Unified SaaS Solution for Cybersecurity and Risk
Curran Data Technologies – 317-974-1009 www.currandata.com
Unified SaaS Solution for Cybersecurity and Risk Curran Data - - PowerPoint PPT Presentation
Unified SaaS Solution for Cybersecurity and Risk Curran Data Technologies 317-974-1009 www.currandata.com Solution Discover the effective simplicity of a unified RSC solution Discover Solution Diagnose Assess RSC Gaps Cure
Unified SaaS Solution for Cybersecurity and Risk
Curran Data Technologies – 317-974-1009 www.currandata.com
Solution
Solution
Cloud-SaaS based Comprehensive Risk, Security and Compliance Management Platform. Unified and Integrated. Expert systems driven with Big Data Analytics
Diagnose
Assess RSC Gaps
Cure
Wizard driven RSC remediation
Protect
Continuous monitoring
Solution Portfolio
Assesses risk, prioritize and remediate exposures with continuous monitoring Discovers security threats and vulnerabilities, prioritizes and remediate exposures followed by continuous monitoring Provides an integrated and harmonized control set to assess compliance issues, prioritize gaps and remediate through policies, procedures and implementation guidance Continuous monitoring of contractual compliance and risk exposure of BA-Vendors / Employees / Contractors. Automated monitoring of sanctions / exclusions / licensure / credentials
Aegify Integrity Manager
Minimizing the Risks Of Third Parties and Employees
Avoiding costly fines with real-time monitoring solutions
Healthcare Organizations Have Compliance Requirements Under Health & Human Services
Office of Inspector General (OIG)
not sanctioned or excluded from working with federal or state programs. Doing so can come with huge fines.
Office for Civil Rights (OCR)
have proper security and risk assessment programs in place to monitor any third party handling PHI data. Failure to do so can result in huge fines.OIG and OCR compliance requirements
THE DOUBLE WHAMMY
Enforcement Efforts by Both OIG and OCR Continue to Ramp Up
“In 2015 over $3 Billion in investigative and audit receivables was collected by OIG-sanctions and exclusion violations” “Breaches in the healthcare industry total an exorbitant $ 6.2 billion annually, with the average cost of a single data breach across all industries now $ 4 million.“ - OCR continues to ramp up enforcement Source: 2016 Cost of a Data Breach Study: Global Analysis from IBM and Ponemon Institute
OIG Civil Monetary Penalties - examples
Exclusions/Sanctions Monitoring CE: Alternative Consulting Enterprises, Inc. (ACE), PA Date: 12/22/2016 Event: After it self-disclosed conduct to OIG, ACE, agreed to pay $126,102.38 for allegedly violating Civil Monetary Penalties Law. OIG alleged that ACE employed an individual that it knew or should have known was excluded from participation in Federal health care programs. Penalty: $ 126,102.38 Licenses / Credentials Monitoring CE: Planned Parenthood Health System Inc., NC Date: 06/24/2016 Event: After it self-disclosed conduct to OIG, Planned Parenthood agreed to pay $1,572,752.80 for potentially violating the Civil Monetary Penalites
claims to Medicaid programs in North Carolina, South Carolina, Virginia and West Virginia that included the following billing errors:
number different that the medical professional who provided the service
practitioners who were not properly enrolled in their state Medicaid Program Penalty: $ 1,572,752.80 Exclusions / Sanctions Monitoring CE: Antelope Valley Hospital (AVH), CA Date: 11./30/2016 Event: After it self-disclosed conduct to OIG, AVH agreed to pay $ 190,087.90 for allegedly violating the Civil Monetary Penalties Law. OIG alleged that AVH employed an individual that it knew or should have known was excluded from participation in Federal healthcare programs. Penalty: $ 190,087.90
OCR Wall of Shame- examples
Vendor Risk CE: Dr. Q. Pain and Spine d/b/a Arkansas Spine and Pain Affected Individuals: 17,100 Event: A virus or malware was potentially installed on the information systems of Bizmatics
CE, Arkansas Spine and Pain (CE). Approx. 17,100 individuals' electronic medical records were compromised, but the BA and CE were unable to determine whose records or what information, if nay, was accessed. OCR obtained a copy of the BA agreement in place between the CE and this BA. This review has been addressed by a separate review of the BA. Penalty: $ 4 Million HIPAA Violation | ePHI Breach CE: Advocate Medical Group Affected Individuals: 4 Million Event: Failed to conduct an accurate and thorough assessment of the potential risks and vulnerabilities to all of its ePHI;
and facility access controls to limit physical access to the electronic information systems housed within a large data support center
form of a written business associate contract that its business associate would appropriately safeguard all ePHI in its possession
unencrypted laptop when left in an unlocked vehicle overnight Fines: $ 5.55 Million HIPAA Violation / PHI Breach CE: North Memorial Affected Individuals: 9,497 Event: Approx. 9,497 patient health records were compromised by Accretive Health Inc., a business associate of the covered entity. Accretive Health was given access to a hospital database containing the ePHI of 289,94
covered entities must obtain a signed BAA from any vendor that provides functions, activities or services for or on behalf of a covered entity that requires access to patient ePHI. Penalty: $ 1.55 Million
Risk Approaches
compliant as the covered entity! Yes and No
verify
them.
Limited Strategies Seen Today
another doing vendor risk management. No uniformity)
labor processes
certification status for all BA’s/Vendors
Results of Current Strategies
verifying the integrity of business associates, contract workers, employees
Integrity Manager – Key Features
Contract Workers
vendors and employees with one comprehensive solution
exposure from fines and penalties at the click of a mouse
Integrity Manager Business Benefits
interface
reports
with a web-based exceptions based dashboard = makes it easy to identify an issue and take immediate action
and fast deployment
comprehensive automated workflow to manage all exclusions and sanctions
maintaining regulatory compliance
Why Choose Integrity Manager?
background checking.
the excluded lists
accessed anywhere at anytime by multiple staff members
take immediate action remedy
Easy Access to Federal and State Databases and Exclusions Lists
. …….. ……..
Data Loading and Data Synchronization processes are custom for each data source and will vary based on source update frequency, approach and content format Source Staging Source History Data Loading Data Synchronization OFAC LEIE NY NJ SAM
Source 1 History Source 2 History Source n History
Consolidated Source Database
Sanctions/Exclusions License / Credentials Master Database
Manual / review is done on duplicate groups and merger policies fine-tuned to automate the process.
Deduplication algorithms are run on the Consolidated Source Database
RE Matching ServicesQuery the Master DB Matching Entity / Individual Consolidated Source Database will have all the records from all the data sources. Unique record for every Individual / Entity.
Integrity Manager Automated Process
State-wise Exclusions
Source Data Preparation and Maintenance
Manage-by-Exception Dashboard
Practitioner Credentials DB Practitioner License DB
R S C MANAGE ME NT
Actionable Analytics
RSC– With and Without Aegify
PROVIDER WITHOUT AEGIFY RSC
and oversight
PROVIDER WITH AEGIFY RSC
single pane view
effective risk analysis using an unified control set
DIAGNOSE I CURE I PROTECT
Key Differentiators Today, Aegify is the only Comprehensive Cybersecurity vendor in the Healthcare marketplace that uniquely provides:
– A framework for enterprise-wide RSC unification with a unified console – A cloud-based remote deployment of security scanning and management – Automated and efficient oversight of all BA-Vendors – A harmonized regulatory control set with mappings to security threats and vulnerabilities – Automated asset discovery and management with role based access control – History of all organizational vulnerabilities and threats with remediation – Demonstration of “reasonable efforts” for legal defense
Selected as the only “Innovative Technology Provider” for Cybersecurity by Vizient
Unified SaaS Solution for Cybersecurity and Risk
Curran Data Technologies – 317-974-1009 www.currandata.com