Gary Seay
Former CIO, Community Health Systems
Chris Bowen
Founder, CPSO, ClearDATA
Developing a Cloud Security Roadmap March 2, 2016 Gary Seay Chris - - PowerPoint PPT Presentation
Developing a Cloud Security Roadmap March 2, 2016 Gary Seay Chris Bowen Former CIO, Community Health Systems Founder, CPSO, ClearDATA Conflict of Interest Gary Seay Has no real or apparent conflicts of interest to report. Chris Bowen, MBA,
Former CIO, Community Health Systems
Founder, CPSO, ClearDATA
CB
1 2 3 4
CB
CB
Source: CSO Online http://www.csoonline.com/article/3026661/data-breach/over-113-million-health-records-breached-in-2015-up-10-fold-from-2014.html
Enterprise Wireless VOIP Phone Immersive Telepresence Enterprise Wireless Telemedicine VoIP Conference phone Data Exchange Patient Consent Mobile EMR Access SMB Wireless EMR Integrati
Health Collaboratio n SMB Wireless VOIP Phone EMR Integrati
Telemedicine Enterprise Wireless Telemedicine Remote Radiology Remote Monitoring Enterprise Wireless
Learning Objective: 1
CB
Injury Occurs Patient Transferred to Hospital Ambulance Takes Patient to Clinic Post Procedure Care Preliminary Treatment at Local Clinic
Patient Record Patient Monitoring Care Collaboration Monitorin g System Patient X-ray EMR Patient Consent Patient Management Patient Service s Continuo us Monitori ng Further Tests Patien t Care Telemedicine Med Mgmt Home Monitoring
Learning Objective: 1
CB
Learning Objective: 1
CB
Learning Objective: 1
CB
Source: Verizon 2015 Protected Health Information Data Breach Report
Learning Objective: 1
Lost & Stolen Assets Privilege Misuse Miscellaneous Errors Everything Else Point of Sale Web Applications Crimeware Cyber-Espionage Card Skimmers 807 (45.4%) 361 (20.3%) 357 (20.1%) 119 (6.7%) 68 (3.8%) 33 (1.9%) 25 (1.4%) 6 (0.3 %) 0 (0.0%)
CB
CSO Online - Survey: Average successful hack nets less than $15,000
http://www.csoonline.com/article/3028787/cyber-attacks-espionage/survey-average-successful-hack-nets-less-than-15-000.html
Scott Simkin, senior threat intelligence manager at Palo Alto Networks
Learning Objective: 4
User, Process, Device
Air-tight - properly configured
REDUCE ATTACK SURFACES DEPLOY CRYPTO KEYS CREATE SECURE PEOPLE, PROCESSES & SYSTEMS APPLYING DEFENSE IN DEPTH & BREADTH
JGS
Learning Objective: 4
JGS
Learning Objective: 4
JGS
Learning Objective: 4
JGS
Wireless Access Points, Identity Management
Learning Objective: 4
JGS
Learning Objective: 4
JGS
Learning Objective: 4
JGS
Learning Objective: 4
JGS
Learning Objective: 4
JGS
Year 1 Year 2 Year 3 Year 4 Year 5
Learning Objective: 5
JGS
Learning Objective: 3
Your Responsibility Cloud Provider Responsibility
Compute Storage Database Networking
Regions Availability Zones
Edge Locations
Network Traffic Protection Provided by the Platform Production of Data in Transit Server-side Encryption Provided by the Platform Protection of Data at Rest
JGS
Learning Objective: 3
Your Responsibility Managed Cloud Provider Responsibility
Compute Storage Database Networking
Regions Availability Zones
Edge Locations
Network Traffic Protection Provided by the Platform Production of Data in Transit Server-side Encryption Provided by the Platform Protection of Data at Rest
JGS
Learning Objective: 5
JGS
Learning Objective: 5
CB
Learning Objective: 5
CB
Source: Data Motion Health
CB