 Policy alignment with role and
business functions
 Business-aligned definition of “Who
Has (and needs) Access to What”
 Flexible yet accountable model for
identity and access management
 Least privilege without role explosion
Applications
Managers
FUNCTIONALITY BUSINESS VALUE
 Enterprise identity data collection,
reconciliation & cleansing
 Defining “Who Has Access to What”
 Policy awareness and definition
 User access certification
 Identity, access & entitlement maturity
 Enhanced IT controls
 Audit alignment
 IAM platform enabler
 End user empowerment & efficiency
16SailPoint Technologies Confidential & Proprietary Do Not Distribute
Lessons Learned
 IAM is always evolving and the business will remain dynamic…
remain agile and annually assess priorities, technology and
alignment
 Focus on your data & entitlements first (who has access to
what). Everything else in your IAM program builds upon that.
 Quick Wins are critical for maintaining momentum and
organizational support for Identity and Access Management
initiatives.
 Develop an IAM strategy, and seek support and contributions
from key business and clinical stakeholders.
 Experienced partners can help navigate the process to ensure
objectives are met.
17SailPoint Technologies Confidential & Proprietary Do Not Distribute
A WORD FROM OUR SPONSORS
Section 3
18SailPoint Technologies Confidential & Proprietary Do Not Distribute
Logic Trends
A leading professional services firm focused on Identity & Access
Management and Governance
Corporate Profile
 Founded in 2002
 Inc. 500 Fastest Growing US private
company honoree for five years
 Logic Trends services its National
client base through operations in
Atlanta (HQ), Dallas, Chicago,
New York, and Baltimore
Services Profile
 300+ Engagements Completed
 Repeatable IAM5 Services Framework
 Full IAM Lifecycle Service Delivery including:
 Strategic Advisory
 Program/Project Management
 Full IAM SDLC Support
 Cloud-Based IAM offering
 24X7 Support Center
Resource Snapshot
 Senior Delivery Team, 12+ years of IAM delivery
 70 employees nationally
 Regionally focused
with national
coverage
Sample Healthcare Clients
19SailPoint Technologies Confidential & Proprietary Do Not Distribute
IAM5 – Approach & Methodology
Identity and Access Management often represents the first truly
enterprise solution an organization will deploy. Consequently, IAM
is an organizational, process, and corporate culture challenge first
and a technology challenge second. Our broad experience with
Enterprise IAM has led to the following methodology development:
The IAM5 Methodology is positioned to deliver incremental wins and
outputs for the business and technical audiences
20SailPoint Technologies Confidential & Proprietary Do Not Distribute
IAM for Healthcare
Perfect storm of…
 Compliance needs
 Provider consolidation
 Patient access
 IT adoption
 End user experience
improvements
Requires a partner with
healthcare, business, IT and
security knowledge capital
21SailPoint Technologies Confidential & Proprietary Do Not Distribute
Introducing SailPoint
 Leading identity and access governance (IAG)
solution provider
 Founded in 2005
 Headquartered in Austin, Texas
 Over 140 employees around the world
 Our global customer base
 Over 75 companies in 14 countries
 Our specialty: security & privacy regulatory
challenges in healthcare, financial services and
insurance
 We help our customers to
 Reduce risk of non-compliance
 Proactively manage security and identity risk
 Lower administration and compliance costs
 Enhance employee productivity
 Pave the way for future initiatives
22SailPoint Technologies Confidential & Proprietary Do Not Distribute
SailPoint IdentityIQ Suite
A unified solution for automating compliance and user lifecycle
processes – built on a common roles, policy, and risk model
Compliance
Management
Lifecycle
Management
 Automates regular review
of user access
 Proactively detects and
notifies managers of
policy violations
 Detects and mitigates
identity & access risks
 Provides analytics &
reporting for proof of
compliance
 Provisions new users
 Automates routine user
administration tasks
 Job changes
 Location changes
 Forgotten or expired
passwords
 De-provisions
terminated users
23SailPoint Technologies Confidential & Proprietary Do Not Distribute
Determine Current
State
Who has access to what?
Is that access appropriate?
Automate User
Lifecycle Processes
Access Request
Event Lifecycle Mgmt
Workflow/Connectors
Model Desired State
Mine, model & define roles
Define access policies
Configure risk model
SailPoint’s Unique
Governance-Based Approach
 Aggregate and correlate data
 Data cleanup
 Access reviews
 Remediation & critical
corrective actions
 Mine, model & create roles
 Define role assignment rules
 Define business policies (SoD
and other)
 Define risk model components
 Configure access request
 Define lifecycle events
(joiner, mover, leaver)
 Establish approval
workflows and policies
 Define change management
processes
 Deploy connectors
where needed
24SailPoint Technologies Confidential & Proprietary Do Not Distribute
SailPoint: Fast Results, Fast ROI
 Immediate value to the business
 Identify potential risks and vulnerabilities
 Remediate problems to reduce risk
 Automate strong controls and reliable, repeatable oversight
 Provide proof of compliance on demand
 Ensure compliance with these safeguards by all staff
 Measurable results in weeks
 Reduced compliance costs and staffing requirements
 Revocations of inappropriate access (avg. 20-30%)
 Detection and remediation of policy violations
 Elimination of high-risk accounts
Q&A

More Related Content

What's hot

Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
OracleIDM
 
Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access Governance
Horst Walther
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
Julie Beuselinck
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
Prof. Jacques Folon (Ph.D)
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Management
hankgruenberg
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
Dell World
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
Veritis Group, Inc
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
IBM Security
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
Prof. Jacques Folon (Ph.D)
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
IBM Security
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
Jerod Brennen
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
WSO2
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
Axis Technology, LLC
 
A Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM ProgramsA Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM Programs
Horst Walther
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
Ganesh Prasad
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
Josep Bardallo
 
Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
Axis Technology, LLC
 
COBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORKCOBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 

What's hot (20)

Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Identity & Access Governance
Identity & Access GovernanceIdentity & Access Governance
Identity & Access Governance
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Paradigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access ManagementParadigmo specialised in Identity & Access Management
Paradigmo specialised in Identity & Access Management
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
A Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access ManagementA Pragmatic Approach to Identity and Access Management
A Pragmatic Approach to Identity and Access Management
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
Managing Identity from the Cloud: Transformation Advantages at VantisLife Ins...
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 
Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts Identity and Entitlement Management Concepts
Identity and Entitlement Management Concepts
 
Entitlement and Access Manegement
Entitlement and Access ManegementEntitlement and Access Manegement
Entitlement and Access Manegement
 
A Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM ProgramsA Practitioner´s Recommendations for successful IAM Programs
A Practitioner´s Recommendations for successful IAM Programs
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
50 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 050 data principles for loosely coupled identity management v1 0
50 data principles for loosely coupled identity management v1 0
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
 
COBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORKCOBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
 

Viewers also liked

Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trinings
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
CA API Management
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CloudIDSummit
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
CloudIDSummit
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
OneLogin
 
iHT² CMIO Symposium Beverly Hills – Opening Keynote: Kamal Jethwani, MD, MPH,...
iHT² CMIO Symposium Beverly Hills – Opening Keynote: Kamal Jethwani, MD, MPH,...iHT² CMIO Symposium Beverly Hills – Opening Keynote: Kamal Jethwani, MD, MPH,...
iHT² CMIO Symposium Beverly Hills – Opening Keynote: Kamal Jethwani, MD, MPH,...
Health IT Conference – iHT2
 
Patient Relationship Management Turkey V1
Patient Relationship Management Turkey V1Patient Relationship Management Turkey V1
Patient Relationship Management Turkey V1
didemtopuz
 
Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentation
Saiful Chowdhury
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CloudIDSummit
 
Customer relationship management healthcare
Customer relationship management healthcare Customer relationship management healthcare
Customer relationship management healthcare
Rupali Singh
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
cisoplatform
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
Sofie van der Meulen
 
Identity Management: Tools, processes & services
Identity Management: Tools, processes & servicesIdentity Management: Tools, processes & services
Identity Management: Tools, processes & services
JISC Netskills
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
Smart Grid Interoperability Panel
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
Fraunhofer AISEC
 
"Healthcare Data for Healthy CRM & PRM" TrendLab Webinar
"Healthcare Data for Healthy CRM & PRM" TrendLab Webinar"Healthcare Data for Healthy CRM & PRM" TrendLab Webinar
"Healthcare Data for Healthy CRM & PRM" TrendLab Webinar
Bluespire Marketing
 
Center for Medicare-and-Medicaid Services-Conditions of Participation for Eme...
Center for Medicare-and-Medicaid Services-Conditions of Participation for Eme...Center for Medicare-and-Medicaid Services-Conditions of Participation for Eme...
Center for Medicare-and-Medicaid Services-Conditions of Participation for Eme...
Karl Schmitt
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
C/D/H Technology Consultants
 

Viewers also liked (18)

Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk PostureCIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
CIS13: How IAM Improved Sallie Mae's Compliance and Risk Posture
 
CIS14: PingAccess in Action
CIS14: PingAccess in ActionCIS14: PingAccess in Action
CIS14: PingAccess in Action
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
iHT² CMIO Symposium Beverly Hills – Opening Keynote: Kamal Jethwani, MD, MPH,...
iHT² CMIO Symposium Beverly Hills – Opening Keynote: Kamal Jethwani, MD, MPH,...iHT² CMIO Symposium Beverly Hills – Opening Keynote: Kamal Jethwani, MD, MPH,...
iHT² CMIO Symposium Beverly Hills – Opening Keynote: Kamal Jethwani, MD, MPH,...
 
Patient Relationship Management Turkey V1
Patient Relationship Management Turkey V1Patient Relationship Management Turkey V1
Patient Relationship Management Turkey V1
 
Uk french national id card presentation
Uk french national id card presentationUk french national id card presentation
Uk french national id card presentation
 
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
CIS 2015 Modernize IAM with UnboundID and Ping Identity - Terry Sigle & B. Al...
 
Customer relationship management healthcare
Customer relationship management healthcare Customer relationship management healthcare
Customer relationship management healthcare
 
Workshop on Identity & Access Management.
Workshop on Identity & Access Management.Workshop on Identity & Access Management.
Workshop on Identity & Access Management.
 
Presentation gdpr ahti
Presentation gdpr ahtiPresentation gdpr ahti
Presentation gdpr ahti
 
Identity Management: Tools, processes & services
Identity Management: Tools, processes & servicesIdentity Management: Tools, processes & services
Identity Management: Tools, processes & services
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Landscape of Web Identity Management
Landscape of Web Identity ManagementLandscape of Web Identity Management
Landscape of Web Identity Management
 
"Healthcare Data for Healthy CRM & PRM" TrendLab Webinar
"Healthcare Data for Healthy CRM & PRM" TrendLab Webinar"Healthcare Data for Healthy CRM & PRM" TrendLab Webinar
"Healthcare Data for Healthy CRM & PRM" TrendLab Webinar
 
Center for Medicare-and-Medicaid Services-Conditions of Participation for Eme...
Center for Medicare-and-Medicaid Services-Conditions of Participation for Eme...Center for Medicare-and-Medicaid Services-Conditions of Participation for Eme...
Center for Medicare-and-Medicaid Services-Conditions of Participation for Eme...
 
Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?Identity Management: What Solution is Right for You?
Identity Management: What Solution is Right for You?
 

Similar to Identity Management: Front and Center for Healthcare Providers

Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
Product Marketing Services
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance
365 Data Centers
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
Priyanka Aash
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
Allison Walton
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
Matthew Zielinski, CISSP, CBCP
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
happiestmindstech
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
Gord Reynolds
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
Precisely
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
Tory Quinton
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
ResearchFox
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT System
RSM India
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Stacy Willis
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
EMC
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Novell
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAM
EMC
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
Bee_Ware
 
A Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And ManagementA Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And Management
Skillmine Technology Consulting
 
Create an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsCreate an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 Steps
Mauricio 'MJ' Jimenez
 

Similar to Identity Management: Front and Center for Healthcare Providers (20)

Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
365 infographic-compliance
365 infographic-compliance365 infographic-compliance
365 infographic-compliance
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
web-MINImag
web-MINImagweb-MINImag
web-MINImag
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...Streamlining Identity and Access Management through Unified Identity and Acce...
Streamlining Identity and Access Management through Unified Identity and Acce...
 
Capgemini ses - security po v (gr)
Capgemini   ses - security po v (gr)Capgemini   ses - security po v (gr)
Capgemini ses - security po v (gr)
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Identity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market ReportIdentity Access Management(IAM) - Government Market Report
Identity Access Management(IAM) - Government Market Report
 
RSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT SystemRSM India publication - How Robust is your IT System
RSM India publication - How Robust is your IT System
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAM
 
Managing complexity in IAM
Managing complexity in IAMManaging complexity in IAM
Managing complexity in IAM
 
A Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And ManagementA Guide To IT Compliance Assessment And Management
A Guide To IT Compliance Assessment And Management
 
Create an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 StepsCreate an Enterprise Architecture Strategy in 3 Steps
Create an Enterprise Architecture Strategy in 3 Steps
 

Recently uploaded

DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
katiejasper96
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Operational Excellence Consulting
 
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineEllen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
CIOWomenMagazine
 
Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
HajeJanKamps
 
Negotiation & Presentation Skills regarding steps in business communication, ...
Negotiation & Presentation Skills regarding steps in business communication, ...Negotiation & Presentation Skills regarding steps in business communication, ...
Negotiation & Presentation Skills regarding steps in business communication, ...
UdayaShankarS1
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Kalyan Satta Matka Guessing Matka Result Main Bazar chart
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
CLIVE MINCHIN
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
BBPMedia1
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Neil Horowitz
 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
dazzjoker
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
onlyfansmanagedau
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
taqyea
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
GraceKohler1
 
How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
HumanResourceDimensi1
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
Operational Excellence Consulting
 

Recently uploaded (20)

DearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUniDearbornMusic-KatherineJasperFullSailUni
DearbornMusic-KatherineJasperFullSailUni
 
Innovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & InnovationInnovation Management Frameworks: Your Guide to Creativity & Innovation
Innovation Management Frameworks: Your Guide to Creativity & Innovation
 
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women MagazineEllen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
Ellen Burstyn: From Detroit Dreamer to Hollywood Legend | CIO Women Magazine
 
Pitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deckPitch Deck Teardown: Kinnect's $250k Angel deck
Pitch Deck Teardown: Kinnect's $250k Angel deck
 
Negotiation & Presentation Skills regarding steps in business communication, ...
Negotiation & Presentation Skills regarding steps in business communication, ...Negotiation & Presentation Skills regarding steps in business communication, ...
Negotiation & Presentation Skills regarding steps in business communication, ...
 
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Fin...
 
Best practices for project execution and delivery
Best practices for project execution and deliveryBest practices for project execution and delivery
Best practices for project execution and delivery
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
 
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
Brian Fitzsimmons on the Business Strategy and Content Flywheel of Barstool S...
 
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdfRegistered-Establishment-List-in-Uttarakhand-pdf.pdf
Registered-Establishment-List-in-Uttarakhand-pdf.pdf
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
4 Benefits of Partnering with an OnlyFans Agency for Content Creators.pdf
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
一比一原版(QMUE毕业证书)英国爱丁堡玛格丽特女王大学毕业证文凭如何办理
 
GKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt PresentationGKohler - Retail Scavenger Hunt Presentation
GKohler - Retail Scavenger Hunt Presentation
 
How HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdfHow HR Search Helps in Company Success.pdf
How HR Search Helps in Company Success.pdf
 
Digital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital ExcellenceDigital Transformation Frameworks: Driving Digital Excellence
Digital Transformation Frameworks: Driving Digital Excellence
 

Identity Management: Front and Center for Healthcare Providers

  • 1. Identity Management: Front and Center for Healthcare Providers
  • 2. 2SailPoint Technologies Confidential & Proprietary Do Not Distribute Welcome  Thank You for attending today’s webinar  The webcast is being recorded and will be available shortly after the event  Webcast audio is in listen only mode. You can communicate via the GoToWebinar question panel. Glossary of Terms IDENTITY GOVERNANCE – Next-Generation approach to identity management that goes beyond provisioning, allowing clients to sustainably govern how they manage access. Enabling organizations to determine who has access to what resources, if that access is appropriate and if it threatens security or compliance posture. ROLE LIFECYCLE MANAGEMENT (RLM) – Process that enables organizations to mine, map, manage and report on the complex relationships of users, business rules and the entitlements assigned to them within the IT infrastructure. PREVENTATIVE AND DETECTIVE CONTROLS – Preventative controls are designed to keep errors or irregularities from occurring in the first place. Detective controls are designed to detect errors and irregularities which have already occurred and to assure their prompt correction.
  • 3. 3SailPoint Technologies Confidential & Proprietary Do Not Distribute Agenda  Speaker Introductions  Healthcare Providers  Changing Landscape of Business and IT  Identity and Access Management Business Drivers  Case Study: Presbyterian Healthcare Services  IAM Journey  IAM Revelation and Program  Lesson Learned  A Word from Our Sponsors
  • 4. 4SailPoint Technologies Confidential & Proprietary Do Not Distribute Speakers Andrew Ames VP Marketing Logic Trends Larry Wolf Regional Director Logic Trends Aaron Frankel Security Operations Manager, Presbyterian Health Systems Jackie Gilbert VP Marketing & Founder SailPoint
  • 5. 5SailPoint Technologies Confidential & Proprietary Do Not Distribute Company Overview  National services, consulting and systems integration firm focused on Security, Identity and Access Management (IAM)  Proven, repeatable IAM deployment methodology: IAM5™  Hundreds of successful IAM Engagements executed in nearly every industry  Regional offices: Atlanta, Dallas, Chicago, New York  New Mexico’s only private, non-profit healthcare system serving over 700,000 patients at over 30 different clinics and 7 hospitals  Largest health care provider and managed care organization in New Mexico  Fastest growing physician group, employing more than 500 physicians and practitioners  Award-winning identity governance software, SailPoint IdentityIQ™, provides superior visibility into and control over user access to sensitive applications and data while streamlining the access request and delivery process  Helps the world’s largest organizations to mitigate risk, reduce IT costs and ensure compliance  Customers include top healthcare, pharmaceutical, health/life insurers, financial services, property & casualty insurers, and other highly regulated industries
  • 6. 6SailPoint Technologies Confidential & Proprietary Do Not Distribute IAM BUSINESS DRIVERS FOR HEALTHCARE PROVIDERS Section 1
  • 7. 7SailPoint Technologies Confidential & Proprietary Do Not Distribute Business Drivers for Healthcare Providers CURRENT STATE HIPAA audit; HHS Oversight HITRUST Maturity & CSF, SAS70 CURRENT STATE Clinician survey results: #1 request: Simplified app access. Approx. 40% of help desk calls were password reset. CURRENT STATE IT teams pale in comparison to corporate standards. HITECH driving more IT adoption. Increased security scrutiny. CURRENT STATE 30% of Stage 1 Meaningful Use Criteria are IAM related. Increased scrutiny and penalties assoc with HIPAA alignment. Risk and Compliance End User Experience Operational Efficiency Meaningful Use
  • 8. 8SailPoint Technologies Confidential & Proprietary Do Not Distribute Healthcare Provider Industry Survey Results  Industry survey provided by Zoomerang  Polled 600 healthcare decision makers 10% 38% 38% 10% 4% Inadequate application access security Breach of confidential information Unauthorized access to clinical applications and patient data Audit failure Other 1% 2% 15% 29% 53% They aren't considered very much They aren't a factor at all They are the primary drivers They are an influence They are strongly considered What is your greatest security concern? How much do HIPAA/HITECH drive your organization’s IT purchasing decision? Direct correlation between “security concerns” and purchasing decisions.
  • 9. 9SailPoint Technologies Confidential & Proprietary Do Not Distribute 40% 24% 6% 12% 6% 9% 3% Top 3 IAM Drivers for Healthcare Providers 70% of registered attendees identified: 1. Improved user experience 2. Automated user lifecycle mgmt 3. Tighter compliance related controls
  • 10. 10SailPoint Technologies Confidential & Proprietary Do Not Distribute PRESBYTERIAN HEALTHCARE SERVICES’ CASE STUDY Section 2
  • 11. 11SailPoint Technologies Confidential & Proprietary Do Not Distribute Company Overview Established in 1908, New Mexico’s largest non-profit healthcare system, largest health care provider and largest managed care organization with:  7 hospitals and 40 clinics  Over 9,000 employees, including 500+ physicians & clinicians and 3,000+ contractors  Over 700,000 patients generating over 1.2M visits/yr  Top 10 integrated healthcare delivery network INDUSTRY, PERSONNEL AND COMMUNITY EXCELLENCE
  • 12. 12SailPoint Technologies Confidential & Proprietary Do Not Distribute IAM Journey @ PHS 2008 20112009 2010 Influential and vocal Cardiology Group seeks to invest heavily in IT to improve patient care. Heart Glass (single pane) initiative begins to address patient data management for cardiology physicians. Auditors seek more granular insight into access and IT controls. PHS seeks to address several business & IT requirements with IAM. Conducts internal discovery, and interfaces with IT analyst. Initial focus was technical in nature, with an appetite for eProvisioning. PHS’ users clamor for improved experience and self-service. IT and Security collaborate to build upon the IAM platform to enable these end-user services. ARRA & HITECH Act provide PHS with a renewed vision on simplification, both infrastructure and clinical IT. Multiple PHS groups collaborate to understand and define key IT, audit, security, clinical and business goals, and the role of IAM. Logic Trends works as advisor to establish program that aligns with key initiatives. PHS looks to further leverage the eProvisioning platform and introduces Patient Context Management to support data integration of several key clinical applications.
  • 13. 13SailPoint Technologies Confidential & Proprietary Do Not Distribute IAM Revelation & Goals 2008 20112009 2010 Influential and vocal Cardiology Group seeks to invest heavily in IT to improve patient care. Heart Glass (single pane) initiative begins to address patient data management for cardiology physicians. Internal and external audit seek more granular insight to access and IT Controls. Presbyterian Healthcare seeks to address several business & IT requirements with IAM…conducts internal discovery, purchases and implements a solution. Initial focus was technical in nature, with an appetite for eProvisioning. PHS’s user community clamors for improved experience and self- service. IT and Security collaborate to build upon the IAM platform to enable these end-user services. ARRA & Health Information Technology for Economic and Clinical Health (HITECH) Act provides PHS with a renewed vision on simplification, both infrastructure and clinical IT. PHS looks to further leverage the eProvisioning platform and introduce Context Management, supporting the data integration of several key clinical applications. IAM is a business challenge first and a technology issue, second. What does the business need? Multiple PHS groups collaborate to understand and define key IT, Audit, Security, Clinical and Business goals, and the role of IAM. Logic Trends works as advisor to establish program that aligns with key initiatives. Multiple PHS groups collaborate to understand and define key IT, Audit, Security, Clinical and Business goals, and the role of IAM. Logic Trends works as advisor to establish program that aligns with key initiatives. Enable simplified access reporting and demonstration of IT controls to best support the many needs of Audit Expose user-friendly entitlements to business users so access decisions can be made efficiently and effectively Automate application access based on authoritative user events, to create agility and speed when dealing with patient-care Improve and simplify the user experience thereby empowering users with the tools to do their job Mature the IT, Identity and Application infrastructure to enable more rapid adoption of solutions
  • 14. 14SailPoint Technologies Confidential & Proprietary Do Not Distribute IAM Program Development  With a clear understanding of the business needs, PHS set out to align the proper activities  Leveraging the Logic Trends IAM5 methodology, PHS embraced:  Phased approach with prioritization of initiatives  Data & process focus first  Maturity model to enable future functionality  Business case and frequent solution release schedule
  • 15. 15SailPoint Technologies Confidential & Proprietary Do Not Distribute Role Development  “smart” eProvisioning of new users based upon roles  Full user lifecycle with approval and controls  Zero-day user and application enablement  Enterprise risk management  Strengthen IT controls  Compliance reporting alignment IAM Program Execution Phase 1 Phase 2 Phase 3  Top Down (business) and Bottom-Up (app / entitlement) analysis  Business and technical role development (model)  Policy alignment with role and business functions  Business-aligned definition of “Who Has (and needs) Access to What”  Flexible yet accountable model for identity and access management  Least privilege without role explosion Applications Managers FUNCTIONALITY BUSINESS VALUE  Enterprise identity data collection, reconciliation & cleansing  Defining “Who Has Access to What”  Policy awareness and definition  User access certification  Identity, access & entitlement maturity  Enhanced IT controls  Audit alignment  IAM platform enabler  End user empowerment & efficiency
  • 16. 16SailPoint Technologies Confidential & Proprietary Do Not Distribute Lessons Learned  IAM is always evolving and the business will remain dynamic… remain agile and annually assess priorities, technology and alignment  Focus on your data & entitlements first (who has access to what). Everything else in your IAM program builds upon that.  Quick Wins are critical for maintaining momentum and organizational support for Identity and Access Management initiatives.  Develop an IAM strategy, and seek support and contributions from key business and clinical stakeholders.  Experienced partners can help navigate the process to ensure objectives are met.
  • 17. 17SailPoint Technologies Confidential & Proprietary Do Not Distribute A WORD FROM OUR SPONSORS Section 3
  • 18. 18SailPoint Technologies Confidential & Proprietary Do Not Distribute Logic Trends A leading professional services firm focused on Identity & Access Management and Governance Corporate Profile  Founded in 2002  Inc. 500 Fastest Growing US private company honoree for five years  Logic Trends services its National client base through operations in Atlanta (HQ), Dallas, Chicago, New York, and Baltimore Services Profile  300+ Engagements Completed  Repeatable IAM5 Services Framework  Full IAM Lifecycle Service Delivery including:  Strategic Advisory  Program/Project Management  Full IAM SDLC Support  Cloud-Based IAM offering  24X7 Support Center Resource Snapshot  Senior Delivery Team, 12+ years of IAM delivery  70 employees nationally  Regionally focused with national coverage Sample Healthcare Clients
  • 19. 19SailPoint Technologies Confidential & Proprietary Do Not Distribute IAM5 – Approach & Methodology Identity and Access Management often represents the first truly enterprise solution an organization will deploy. Consequently, IAM is an organizational, process, and corporate culture challenge first and a technology challenge second. Our broad experience with Enterprise IAM has led to the following methodology development: The IAM5 Methodology is positioned to deliver incremental wins and outputs for the business and technical audiences
  • 20. 20SailPoint Technologies Confidential & Proprietary Do Not Distribute IAM for Healthcare Perfect storm of…  Compliance needs  Provider consolidation  Patient access  IT adoption  End user experience improvements Requires a partner with healthcare, business, IT and security knowledge capital
  • 21. 21SailPoint Technologies Confidential & Proprietary Do Not Distribute Introducing SailPoint  Leading identity and access governance (IAG) solution provider  Founded in 2005  Headquartered in Austin, Texas  Over 140 employees around the world  Our global customer base  Over 75 companies in 14 countries  Our specialty: security & privacy regulatory challenges in healthcare, financial services and insurance  We help our customers to  Reduce risk of non-compliance  Proactively manage security and identity risk  Lower administration and compliance costs  Enhance employee productivity  Pave the way for future initiatives
  • 22. 22SailPoint Technologies Confidential & Proprietary Do Not Distribute SailPoint IdentityIQ Suite A unified solution for automating compliance and user lifecycle processes – built on a common roles, policy, and risk model Compliance Management Lifecycle Management  Automates regular review of user access  Proactively detects and notifies managers of policy violations  Detects and mitigates identity & access risks  Provides analytics & reporting for proof of compliance  Provisions new users  Automates routine user administration tasks  Job changes  Location changes  Forgotten or expired passwords  De-provisions terminated users
  • 23. 23SailPoint Technologies Confidential & Proprietary Do Not Distribute Determine Current State Who has access to what? Is that access appropriate? Automate User Lifecycle Processes Access Request Event Lifecycle Mgmt Workflow/Connectors Model Desired State Mine, model & define roles Define access policies Configure risk model SailPoint’s Unique Governance-Based Approach  Aggregate and correlate data  Data cleanup  Access reviews  Remediation & critical corrective actions  Mine, model & create roles  Define role assignment rules  Define business policies (SoD and other)  Define risk model components  Configure access request  Define lifecycle events (joiner, mover, leaver)  Establish approval workflows and policies  Define change management processes  Deploy connectors where needed
  • 24. 24SailPoint Technologies Confidential & Proprietary Do Not Distribute SailPoint: Fast Results, Fast ROI  Immediate value to the business  Identify potential risks and vulnerabilities  Remediate problems to reduce risk  Automate strong controls and reliable, repeatable oversight  Provide proof of compliance on demand  Ensure compliance with these safeguards by all staff  Measurable results in weeks  Reduced compliance costs and staffing requirements  Revocations of inappropriate access (avg. 20-30%)  Detection and remediation of policy violations  Elimination of high-risk accounts
  • 25. Q&A