SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
It's About the Data, Stupid! Real
               World Mobile Security




www.onlinetech.com   Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL   734.213.2020
Speakers
                     Marie-Michelle Strah, Ph.D., Founder of Phydian Systems
                     Marie-Michelle Strah, Ph.D., is a healthcare enterprise architect in the Washington D.C.
                     area specializing in strategy, information architecture, information security and data
                     architecture for federal and commercial clients. She is the founder of Phydian Systems
                     LLC and an adjunct professor of Healthcare Information Technology at Catholic
                     University of America. She brings more than 15 years of experience in enterprise
                     architecture, healthcare, information technology management, and research and
                     development internationally.

                     April Sage, Marketing Director, Online Tech
                     April Sage has been involved in the IT industry for over two decades, starting in the pre-
                     Windows era as the founder of an IT school teaching DOS, WordPerfect, and FoxPro. In
                     the early 2000s, April founded a bioinformatics company that supported biotech,
                     pharma, and bioinformatic companies in the development of research portals, drug
                     discovery search engines, and other software systems. Since then, April has been
                     involved in the development and implementation of online business plans and
                     marketing strategies across insurance, legal, entertainment, and retail industries until
                     her current position as Marketing Director of Online Tech.




www.onlinetech.com       Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL          734.213.2020
GOALS OF ENTERPRISE
    MOBILITY




•     Building productivity
•     Reducing risk
•     Mobile device encryption
•     Access control
•     Policy vs. technical controls
•     MDM technologies – maturity?
•     Unexpected expenses of data protection
Source: http://www.readwriteweb.com/enterprise/2011/03/consumerization-of-it-95-of-in.php

10/2/2012                                           All content (c) 2012 Phydian Systems LLC. All rights reserved.   3
10/2/2012

Enterprise Mobility and Consumerization of IT




                                                                                         CONCEPTUALIZING “MOBILE HEALTH”
        All content (c) 2012 Phydian Systems LLC. All rights reserved.   4
10/2/2012


It’s NOT about the device…




                                                                                  TWEETING ENTERPRISE MOBILITY
 All content (c) 2012 Phydian Systems LLC. All rights reserved.   5
10/2/2012

                                mHealth: Mobile is enabler…




                                                                                                                 CONCEPTUALIZING “MOBILE HEALTH”
Mobile is enabler…
   • Patients
   • Providers
   • “Wellness lifecycle”
   • Productivity




From “there’s an app for that” to
enterprise information management
lifecycle
     • Content delivery
     • Cloud and thin client
   Source: http://healthpopuli.com/2011/02/15/success-factor-for-
   mobile-health-mash-up-the-development-team/

                                All content (c) 2012 Phydian Systems LLC. All rights reserved.   6
Mobile Health can both:
 • Increase risk
 • Reduce risk
 • Practice size affects risk profile

 Key is:
 • Planning
 • Business Case Analyses
 • Master Data Management




M OBILE H EA LTH : P R IVA C Y A ND S EC UR ITY R IS K S … BEYOND C OM P LIA NCE


      54% of 464 HIPAA breaches affecting 500 or more
      individuals from 9/2001 to July 2012 involved loss or
      theft of unencrypted mobile devices

     Sources:
     http://www.govinfosecurity.com/interviews/onc-plans-mobile-security-guidance-i-1629
     http://pinterest.com/pin/123849058473938431/
10/2/2012                                              All content (c) 2012 Phydian Systems LLC. All rights reserved.   7
•     Conceptualizing “mobile health” – business cases for IT infrastructure
            management
      •     GRC – governance, risk and compliance in a CoIT framework
      •     Best practices for CoIT in healthcare
             • Security Risk Analysis
             • PTA/PIA
             • Stakeholders
             • Policy vs. technical controls
      •     Lessons learned | Considerations for the enterprise




      FIRST QUESTION: WHY BYOD?

10/2/2012                       All content (c) 2012 Phydian Systems LLC. All rights reserved.   8
10/2/2012




                                                                                   BUSINESS CASE ANALYSIS - BYOD
TCO (Total Cost of Ownership)




                                 Why BYOD? Is it actually cheaper?
                                 Are you simply shifting costs?


                                 • License and account
                                   management (telecom)
                                 • Responsive design:
                                   Testing/QA/Usability
                                 • Enforcement: Policies,
                                   standards, training
                                 • Realigning enterprise
                                   architecture for BYOD mobile
                                   environment
                                 • Scaleability



  All content (c) 2012 Phydian Systems LLC. All rights reserved.   9
Managing human factors in mobile data




                                               THE IDEAL
           management




Employees       Contractors       Partners
 Need to know
                              Need to manage




 InfoSec          IT Ops             Legal
Managing human factors in mobile data




                                                     THE REALITY
              management




Employees     IT Ops        Contractors   Partners

   Manage

    Know




                  InfoSec     Legal
THE CHALLENGE
    Adopting Governance and Risk Based Model to
                      BYOD

•   There is no endpoint
•   There is no perimeter
•   Users own the data
•   NoEmployees
        one owns the risk
                   Contractors  Partners
•   Security doesn’t have control
•   IT Ops own the databases
•   IT Ops own the servers
•   IT Ops own the apps
        InfoSec        IT Ops          Legal
GRC FOR HEALTHCARE




     • Governance – organizational and IT
     • Risk – management and mitigation
     • Compliance – HITECH/Meaningful Use/42 CFR




 •    BYOx/CoIT *must* be part of overall GRC strategy
       •   Security Risk Analysis
       •   PTA/PIA
       •   Stakeholders – CPGs, workflow, training
       •   Policy vs. technical controls


10/2/2012                              All content (c) 2012 Phydian Systems LLC. All rights reserved.   13
10/2/2012




                                                                                                                                                  HIGH LEVEL REFERENCE ARCHITECTURE MOBILE HEALTH
Source: http://www.mobilehealthlive.org/publications/discussion-papers/a-high-level-reference-architecture-for-mobile-health/20460/



                                 All content (c) 2012 Phydian Systems LLC. All rights reserved.                           14
10/2/2012




                                                                                                                        MASTER DATA HUB AND EXAMPLES
Case Studies




                                                                  So it’s about the
                                                                    data, and…            … the device, but
                                                                                         not “just” about the
                                                                                                device




  VA looks to establish BYOD mobile device management protocols
  (www.mhimss.org)
  • MDM software
  • Systems, network, apps supported by VA
      • No jailbroken devices
      • Wiping personal devices if compromised
      • Rules of behavior required if storing VA data
      • Personal device can be brought under VA control if needed
                        All content (c) 2012 Phydian Systems LLC. All rights reserved.               15
HEALTHCARE INFORMATION TRANSFORMATION
      Master Data         Enterprise           Then…




                    EIM
MDM




                                        MDM2
      Management          Information          Master
                          Management           Device
                                               Management




                                                      Data-
                                                      centric
                                   Device-            model
                                   (or
                                   hardware)
                    Reactive       centric
                    Posture        model
MINIMUM TECHNICAL REQUIREMENTS
                                 • Policy
                                 • Wireless
          Encryption of
           Data at Rest
                                 • Data segmentation (on premise, cloud,
                                   metadata)
                                 • Customer support (heterogeneity)
                                 • Infection control
   Encryption of                 • MSIRT
  Data in Motion
                                 • Vendor evaluation (the myth of the
                                   “HIPAA Good Housekeeping Seal”)
                                 • Applications: APM and ALM
          Two Factor             • Infrastructure
         Authentication
                                 • Costs




HIPAA Security Rule: Remote Use
http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf
QUESTIONS?




10/2/2012    All content (c) 2012 Phydian Systems LLC. All rights reserved.   18
Upcoming Events                                                                      Contact Info
 SecureWorld Expo                                                                    Marie-Michelle Strah
                                                                                      @cyberslate
       Detroit, MI, October 3rd & 4th
                                                                                      http://www.linkedin.com/in/drstrah
                                                                                      mstrah@phydiansystems.com
                                                                                      www.phydiansystems.com
 Midwest HIMSS
       Des Moines, IA, November 11th-13th
                                                                                      April Sage
                                                                                      asage@onlinetech.com
 mHealth Summit                                                                      www.onlinetech.com
       Washington, DC, December 3rd-5th                                              Main: 734-213-2020


 HIMSS 2013
       New Orleans, March 3rd-7th 2013, Booth # 1369




 www.onlinetech.com       Copyright 2012 Online Tech. All rights reserved.   CONFIDENTIAL               734.213.2020

Más contenido relacionado

La actualidad más candente

What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data GovLoop
 
Cloud Computing & Its Impact on Project Management
Cloud Computing & Its Impact on Project ManagementCloud Computing & Its Impact on Project Management
Cloud Computing & Its Impact on Project ManagementVSR *
 
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Booz Allen Hamilton
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Cloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the OptionsCloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the Optionsarms8586
 
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis DellIDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dellarms8586
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCSCJournals
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bwBridgetteWilliams15
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityInnoTech
 
Big Data Public Private Forum (BIG) @ European Data Forum 2013
Big Data Public Private Forum (BIG) @ European Data Forum 2013Big Data Public Private Forum (BIG) @ European Data Forum 2013
Big Data Public Private Forum (BIG) @ European Data Forum 2013Edward Curry
 
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedPreparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedThe Economist Media Businesses
 
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTechnology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTELKOMNIKA JOURNAL
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET Journal
 

La actualidad más candente (20)

J3602068071
J3602068071J3602068071
J3602068071
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
 
Cloud Computing & Its Impact on Project Management
Cloud Computing & Its Impact on Project ManagementCloud Computing & Its Impact on Project Management
Cloud Computing & Its Impact on Project Management
 
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...Cloud Computing Security: Government Acquisition Considerations for the Cloud...
Cloud Computing Security: Government Acquisition Considerations for the Cloud...
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Cloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the OptionsCloud Computing in the Midmarket: Assessing the Options
Cloud Computing in the Midmarket: Assessing the Options
 
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis DellIDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
IDC MarketScape Worldwide Scale-Out File-Based Storage 2012 Vendor Analysis Dell
 
Cloud Computing Security Issues and Challenges
Cloud Computing Security Issues and ChallengesCloud Computing Security Issues and Challenges
Cloud Computing Security Issues and Challenges
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
Emerging techonology presentation bw
Emerging techonology presentation bwEmerging techonology presentation bw
Emerging techonology presentation bw
 
Cloud risk management
Cloud risk managementCloud risk management
Cloud risk management
 
Protecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud SecurityProtecting What Matters...An Enterprise Approach to Cloud Security
Protecting What Matters...An Enterprise Approach to Cloud Security
 
Big Data Public Private Forum (BIG) @ European Data Forum 2013
Big Data Public Private Forum (BIG) @ European Data Forum 2013Big Data Public Private Forum (BIG) @ European Data Forum 2013
Big Data Public Private Forum (BIG) @ European Data Forum 2013
 
Preparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights sharedPreparing for next-generation cloud: Lessons learned and insights shared
Preparing for next-generation cloud: Lessons learned and insights shared
 
Accenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po VAccenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po V
 
Technology organization environment framework in cloud computing
Technology organization environment framework in cloud computingTechnology organization environment framework in cloud computing
Technology organization environment framework in cloud computing
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
B018211016
B018211016B018211016
B018211016
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
IRJET- Authentication and Access Control for Cloud Computing Comparing Proble...
 

Similar a It's About the Data, Stupid: Mobile Security and BYOD for Healthcare

HCL Technologies: The CIO Handbook (Edition 4)
HCL Technologies: The CIO Handbook (Edition 4)HCL Technologies: The CIO Handbook (Edition 4)
HCL Technologies: The CIO Handbook (Edition 4)HCL Technologies
 
Data Curation: Retooling the Existing Workforce
Data Curation: Retooling the Existing WorkforceData Curation: Retooling the Existing Workforce
Data Curation: Retooling the Existing WorkforceSteven Miller
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesFrontRange
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace RisksParag Deodhar
 
Six steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceSix steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceInka Traktman
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
When Worlds Collide: Intelligence, Analytics and Operations
When Worlds Collide: Intelligence, Analytics and OperationsWhen Worlds Collide: Intelligence, Analytics and Operations
When Worlds Collide: Intelligence, Analytics and OperationsInside Analysis
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primend
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessChris Silva
 
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...Altimeter, a Prophet Company
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for EmployeesLeo de Sousa
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5techsuda
 
The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionCorey O'Neal
 
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Hitachi Data Systems France
 

Similar a It's About the Data, Stupid: Mobile Security and BYOD for Healthcare (20)

The CIO Handbook
The CIO HandbookThe CIO Handbook
The CIO Handbook
 
HCL Technologies: The CIO Handbook (Edition 4)
HCL Technologies: The CIO Handbook (Edition 4)HCL Technologies: The CIO Handbook (Edition 4)
HCL Technologies: The CIO Handbook (Edition 4)
 
The value of our data
The value of our dataThe value of our data
The value of our data
 
Data Curation: Retooling the Existing Workforce
Data Curation: Retooling the Existing WorkforceData Curation: Retooling the Existing Workforce
Data Curation: Retooling the Existing Workforce
 
Rising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging TechnologiesRising Above the Tide of Emerging Technologies
Rising Above the Tide of Emerging Technologies
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Six steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforceSix steps to survive and thrive with a mobile workforce
Six steps to survive and thrive with a mobile workforce
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
When Worlds Collide: Intelligence, Analytics and Operations
When Worlds Collide: Intelligence, Analytics and OperationsWhen Worlds Collide: Intelligence, Analytics and Operations
When Worlds Collide: Intelligence, Analytics and Operations
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Altimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile BusinessAltimeter Group: Building A Foundation For Mobile Business
Altimeter Group: Building A Foundation For Mobile Business
 
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
[Webinar] Setting the Stage for Mobile Business, with Chris Silva and Charlen...
 
BYOD for Employees
BYOD for EmployeesBYOD for Employees
BYOD for Employees
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5
 
The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing Disruption
 
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
Vision et Stratégie d'Hitachi Data Systems Randy DEMONT, Executive Vice Presi...
 

Más de Marie-Michelle Strah, PhD

Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
Consumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityConsumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityMarie-Michelle Strah, PhD
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareSecurity and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareMarie-Michelle Strah, PhD
 
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...Marie-Michelle Strah, PhD
 
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...Marie-Michelle Strah, PhD
 
Relational Productivity Applications: SharePoint 2010 and CRM 2011
Relational Productivity Applications: SharePoint 2010 and CRM 2011Relational Productivity Applications: SharePoint 2010 and CRM 2011
Relational Productivity Applications: SharePoint 2010 and CRM 2011Marie-Michelle Strah, PhD
 
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2Marie-Michelle Strah, PhD
 
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...Marie-Michelle Strah, PhD
 
Best Practices in Supply Chain Management: SharePoint
Best Practices in Supply Chain Management: SharePointBest Practices in Supply Chain Management: SharePoint
Best Practices in Supply Chain Management: SharePointMarie-Michelle Strah, PhD
 
Best Practices in SharePoint for Healthcare: US Army Medical Command
Best Practices in SharePoint for Healthcare: US Army Medical CommandBest Practices in SharePoint for Healthcare: US Army Medical Command
Best Practices in SharePoint for Healthcare: US Army Medical CommandMarie-Michelle Strah, PhD
 
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Microsoft Technologies and Work Management Success and Women in SharePoint: D...Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Microsoft Technologies and Work Management Success and Women in SharePoint: D...Marie-Michelle Strah, PhD
 
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...Marie-Michelle Strah, PhD
 
Business Process Re-Engineering and Improved Healthcare Outcomes
Business Process Re-Engineering and Improved Healthcare OutcomesBusiness Process Re-Engineering and Improved Healthcare Outcomes
Business Process Re-Engineering and Improved Healthcare OutcomesMarie-Michelle Strah, PhD
 
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 UpdateTricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 UpdateMarie-Michelle Strah, PhD
 
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Tricky Fit: Knowledge Management and SharePoint (Healthcare)Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Tricky Fit: Knowledge Management and SharePoint (Healthcare)Marie-Michelle Strah, PhD
 

Más de Marie-Michelle Strah, PhD (18)

Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Consumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and SecurityConsumerization of IT: Mobile Infrastructure, Support and Security
Consumerization of IT: Mobile Infrastructure, Support and Security
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareSecurity and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: Healthcare
 
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
 
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
 
Relational Productivity Applications: SharePoint 2010 and CRM 2011
Relational Productivity Applications: SharePoint 2010 and CRM 2011Relational Productivity Applications: SharePoint 2010 and CRM 2011
Relational Productivity Applications: SharePoint 2010 and CRM 2011
 
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
 
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
 
Best Practices in Supply Chain Management: SharePoint
Best Practices in Supply Chain Management: SharePointBest Practices in Supply Chain Management: SharePoint
Best Practices in Supply Chain Management: SharePoint
 
Best Practices in SharePoint for Healthcare: US Army Medical Command
Best Practices in SharePoint for Healthcare: US Army Medical CommandBest Practices in SharePoint for Healthcare: US Army Medical Command
Best Practices in SharePoint for Healthcare: US Army Medical Command
 
Case Study for a SharePoint SDLC
Case Study for a SharePoint SDLCCase Study for a SharePoint SDLC
Case Study for a SharePoint SDLC
 
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Microsoft Technologies and Work Management Success and Women in SharePoint: D...Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
 
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
 
Business Process Re-Engineering and Improved Healthcare Outcomes
Business Process Re-Engineering and Improved Healthcare OutcomesBusiness Process Re-Engineering and Improved Healthcare Outcomes
Business Process Re-Engineering and Improved Healthcare Outcomes
 
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 UpdateTricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
 
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Tricky Fit: Knowledge Management and SharePoint (Healthcare)Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
 

It's About the Data, Stupid: Mobile Security and BYOD for Healthcare

  • 1. It's About the Data, Stupid! Real World Mobile Security www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 2. Speakers Marie-Michelle Strah, Ph.D., Founder of Phydian Systems Marie-Michelle Strah, Ph.D., is a healthcare enterprise architect in the Washington D.C. area specializing in strategy, information architecture, information security and data architecture for federal and commercial clients. She is the founder of Phydian Systems LLC and an adjunct professor of Healthcare Information Technology at Catholic University of America. She brings more than 15 years of experience in enterprise architecture, healthcare, information technology management, and research and development internationally. April Sage, Marketing Director, Online Tech April Sage has been involved in the IT industry for over two decades, starting in the pre- Windows era as the founder of an IT school teaching DOS, WordPerfect, and FoxPro. In the early 2000s, April founded a bioinformatics company that supported biotech, pharma, and bioinformatic companies in the development of research portals, drug discovery search engines, and other software systems. Since then, April has been involved in the development and implementation of online business plans and marketing strategies across insurance, legal, entertainment, and retail industries until her current position as Marketing Director of Online Tech. www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020
  • 3. GOALS OF ENTERPRISE MOBILITY • Building productivity • Reducing risk • Mobile device encryption • Access control • Policy vs. technical controls • MDM technologies – maturity? • Unexpected expenses of data protection Source: http://www.readwriteweb.com/enterprise/2011/03/consumerization-of-it-95-of-in.php 10/2/2012 All content (c) 2012 Phydian Systems LLC. All rights reserved. 3
  • 4. 10/2/2012 Enterprise Mobility and Consumerization of IT CONCEPTUALIZING “MOBILE HEALTH” All content (c) 2012 Phydian Systems LLC. All rights reserved. 4
  • 5. 10/2/2012 It’s NOT about the device… TWEETING ENTERPRISE MOBILITY All content (c) 2012 Phydian Systems LLC. All rights reserved. 5
  • 6. 10/2/2012 mHealth: Mobile is enabler… CONCEPTUALIZING “MOBILE HEALTH” Mobile is enabler… • Patients • Providers • “Wellness lifecycle” • Productivity From “there’s an app for that” to enterprise information management lifecycle • Content delivery • Cloud and thin client Source: http://healthpopuli.com/2011/02/15/success-factor-for- mobile-health-mash-up-the-development-team/ All content (c) 2012 Phydian Systems LLC. All rights reserved. 6
  • 7. Mobile Health can both: • Increase risk • Reduce risk • Practice size affects risk profile Key is: • Planning • Business Case Analyses • Master Data Management M OBILE H EA LTH : P R IVA C Y A ND S EC UR ITY R IS K S … BEYOND C OM P LIA NCE 54% of 464 HIPAA breaches affecting 500 or more individuals from 9/2001 to July 2012 involved loss or theft of unencrypted mobile devices Sources: http://www.govinfosecurity.com/interviews/onc-plans-mobile-security-guidance-i-1629 http://pinterest.com/pin/123849058473938431/ 10/2/2012 All content (c) 2012 Phydian Systems LLC. All rights reserved. 7
  • 8. Conceptualizing “mobile health” – business cases for IT infrastructure management • GRC – governance, risk and compliance in a CoIT framework • Best practices for CoIT in healthcare • Security Risk Analysis • PTA/PIA • Stakeholders • Policy vs. technical controls • Lessons learned | Considerations for the enterprise FIRST QUESTION: WHY BYOD? 10/2/2012 All content (c) 2012 Phydian Systems LLC. All rights reserved. 8
  • 9. 10/2/2012 BUSINESS CASE ANALYSIS - BYOD TCO (Total Cost of Ownership) Why BYOD? Is it actually cheaper? Are you simply shifting costs? • License and account management (telecom) • Responsive design: Testing/QA/Usability • Enforcement: Policies, standards, training • Realigning enterprise architecture for BYOD mobile environment • Scaleability All content (c) 2012 Phydian Systems LLC. All rights reserved. 9
  • 10. Managing human factors in mobile data THE IDEAL management Employees Contractors Partners Need to know Need to manage InfoSec IT Ops Legal
  • 11. Managing human factors in mobile data THE REALITY management Employees IT Ops Contractors Partners Manage Know InfoSec Legal
  • 12. THE CHALLENGE Adopting Governance and Risk Based Model to BYOD • There is no endpoint • There is no perimeter • Users own the data • NoEmployees one owns the risk Contractors Partners • Security doesn’t have control • IT Ops own the databases • IT Ops own the servers • IT Ops own the apps InfoSec IT Ops Legal
  • 13. GRC FOR HEALTHCARE • Governance – organizational and IT • Risk – management and mitigation • Compliance – HITECH/Meaningful Use/42 CFR • BYOx/CoIT *must* be part of overall GRC strategy • Security Risk Analysis • PTA/PIA • Stakeholders – CPGs, workflow, training • Policy vs. technical controls 10/2/2012 All content (c) 2012 Phydian Systems LLC. All rights reserved. 13
  • 14. 10/2/2012 HIGH LEVEL REFERENCE ARCHITECTURE MOBILE HEALTH Source: http://www.mobilehealthlive.org/publications/discussion-papers/a-high-level-reference-architecture-for-mobile-health/20460/ All content (c) 2012 Phydian Systems LLC. All rights reserved. 14
  • 15. 10/2/2012 MASTER DATA HUB AND EXAMPLES Case Studies So it’s about the data, and… … the device, but not “just” about the device VA looks to establish BYOD mobile device management protocols (www.mhimss.org) • MDM software • Systems, network, apps supported by VA • No jailbroken devices • Wiping personal devices if compromised • Rules of behavior required if storing VA data • Personal device can be brought under VA control if needed All content (c) 2012 Phydian Systems LLC. All rights reserved. 15
  • 16. HEALTHCARE INFORMATION TRANSFORMATION Master Data Enterprise Then… EIM MDM MDM2 Management Information Master Management Device Management Data- centric Device- model (or hardware) Reactive centric Posture model
  • 17. MINIMUM TECHNICAL REQUIREMENTS • Policy • Wireless Encryption of Data at Rest • Data segmentation (on premise, cloud, metadata) • Customer support (heterogeneity) • Infection control Encryption of • MSIRT Data in Motion • Vendor evaluation (the myth of the “HIPAA Good Housekeeping Seal”) • Applications: APM and ALM Two Factor • Infrastructure Authentication • Costs HIPAA Security Rule: Remote Use http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf
  • 18. QUESTIONS? 10/2/2012 All content (c) 2012 Phydian Systems LLC. All rights reserved. 18
  • 19. Upcoming Events Contact Info  SecureWorld Expo Marie-Michelle Strah @cyberslate  Detroit, MI, October 3rd & 4th http://www.linkedin.com/in/drstrah mstrah@phydiansystems.com www.phydiansystems.com  Midwest HIMSS  Des Moines, IA, November 11th-13th April Sage asage@onlinetech.com  mHealth Summit www.onlinetech.com  Washington, DC, December 3rd-5th Main: 734-213-2020  HIMSS 2013  New Orleans, March 3rd-7th 2013, Booth # 1369 www.onlinetech.com Copyright 2012 Online Tech. All rights reserved. CONFIDENTIAL 734.213.2020