SlideShare a Scribd company logo
The challenge of ensuring secure
clinics and hospitals for patients
and staff
17 September 2015
What’s your emergency?
Critical issues for hospitals and
medical centres
 Workplace violence
 Budget/funding
 Technology
integration and
management
 Active shooter
 Staffing and training
 Patient behavioural
health and violence
 Asset protection/theft
ASIS: The 2014 Security 500 Sector Reports
Top security concerns
Guardian 8 Survey
8%
10%
12%
16%
17%
19%
24%
56%
57%
OSHA fines
Employee retention
High incidence of fatalities
Lack of
accountability/documentat…
Administrators'
understanding of regulations
Legal fees/repercussions
Disruptions to patient care
Office safety
Patient safety
Increasing crime and violence
Health Facilities Management/ASHE 2012 Hospital Security Survey
0%
0%
1%
1%
3%
3%
8%
9%
10%
11%
12%
17%
17%
18%
21%
25%
26%
33%
79%
80%
78%
78%
74%
79%
77%
78%
74%
75%
77%
70%
75%
64%
68%
68%
68%
60%
21%
20%
21%
21%
23%
18%
15%
13%
16%
14%
11%
13%
8%
18%
11%
7%
6%
7%
Infant abduction - actual
Infant abduction - attempted
Shootings in hospital and on grounds, excl. ED
Shootings in ED
Bomb threats
Staff-on-staff violence
Other thefts (major - more than $500/item)
Patient care equipment thefts
Pharmaceutical and supply thefts
IT equipment thefts
Domestic incidents involving employees
Other thefts (minor - $500 or less/item)
Elopements/patient wandering
Auto thefts/car break-ins
Property damage/vandalism
Attacks/assaults
Patient/family violence against staff in hospital, excl. ED
Patient/family violence against staff in ED
Change in frequency of incidents
Increase About the same Decrease
A unique balancing act
A paradox
 Patients
 Employees
 Visitors
 Vendors
 Infant units
 Paediatric units
 Pharmacy
 Psychiatric units
A fine balance
Privacy vs Security
Challenges
Patient safety
 Patient elopement,
especially high-risk patients
 Patients need access to
reliable emergency call
systems
 Paediatric patients need to be
protected from abduction and
patient flight
 Patients who may be a danger
to themselves or others
Infant protection
 Potential infant
abduction
 Infant care outside the
mother’s room
 Mother/infant
mismatching
Patient information security
Verizon 2015 Data Breach Investigations Report
0,1%
3,1%
3,3%
8,1%
9,4%
10,6%
18,0%
18,8%
28,5%
Denial of service
attacks
Payment card
skimmers
Physical theft and
loss
Miscellaneous
errors
Web app attacks
Insider and
privilege misuse
Cyber espionage
Crime ware
Point of sale
intrusions
Almost all cyber attacks can be
classified by 9 patterns
32% 26% 16%Healthcare
Miscellaneous errors Insider misuse Physical theft / loss
Typical cyber attack incidents for
healthcare
of the incidents in an industry can be described by just
three of the nine patterns.
PHYSICAL THEFT / LOSS
Any incident where an
information asset went
missing, whether through
misplacement or malice.
INSIDER AND PRIVILEGE MISUSE
This is mainly by insider’s misuse,
but outsiders (due to collusion) and
partners (because they are granted
privileges) show up as well.
Potential culprits come from every
level of the business, from the
frontline to the boardroom.
MISCELLANEOUS ERRORS
Incidents where unintentional
actions directly compromised
a security attribute of an
information asset. This does
not include lost devices,
which is grouped with theft
instead.
Verizon 2015 Data Breach Investigations Report
ON AVERAGE
76%
Cyber attacks are physical
of insider and
privilege misuse
attacks used the
corporate LAN.
of theft / loss
happened at
work.
of miscellaneous
errors involved
printed
documents.
Verizon 2014 & 2015 Data Breach Investigations Report
85%
49%
55%
Look inside your company
PWC Global State of Information Security Survey 2015
0% 5% 10% 15% 20% 25% 30% 35% 40%
Unknown
Domestic intelligence service
Foreign nation-states
Competitors
Activists / activist organisations / hacktivist
Organised crime
Hackers
Suppliers / business partners
Former service providers / consultants / contractors
Current service providers / consultants / contractors
Former employees
Current employees
Likely sources of incidents
All industries in all regions Healthcare
Screening and vetting is business
critical
PWC Global State of Information Security Survey 2015
0% 10% 20% 30% 40% 50% 60% 70% 80%
Conduct personnel background checks
Require 3rd parties to comply with our privacy policies
Employee security awareness training programme
Priviledged user access
Secure access-control measures
Accurate inventory of where personal data for
employees and customers are collected, transmitted…
Employee Chief Information Security Officer in charge
of security
Information security strategy that is aligned to the
specific needs of the business
Security safeguards in place
All industries in all regions Healthcare
Staff safety
 Workplace violence
 Even though you know that workplace
violence occurs more frequently in
certain departments—including ED,
mental health, geriatrics, and substance
abuse—it’s very difficult to predict and
prevent staff duress
 Staff duress during emergency
situations
 High turnover, low morale in certain
departments particularly the ED
due to with frequent staff duress
 Staff members get injured, injury
claims push up costs and overtime
needed to cover absent caregivers’
shifts
Workplace violence
Occurrences Perpetrators
30%
18%
10%
4%
1%
One type Two types Three
types
Four types Five types
27%
15%
31%
14%
4% 4% 4%
Number of different types of violence experienced
per respondent
Susan Steinman; Workplace Violence in the Health Sector; Country Case Study: South Africa (ILO, ICN, WHO, PSI)
Pharmacy inventory management
 Little or no inventory visibility
causing overstocking to
compensate
 Increased risk to patient safety due
to product expiration or
unavailability
 Inefficient manual processes
 Complex payment structures and
regulations
 Data disconnection between
inventory costs and procedural
measures
8 to 10% of items expire annually in procedure rooms and
as much as 15% of critical assets are lost
Stanley Healthcare
Healthcare asset tracking and
management
 Productivity losses due to manual
processes to manage capital and rental
equipment
 “Squirrel stores” due to equipment
availability
 Having a hard time locating needed
equipment, health systems end up
purchasing or renting more than they
actually need
 Patient dissatisfaction due to waiting for
equipment when staff have difficulty
locating it
40% of nurses report spending up to one hour per shift
searching for equipment
Stanley Healthcare
Solutions
Top hospital security systems
being implemented
Health Facilities Management/ASHE 2012 Hospital Security Survey
12%
14%
16%
12%
20%
18%
27%
38%
25%
50%
41%
52%
72%
67%
76%
69%
71%
88%
5%
6%
4%
14%
7%
13%
14%
11%
26%
10%
21%
17%
7%
14%
10%
18%
19%
8%
Man traps
Metal detectors
Outsourced remote video surveillance and monitoring
Wireless RFID clinician badges with panic alert buttons
Biometrics
Video analytics capabilities
Physical security information management (PSIM)
Wireless panic alarm system
RFID for tracking equipment, supplies, medications,…
Patient elopement system
Visitor management system
Electronic lockdown from a central location
Wired panic alarm systems
Integrated security system
Vendor management system
Mass notification system for emergency preparedness
Digital IP-video surveillance system
Electronic access control
Already implemented Plan to implement in the next 24 months
Conduct a Hospital Security
Assessment
 Analyses existing
 Protocols,
 Policies, and
 Procedures
 Evaluates physical
security
 Vulnerabilities, and
 Threats
Develop a Hospital Security
Management Plan
 Develop and implement
protocols, policies, and
procedures
 Hazard surveillance
program
 Identify trends from
monitored data
 Maintain, evaluate and
improve system
 Ensure regulatory
compliance
 Employ reputable security
organisation
Is there a doctor in the house?
 Patient
management
 Patient flow
 Safety
 Asset
management
 Inventory
management
 Environmental
monitoring
Real-time locating system (RTLS)
Beyond basic security technology
 Enhance with video
analytics
 Integrate intrusion
detection, access
control, and video
surveillance
 Add RTLS
 Environmental monitoring
 Asset management
 Enterprise Systems
Integration
Beyond basic security technology
 Enhance with video
analytics
 Integrate intrusion
detection, access
control, and video
surveillance
 Add RTLS
 Environmental monitoring
 Asset management
 Enterprise Systems
Integration
Beyond basic security technology
 Enhance with video
analytics
 Integrate intrusion
detection, access
control, and video
surveillance
 Add RTLS
 Environmental monitoring
 Asset management
 Enterprise Systems
Integration
A single integrated system
Outsource non-core services
 Cleaning
 Maintenance
 Catering
 Fleet management
 Stores management
 Document storage
The payoff
Benefits to you
 Reduction in operational costs such as administration and
maintenance
 Lower capital expenditures due to flexibility of single integrated
system to accommodate add-on security components
 Single system also keeps training costs lower
 Decreased losses and lower associated operational costs
 Improved business continuity via a more robust, resilient, and
responsive operation
 Greater end-to-end transparency for improved process
management and efficiency
 Independent study showed that for single integrated system
 24% saving in installation cost for 13500m2 building
 33% reduction in training
 82% reduction in IT administration
 32% reduction in cost of changes, upgrades and additions
Strategic ICT Consulting, Teng & Associates
Thank you
Danie Schoeman
Commercial Director
+27 10 001 4500
danie.schoeman@za.g4s.com

More Related Content

What's hot

Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?
Mark Merrill
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Compliancy Group
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
Donald E. Hester
 
Nebosh Revision Mnemonics
Nebosh Revision   MnemonicsNebosh Revision   Mnemonics
Nebosh Revision Mnemonics
Percoco H & S
 
171713161 953dfggggg36579-nebosh-igc1-revision (4)
171713161 953dfggggg36579-nebosh-igc1-revision (4)171713161 953dfggggg36579-nebosh-igc1-revision (4)
171713161 953dfggggg36579-nebosh-igc1-revision (4)pmbeng
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
ecarrow
 
Transforming Health Care Delivery through System Integration of the Resurrect...
Transforming Health Care Delivery through System Integration of the Resurrect...Transforming Health Care Delivery through System Integration of the Resurrect...
Transforming Health Care Delivery through System Integration of the Resurrect...
Resurrection Health Care
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
AISHA232980
 
Managing Risks in Document Preservation and E-Discovery
Managing Risks in Document Preservation and E-DiscoveryManaging Risks in Document Preservation and E-Discovery
Managing Risks in Document Preservation and E-Discovery
Seth Row
 
Unit ia book part 2
Unit ia book part 2Unit ia book part 2
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving ComplianceWEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
KSM Consulting
 
A Report on The Internet of Things
A Report on The Internet of ThingsA Report on The Internet of Things
A Report on The Internet of Things
Pulse Q&A
 
Nebosh international certificate distance learning
Nebosh international certificate distance learningNebosh international certificate distance learning
Nebosh international certificate distance learning
دكتور تامر عبدالله شراكى
 
Information Security Risk Management in Biomedical Equipment
Information Security Risk Management in Biomedical EquipmentInformation Security Risk Management in Biomedical Equipment
Information Security Risk Management in Biomedical Equipment
Bart Hubbs
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of securityciso_insights
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rssupportc2go
 
Patient safety thinking differently
Patient safety   thinking differentlyPatient safety   thinking differently
Patient safety thinking differently
Frances Healey
 
Pistoia Alliance Debates: Clinical trials and wearables, 21st Jan 2016
Pistoia Alliance Debates: Clinical trials and wearables, 21st Jan 2016Pistoia Alliance Debates: Clinical trials and wearables, 21st Jan 2016
Pistoia Alliance Debates: Clinical trials and wearables, 21st Jan 2016
Pistoia Alliance
 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbiz
shailu devi
 
Medical Device Security: State of the Art -- NoConName, Barcelona, 2011
Medical Device Security:  State of the Art -- NoConName, Barcelona, 2011 Medical Device Security:  State of the Art -- NoConName, Barcelona, 2011
Medical Device Security: State of the Art -- NoConName, Barcelona, 2011
shawn_merdinger
 

What's hot (20)

Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?
 
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...Business Associates: How to become HIPAA compliant, increase revenue, and gai...
Business Associates: How to become HIPAA compliant, increase revenue, and gai...
 
Information Systems Security Review 2004
Information Systems Security Review 2004Information Systems Security Review 2004
Information Systems Security Review 2004
 
Nebosh Revision Mnemonics
Nebosh Revision   MnemonicsNebosh Revision   Mnemonics
Nebosh Revision Mnemonics
 
171713161 953dfggggg36579-nebosh-igc1-revision (4)
171713161 953dfggggg36579-nebosh-igc1-revision (4)171713161 953dfggggg36579-nebosh-igc1-revision (4)
171713161 953dfggggg36579-nebosh-igc1-revision (4)
 
It Audit Expectations High Detail
It Audit Expectations   High DetailIt Audit Expectations   High Detail
It Audit Expectations High Detail
 
Transforming Health Care Delivery through System Integration of the Resurrect...
Transforming Health Care Delivery through System Integration of the Resurrect...Transforming Health Care Delivery through System Integration of the Resurrect...
Transforming Health Care Delivery through System Integration of the Resurrect...
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Managing Risks in Document Preservation and E-Discovery
Managing Risks in Document Preservation and E-DiscoveryManaging Risks in Document Preservation and E-Discovery
Managing Risks in Document Preservation and E-Discovery
 
Unit ia book part 2
Unit ia book part 2Unit ia book part 2
Unit ia book part 2
 
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving ComplianceWEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
WEBINAR: HIPAA 101: Five Steps Toward Achieving Compliance
 
A Report on The Internet of Things
A Report on The Internet of ThingsA Report on The Internet of Things
A Report on The Internet of Things
 
Nebosh international certificate distance learning
Nebosh international certificate distance learningNebosh international certificate distance learning
Nebosh international certificate distance learning
 
Information Security Risk Management in Biomedical Equipment
Information Security Risk Management in Biomedical EquipmentInformation Security Risk Management in Biomedical Equipment
Information Security Risk Management in Biomedical Equipment
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Hi paa and eh rs
Hi paa and eh rsHi paa and eh rs
Hi paa and eh rs
 
Patient safety thinking differently
Patient safety   thinking differentlyPatient safety   thinking differently
Patient safety thinking differently
 
Pistoia Alliance Debates: Clinical trials and wearables, 21st Jan 2016
Pistoia Alliance Debates: Clinical trials and wearables, 21st Jan 2016Pistoia Alliance Debates: Clinical trials and wearables, 21st Jan 2016
Pistoia Alliance Debates: Clinical trials and wearables, 21st Jan 2016
 
Ecfirstbiz
EcfirstbizEcfirstbiz
Ecfirstbiz
 
Medical Device Security: State of the Art -- NoConName, Barcelona, 2011
Medical Device Security:  State of the Art -- NoConName, Barcelona, 2011 Medical Device Security:  State of the Art -- NoConName, Barcelona, 2011
Medical Device Security: State of the Art -- NoConName, Barcelona, 2011
 

Viewers also liked

Funder requirements for Data Management Plans
Funder requirements for Data Management PlansFunder requirements for Data Management Plans
Funder requirements for Data Management PlansSherry Lake
 
Writing a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPToolWriting a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPTool
kfear
 
Challenge on Academic Advising: Selected Submissions
Challenge on Academic Advising: Selected SubmissionsChallenge on Academic Advising: Selected Submissions
Challenge on Academic Advising: Selected SubmissionsDiana Woolis
 
Creating a Data Management Plan
Creating a Data Management PlanCreating a Data Management Plan
Introduction to research data management
Introduction to research data managementIntroduction to research data management
Introduction to research data managementrds-wayne-edu
 
Introduction to Research Data Management - 2015-02-09 - MPLS Division, Univer...
Introduction to Research Data Management - 2015-02-09 - MPLS Division, Univer...Introduction to Research Data Management - 2015-02-09 - MPLS Division, Univer...
Introduction to Research Data Management - 2015-02-09 - MPLS Division, Univer...
Research Support Team, IT Services, University of Oxford
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
ICPSR
 
Data Management Planning for Researchers - An Introduction - 2015-02-18 - Un...
Data Management Planning for Researchers -  An Introduction - 2015-02-18 - Un...Data Management Planning for Researchers -  An Introduction - 2015-02-18 - Un...
Data Management Planning for Researchers - An Introduction - 2015-02-18 - Un...
Research Support Team, IT Services, University of Oxford
 
Data management plan template
Data management plan templateData management plan template
Data management plan template501 Commons
 
Data management plans and planning - a gentle introduction
Data management plans and planning - a gentle introductionData management plans and planning - a gentle introduction
Data management plans and planning - a gentle introduction
Martin Donnelly
 
Introduction to Data Management Planning
Introduction to Data Management PlanningIntroduction to Data Management Planning
Introduction to Data Management Planning
Sarah Jones
 
Data management plans (DMPs)- 16 Feb 2017
Data management plans (DMPs)- 16 Feb 2017 Data management plans (DMPs)- 16 Feb 2017
Data management plans (DMPs)- 16 Feb 2017
ARDC
 
Developing a Data Management Plan
Developing a Data Management PlanDeveloping a Data Management Plan
Developing a Data Management Plan
Martin Donnelly
 
5 Reasons Why Healthcare Data is Unique and Difficult to Measure
5 Reasons Why Healthcare Data is Unique and Difficult to Measure5 Reasons Why Healthcare Data is Unique and Difficult to Measure
5 Reasons Why Healthcare Data is Unique and Difficult to Measure
Health Catalyst
 
EUDAT & OpenAIRE Webinar: How to write a Data Management Plan - July 7, 2016|...
EUDAT & OpenAIRE Webinar: How to write a Data Management Plan - July 7, 2016|...EUDAT & OpenAIRE Webinar: How to write a Data Management Plan - July 7, 2016|...
EUDAT & OpenAIRE Webinar: How to write a Data Management Plan - July 7, 2016|...
EUDAT
 

Viewers also liked (15)

Funder requirements for Data Management Plans
Funder requirements for Data Management PlansFunder requirements for Data Management Plans
Funder requirements for Data Management Plans
 
Writing a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPToolWriting a successful data management plan with the DMPTool
Writing a successful data management plan with the DMPTool
 
Challenge on Academic Advising: Selected Submissions
Challenge on Academic Advising: Selected SubmissionsChallenge on Academic Advising: Selected Submissions
Challenge on Academic Advising: Selected Submissions
 
Creating a Data Management Plan
Creating a Data Management PlanCreating a Data Management Plan
Creating a Data Management Plan
 
Introduction to research data management
Introduction to research data managementIntroduction to research data management
Introduction to research data management
 
Introduction to Research Data Management - 2015-02-09 - MPLS Division, Univer...
Introduction to Research Data Management - 2015-02-09 - MPLS Division, Univer...Introduction to Research Data Management - 2015-02-09 - MPLS Division, Univer...
Introduction to Research Data Management - 2015-02-09 - MPLS Division, Univer...
 
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...Meeting Federal Research Requirements for Data Management Plans, Public Acces...
Meeting Federal Research Requirements for Data Management Plans, Public Acces...
 
Data Management Planning for Researchers - An Introduction - 2015-02-18 - Un...
Data Management Planning for Researchers -  An Introduction - 2015-02-18 - Un...Data Management Planning for Researchers -  An Introduction - 2015-02-18 - Un...
Data Management Planning for Researchers - An Introduction - 2015-02-18 - Un...
 
Data management plan template
Data management plan templateData management plan template
Data management plan template
 
Data management plans and planning - a gentle introduction
Data management plans and planning - a gentle introductionData management plans and planning - a gentle introduction
Data management plans and planning - a gentle introduction
 
Introduction to Data Management Planning
Introduction to Data Management PlanningIntroduction to Data Management Planning
Introduction to Data Management Planning
 
Data management plans (DMPs)- 16 Feb 2017
Data management plans (DMPs)- 16 Feb 2017 Data management plans (DMPs)- 16 Feb 2017
Data management plans (DMPs)- 16 Feb 2017
 
Developing a Data Management Plan
Developing a Data Management PlanDeveloping a Data Management Plan
Developing a Data Management Plan
 
5 Reasons Why Healthcare Data is Unique and Difficult to Measure
5 Reasons Why Healthcare Data is Unique and Difficult to Measure5 Reasons Why Healthcare Data is Unique and Difficult to Measure
5 Reasons Why Healthcare Data is Unique and Difficult to Measure
 
EUDAT & OpenAIRE Webinar: How to write a Data Management Plan - July 7, 2016|...
EUDAT & OpenAIRE Webinar: How to write a Data Management Plan - July 7, 2016|...EUDAT & OpenAIRE Webinar: How to write a Data Management Plan - July 7, 2016|...
EUDAT & OpenAIRE Webinar: How to write a Data Management Plan - July 7, 2016|...
 

Similar to The challenge of ensuring secure clinics and hospitals for patients and staff

Taking the Physician's Pulse on Cybersecurity
Taking the Physician's Pulse on CybersecurityTaking the Physician's Pulse on Cybersecurity
Taking the Physician's Pulse on Cybersecurity
accenture
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Synopsys Software Integrity Group
 
Nexthink for Health Care
Nexthink for Health CareNexthink for Health Care
Nexthink for Health Care
Brock Spradling
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksRachel Hamilton
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
John Reno
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
TrustArc
 
Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808
baratta44
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Novell
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
Frank Siepmann
 
National Association of Healthcare Access Management Presentation
National Association of Healthcare Access Management PresentationNational Association of Healthcare Access Management Presentation
National Association of Healthcare Access Management Presentation
mikemike09
 
Transforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically DrivenTransforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically Driven
Veeva Systems
 
Nexthink Healthcare Overview
Nexthink Healthcare OverviewNexthink Healthcare Overview
Nexthink Healthcare OverviewBrock Spradling
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
elvinchan
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
CynergisTek, Inc.
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
Health IT Conference – iHT2
 
FEI Brisbane Lunch: Cybersecurity and the CFO
FEI Brisbane Lunch: Cybersecurity and the CFOFEI Brisbane Lunch: Cybersecurity and the CFO
FEI Brisbane Lunch: Cybersecurity and the CFO
Kate Mills
 
Supply Chain Security
Supply Chain SecuritySupply Chain Security
Supply Chain Securityguest031790
 
Patient Safety Incident Reporting Functionality Reduces Barriers and Improves...
Patient Safety Incident Reporting Functionality Reduces Barriers and Improves...Patient Safety Incident Reporting Functionality Reduces Barriers and Improves...
Patient Safety Incident Reporting Functionality Reduces Barriers and Improves...
Health Catalyst
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk Management
KeySys Health
 

Similar to The challenge of ensuring secure clinics and hospitals for patients and staff (20)

Taking the Physician's Pulse on Cybersecurity
Taking the Physician's Pulse on CybersecurityTaking the Physician's Pulse on Cybersecurity
Taking the Physician's Pulse on Cybersecurity
 
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
Webinar: Medical Device Security: An Industry Under Attack and Unprepared to ...
 
Nexthink for Health Care
Nexthink for Health CareNexthink for Health Care
Nexthink for Health Care
 
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption RisksLeading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
Leading Compliance Monitoring Activities to Assess Fraud and Corruption Risks
 
Healthcare It Security Risk 0310
Healthcare It Security Risk 0310Healthcare It Security Risk 0310
Healthcare It Security Risk 0310
 
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
How Good Privacy Practices can help prepare for a Data Breach from TRUSTe
 
Sia Presentation100808
Sia Presentation100808Sia Presentation100808
Sia Presentation100808
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
National Association of Healthcare Access Management Presentation
National Association of Healthcare Access Management PresentationNational Association of Healthcare Access Management Presentation
National Association of Healthcare Access Management Presentation
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Transforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically DrivenTransforming Pharmacovigilance from Operational to Scientifically Driven
Transforming Pharmacovigilance from Operational to Scientifically Driven
 
Nexthink Healthcare Overview
Nexthink Healthcare OverviewNexthink Healthcare Overview
Nexthink Healthcare Overview
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
CAPP Conference Survey
CAPP Conference SurveyCAPP Conference Survey
CAPP Conference Survey
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
FEI Brisbane Lunch: Cybersecurity and the CFO
FEI Brisbane Lunch: Cybersecurity and the CFOFEI Brisbane Lunch: Cybersecurity and the CFO
FEI Brisbane Lunch: Cybersecurity and the CFO
 
Supply Chain Security
Supply Chain SecuritySupply Chain Security
Supply Chain Security
 
Patient Safety Incident Reporting Functionality Reduces Barriers and Improves...
Patient Safety Incident Reporting Functionality Reduces Barriers and Improves...Patient Safety Incident Reporting Functionality Reduces Barriers and Improves...
Patient Safety Incident Reporting Functionality Reduces Barriers and Improves...
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk Management
 

More from Danie Schoeman

SAPICS 2016 DSchoeman Ver2.3 Final lin
SAPICS 2016 DSchoeman Ver2.3 Final linSAPICS 2016 DSchoeman Ver2.3 Final lin
SAPICS 2016 DSchoeman Ver2.3 Final linDanie Schoeman
 
Vicenda DPF2016 DSC Ver1.3 Distribute lin
Vicenda DPF2016 DSC Ver1.3 Distribute linVicenda DPF2016 DSC Ver1.3 Distribute lin
Vicenda DPF2016 DSC Ver1.3 Distribute linDanie Schoeman
 
Fruit Logistica 2016 Logistics Hub Session 10 lin
Fruit Logistica 2016 Logistics Hub Session 10 linFruit Logistica 2016 Logistics Hub Session 10 lin
Fruit Logistica 2016 Logistics Hub Session 10 linDanie Schoeman
 
Fruit Logistica 2016 Logistics Hub Session 4 lin
Fruit Logistica 2016 Logistics Hub Session 4 linFruit Logistica 2016 Logistics Hub Session 4 lin
Fruit Logistica 2016 Logistics Hub Session 4 linDanie Schoeman
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 linDanie Schoeman
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 linDanie Schoeman
 
Logistics security 201505 lin
Logistics security 201505 linLogistics security 201505 lin
Logistics security 201505 linDanie Schoeman
 
Securex South Africa 2015 lin
Securex South Africa 2015 linSecurex South Africa 2015 lin
Securex South Africa 2015 linDanie Schoeman
 
Cash Handling Show 2015 lin
Cash Handling Show 2015 linCash Handling Show 2015 lin
Cash Handling Show 2015 linDanie Schoeman
 
Cool Logistics 2013 lin
Cool Logistics 2013 linCool Logistics 2013 lin
Cool Logistics 2013 linDanie Schoeman
 
Cool Logistics 2012 lin
Cool Logistics 2012 linCool Logistics 2012 lin
Cool Logistics 2012 linDanie Schoeman
 
Vicenda Summit 201407 lin
Vicenda Summit 201407 linVicenda Summit 201407 lin
Vicenda Summit 201407 linDanie Schoeman
 
How to Develop Resilient Supply Chains For The African Consumer Market
How to Develop Resilient Supply Chains For The African Consumer MarketHow to Develop Resilient Supply Chains For The African Consumer Market
How to Develop Resilient Supply Chains For The African Consumer Market
Danie Schoeman
 
The Cost of Cost-cutting
The Cost of Cost-cuttingThe Cost of Cost-cutting
The Cost of Cost-cutting
Danie Schoeman
 

More from Danie Schoeman (20)

SAPICS 2016 DSchoeman Ver2.3 Final lin
SAPICS 2016 DSchoeman Ver2.3 Final linSAPICS 2016 DSchoeman Ver2.3 Final lin
SAPICS 2016 DSchoeman Ver2.3 Final lin
 
Vicenda DPF2016 DSC Ver1.3 Distribute lin
Vicenda DPF2016 DSC Ver1.3 Distribute linVicenda DPF2016 DSC Ver1.3 Distribute lin
Vicenda DPF2016 DSC Ver1.3 Distribute lin
 
Fruit Logistica 2016 Logistics Hub Session 10 lin
Fruit Logistica 2016 Logistics Hub Session 10 linFruit Logistica 2016 Logistics Hub Session 10 lin
Fruit Logistica 2016 Logistics Hub Session 10 lin
 
Fruit Logistica 2016 Logistics Hub Session 4 lin
Fruit Logistica 2016 Logistics Hub Session 4 linFruit Logistica 2016 Logistics Hub Session 4 lin
Fruit Logistica 2016 Logistics Hub Session 4 lin
 
Transport Forum 201511 lin
Transport Forum 201511 linTransport Forum 201511 lin
Transport Forum 201511 lin
 
Transport Security 201507 lin
Transport Security 201507 linTransport Security 201507 lin
Transport Security 201507 lin
 
Logistics security 201505 lin
Logistics security 201505 linLogistics security 201505 lin
Logistics security 201505 lin
 
Securex South Africa 2015 lin
Securex South Africa 2015 linSecurex South Africa 2015 lin
Securex South Africa 2015 lin
 
Cash Handling Show 2015 lin
Cash Handling Show 2015 linCash Handling Show 2015 lin
Cash Handling Show 2015 lin
 
Vicenda 20091119 lin
Vicenda 20091119 linVicenda 20091119 lin
Vicenda 20091119 lin
 
Vicenda 20070725 lin
Vicenda 20070725 linVicenda 20070725 lin
Vicenda 20070725 lin
 
Cool Logistics 2013 lin
Cool Logistics 2013 linCool Logistics 2013 lin
Cool Logistics 2013 lin
 
Eurofruit SH 2012 lin
Eurofruit SH 2012 linEurofruit SH 2012 lin
Eurofruit SH 2012 lin
 
Allfresh 2012 lin
Allfresh 2012 linAllfresh 2012 lin
Allfresh 2012 lin
 
Cool Logistics 2012 lin
Cool Logistics 2012 linCool Logistics 2012 lin
Cool Logistics 2012 lin
 
ACI 20140807 lin
ACI 20140807 linACI 20140807 lin
ACI 20140807 lin
 
Vicenda Summit 201407 lin
Vicenda Summit 201407 linVicenda Summit 201407 lin
Vicenda Summit 201407 lin
 
Sapics 2014 lin
Sapics 2014 linSapics 2014 lin
Sapics 2014 lin
 
How to Develop Resilient Supply Chains For The African Consumer Market
How to Develop Resilient Supply Chains For The African Consumer MarketHow to Develop Resilient Supply Chains For The African Consumer Market
How to Develop Resilient Supply Chains For The African Consumer Market
 
The Cost of Cost-cutting
The Cost of Cost-cuttingThe Cost of Cost-cutting
The Cost of Cost-cutting
 

Recently uploaded

Artificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyArtificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular Therapy
Iris Thiele Isip-Tan
 
💘Ludhiana ℂall Girls 📞]][89011★83002][[ 📱 ❤ESCORTS service in Ludhiana💃💦Ludhi...
💘Ludhiana ℂall Girls 📞]][89011★83002][[ 📱 ❤ESCORTS service in Ludhiana💃💦Ludhi...💘Ludhiana ℂall Girls 📞]][89011★83002][[ 📱 ❤ESCORTS service in Ludhiana💃💦Ludhi...
💘Ludhiana ℂall Girls 📞]][89011★83002][[ 📱 ❤ESCORTS service in Ludhiana💃💦Ludhi...
ranishasharma67
 
QA Paediatric dentistry department, Hospital Melaka 2020
QA Paediatric dentistry department, Hospital Melaka 2020QA Paediatric dentistry department, Hospital Melaka 2020
QA Paediatric dentistry department, Hospital Melaka 2020
Azreen Aj
 
Immunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentationImmunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentation
BeshedaWedajo
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cell
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
rajkumar669520
 
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
ranishasharma67
 
The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........
TheDocs
 
Navigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondNavigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and Beyond
Aboud Health Group
 
A Community health , health for prisoners
A Community health  , health for prisonersA Community health  , health for prisoners
A Community health , health for prisoners
Ahmed Elmi
 
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
o6ov5dqmf
 
Antibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptxAntibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptx
AnushriSrivastav
 
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
ILC- UK
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
The Harvest Clinic
 
CHAPTER 1 SEMESTER V PREVENTIVE-PEDIATRICS.pdf
CHAPTER 1 SEMESTER V PREVENTIVE-PEDIATRICS.pdfCHAPTER 1 SEMESTER V PREVENTIVE-PEDIATRICS.pdf
CHAPTER 1 SEMESTER V PREVENTIVE-PEDIATRICS.pdf
Sachin Sharma
 
ABDOMINAL COMPARTMENT SYSNDROME
ABDOMINAL COMPARTMENT SYSNDROMEABDOMINAL COMPARTMENT SYSNDROME
ABDOMINAL COMPARTMENT SYSNDROME
Rommel Luis III Israel
 
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdfNavigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Enterprise Wired
 
the IUA Administrative Board and General Assembly meeting
the IUA Administrative Board and General Assembly meetingthe IUA Administrative Board and General Assembly meeting
the IUA Administrative Board and General Assembly meeting
ssuser787e5c1
 
Dimensions of Healthcare Quality
Dimensions of Healthcare QualityDimensions of Healthcare Quality
Dimensions of Healthcare Quality
Naeemshahzad51
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Guillermo Rivera
 

Recently uploaded (20)

Artificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular TherapyArtificial Intelligence to Optimize Cardiovascular Therapy
Artificial Intelligence to Optimize Cardiovascular Therapy
 
💘Ludhiana ℂall Girls 📞]][89011★83002][[ 📱 ❤ESCORTS service in Ludhiana💃💦Ludhi...
💘Ludhiana ℂall Girls 📞]][89011★83002][[ 📱 ❤ESCORTS service in Ludhiana💃💦Ludhi...💘Ludhiana ℂall Girls 📞]][89011★83002][[ 📱 ❤ESCORTS service in Ludhiana💃💦Ludhi...
💘Ludhiana ℂall Girls 📞]][89011★83002][[ 📱 ❤ESCORTS service in Ludhiana💃💦Ludhi...
 
QA Paediatric dentistry department, Hospital Melaka 2020
QA Paediatric dentistry department, Hospital Melaka 2020QA Paediatric dentistry department, Hospital Melaka 2020
QA Paediatric dentistry department, Hospital Melaka 2020
 
Immunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentationImmunity to Veterinary parasitic infections power point presentation
Immunity to Veterinary parasitic infections power point presentation
 
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptxR3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
R3 Stem Cells and Kidney Repair A New Horizon in Nephrology.pptx
 
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
VVIP Dehradun Girls 9719300533 Heat-bake { Dehradun } Genteel ℂall Serviℂe By...
 
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
Haridwar ❤CALL Girls 🔝 89011★83002 🔝 ❤ℂall Girls IN Haridwar ESCORT SERVICE❤
 
The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........The Docs PPG - 30.05.2024.pptx..........
The Docs PPG - 30.05.2024.pptx..........
 
Navigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and BeyondNavigating Women's Health: Understanding Prenatal Care and Beyond
Navigating Women's Health: Understanding Prenatal Care and Beyond
 
A Community health , health for prisoners
A Community health  , health for prisonersA Community health  , health for prisoners
A Community health , health for prisoners
 
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
一比一原版纽约大学毕业证(NYU毕业证)成绩单留信认证
 
Antibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptxAntibiotic Stewardship by Anushri Srivastava.pptx
Antibiotic Stewardship by Anushri Srivastava.pptx
 
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
Global launch of the Healthy Ageing and Prevention Index 2nd wave – alongside...
 
Telehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptxTelehealth Psychology Building Trust with Clients.pptx
Telehealth Psychology Building Trust with Clients.pptx
 
CHAPTER 1 SEMESTER V PREVENTIVE-PEDIATRICS.pdf
CHAPTER 1 SEMESTER V PREVENTIVE-PEDIATRICS.pdfCHAPTER 1 SEMESTER V PREVENTIVE-PEDIATRICS.pdf
CHAPTER 1 SEMESTER V PREVENTIVE-PEDIATRICS.pdf
 
ABDOMINAL COMPARTMENT SYSNDROME
ABDOMINAL COMPARTMENT SYSNDROMEABDOMINAL COMPARTMENT SYSNDROME
ABDOMINAL COMPARTMENT SYSNDROME
 
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdfNavigating the Health Insurance Market_ Understanding Trends and Options.pdf
Navigating the Health Insurance Market_ Understanding Trends and Options.pdf
 
the IUA Administrative Board and General Assembly meeting
the IUA Administrative Board and General Assembly meetingthe IUA Administrative Board and General Assembly meeting
the IUA Administrative Board and General Assembly meeting
 
Dimensions of Healthcare Quality
Dimensions of Healthcare QualityDimensions of Healthcare Quality
Dimensions of Healthcare Quality
 
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
Navigating Challenges: Mental Health, Legislation, and the Prison System in B...
 

The challenge of ensuring secure clinics and hospitals for patients and staff

  • 1. The challenge of ensuring secure clinics and hospitals for patients and staff 17 September 2015
  • 3. Critical issues for hospitals and medical centres  Workplace violence  Budget/funding  Technology integration and management  Active shooter  Staffing and training  Patient behavioural health and violence  Asset protection/theft ASIS: The 2014 Security 500 Sector Reports
  • 4. Top security concerns Guardian 8 Survey 8% 10% 12% 16% 17% 19% 24% 56% 57% OSHA fines Employee retention High incidence of fatalities Lack of accountability/documentat… Administrators' understanding of regulations Legal fees/repercussions Disruptions to patient care Office safety Patient safety
  • 5. Increasing crime and violence Health Facilities Management/ASHE 2012 Hospital Security Survey 0% 0% 1% 1% 3% 3% 8% 9% 10% 11% 12% 17% 17% 18% 21% 25% 26% 33% 79% 80% 78% 78% 74% 79% 77% 78% 74% 75% 77% 70% 75% 64% 68% 68% 68% 60% 21% 20% 21% 21% 23% 18% 15% 13% 16% 14% 11% 13% 8% 18% 11% 7% 6% 7% Infant abduction - actual Infant abduction - attempted Shootings in hospital and on grounds, excl. ED Shootings in ED Bomb threats Staff-on-staff violence Other thefts (major - more than $500/item) Patient care equipment thefts Pharmaceutical and supply thefts IT equipment thefts Domestic incidents involving employees Other thefts (minor - $500 or less/item) Elopements/patient wandering Auto thefts/car break-ins Property damage/vandalism Attacks/assaults Patient/family violence against staff in hospital, excl. ED Patient/family violence against staff in ED Change in frequency of incidents Increase About the same Decrease
  • 7. A paradox  Patients  Employees  Visitors  Vendors  Infant units  Paediatric units  Pharmacy  Psychiatric units
  • 10. Patient safety  Patient elopement, especially high-risk patients  Patients need access to reliable emergency call systems  Paediatric patients need to be protected from abduction and patient flight  Patients who may be a danger to themselves or others
  • 11. Infant protection  Potential infant abduction  Infant care outside the mother’s room  Mother/infant mismatching
  • 12. Patient information security Verizon 2015 Data Breach Investigations Report 0,1% 3,1% 3,3% 8,1% 9,4% 10,6% 18,0% 18,8% 28,5% Denial of service attacks Payment card skimmers Physical theft and loss Miscellaneous errors Web app attacks Insider and privilege misuse Cyber espionage Crime ware Point of sale intrusions Almost all cyber attacks can be classified by 9 patterns
  • 13. 32% 26% 16%Healthcare Miscellaneous errors Insider misuse Physical theft / loss Typical cyber attack incidents for healthcare of the incidents in an industry can be described by just three of the nine patterns. PHYSICAL THEFT / LOSS Any incident where an information asset went missing, whether through misplacement or malice. INSIDER AND PRIVILEGE MISUSE This is mainly by insider’s misuse, but outsiders (due to collusion) and partners (because they are granted privileges) show up as well. Potential culprits come from every level of the business, from the frontline to the boardroom. MISCELLANEOUS ERRORS Incidents where unintentional actions directly compromised a security attribute of an information asset. This does not include lost devices, which is grouped with theft instead. Verizon 2015 Data Breach Investigations Report ON AVERAGE 76%
  • 14. Cyber attacks are physical of insider and privilege misuse attacks used the corporate LAN. of theft / loss happened at work. of miscellaneous errors involved printed documents. Verizon 2014 & 2015 Data Breach Investigations Report 85% 49% 55%
  • 15. Look inside your company PWC Global State of Information Security Survey 2015 0% 5% 10% 15% 20% 25% 30% 35% 40% Unknown Domestic intelligence service Foreign nation-states Competitors Activists / activist organisations / hacktivist Organised crime Hackers Suppliers / business partners Former service providers / consultants / contractors Current service providers / consultants / contractors Former employees Current employees Likely sources of incidents All industries in all regions Healthcare
  • 16. Screening and vetting is business critical PWC Global State of Information Security Survey 2015 0% 10% 20% 30% 40% 50% 60% 70% 80% Conduct personnel background checks Require 3rd parties to comply with our privacy policies Employee security awareness training programme Priviledged user access Secure access-control measures Accurate inventory of where personal data for employees and customers are collected, transmitted… Employee Chief Information Security Officer in charge of security Information security strategy that is aligned to the specific needs of the business Security safeguards in place All industries in all regions Healthcare
  • 17. Staff safety  Workplace violence  Even though you know that workplace violence occurs more frequently in certain departments—including ED, mental health, geriatrics, and substance abuse—it’s very difficult to predict and prevent staff duress  Staff duress during emergency situations  High turnover, low morale in certain departments particularly the ED due to with frequent staff duress  Staff members get injured, injury claims push up costs and overtime needed to cover absent caregivers’ shifts
  • 18. Workplace violence Occurrences Perpetrators 30% 18% 10% 4% 1% One type Two types Three types Four types Five types 27% 15% 31% 14% 4% 4% 4% Number of different types of violence experienced per respondent Susan Steinman; Workplace Violence in the Health Sector; Country Case Study: South Africa (ILO, ICN, WHO, PSI)
  • 19. Pharmacy inventory management  Little or no inventory visibility causing overstocking to compensate  Increased risk to patient safety due to product expiration or unavailability  Inefficient manual processes  Complex payment structures and regulations  Data disconnection between inventory costs and procedural measures 8 to 10% of items expire annually in procedure rooms and as much as 15% of critical assets are lost Stanley Healthcare
  • 20. Healthcare asset tracking and management  Productivity losses due to manual processes to manage capital and rental equipment  “Squirrel stores” due to equipment availability  Having a hard time locating needed equipment, health systems end up purchasing or renting more than they actually need  Patient dissatisfaction due to waiting for equipment when staff have difficulty locating it 40% of nurses report spending up to one hour per shift searching for equipment Stanley Healthcare
  • 22. Top hospital security systems being implemented Health Facilities Management/ASHE 2012 Hospital Security Survey 12% 14% 16% 12% 20% 18% 27% 38% 25% 50% 41% 52% 72% 67% 76% 69% 71% 88% 5% 6% 4% 14% 7% 13% 14% 11% 26% 10% 21% 17% 7% 14% 10% 18% 19% 8% Man traps Metal detectors Outsourced remote video surveillance and monitoring Wireless RFID clinician badges with panic alert buttons Biometrics Video analytics capabilities Physical security information management (PSIM) Wireless panic alarm system RFID for tracking equipment, supplies, medications,… Patient elopement system Visitor management system Electronic lockdown from a central location Wired panic alarm systems Integrated security system Vendor management system Mass notification system for emergency preparedness Digital IP-video surveillance system Electronic access control Already implemented Plan to implement in the next 24 months
  • 23. Conduct a Hospital Security Assessment  Analyses existing  Protocols,  Policies, and  Procedures  Evaluates physical security  Vulnerabilities, and  Threats
  • 24. Develop a Hospital Security Management Plan  Develop and implement protocols, policies, and procedures  Hazard surveillance program  Identify trends from monitored data  Maintain, evaluate and improve system  Ensure regulatory compliance  Employ reputable security organisation
  • 25. Is there a doctor in the house?  Patient management  Patient flow  Safety  Asset management  Inventory management  Environmental monitoring Real-time locating system (RTLS)
  • 26. Beyond basic security technology  Enhance with video analytics  Integrate intrusion detection, access control, and video surveillance  Add RTLS  Environmental monitoring  Asset management  Enterprise Systems Integration
  • 27. Beyond basic security technology  Enhance with video analytics  Integrate intrusion detection, access control, and video surveillance  Add RTLS  Environmental monitoring  Asset management  Enterprise Systems Integration
  • 28. Beyond basic security technology  Enhance with video analytics  Integrate intrusion detection, access control, and video surveillance  Add RTLS  Environmental monitoring  Asset management  Enterprise Systems Integration
  • 30. Outsource non-core services  Cleaning  Maintenance  Catering  Fleet management  Stores management  Document storage
  • 32. Benefits to you  Reduction in operational costs such as administration and maintenance  Lower capital expenditures due to flexibility of single integrated system to accommodate add-on security components  Single system also keeps training costs lower  Decreased losses and lower associated operational costs  Improved business continuity via a more robust, resilient, and responsive operation  Greater end-to-end transparency for improved process management and efficiency  Independent study showed that for single integrated system  24% saving in installation cost for 13500m2 building  33% reduction in training  82% reduction in IT administration  32% reduction in cost of changes, upgrades and additions Strategic ICT Consulting, Teng & Associates
  • 34. Danie Schoeman Commercial Director +27 10 001 4500 danie.schoeman@za.g4s.com