SlideShare una empresa de Scribd logo
1 de 21
SUCCESSFULLY CREATING AN IT SERVICE
Agenda
 Introduction
 Mercy Health (Who we are)
 Organizational/Operational Challenges
 Business Case and Implementation Methodology
 Present and Future
 Questions
9/6/2018 2
Introduction
Dieu Tran – Executive Director, IT Business Risk Services and Analytics
(Mercy Health)
 Designations – CISA, CISSP, GSNA, CRISC, CRMA, GISF, PCI-ISA
Jody Howard – Manager PCI Compliance (Mercy Health)
 Senior IT Architect
9/6/2018 3
Who we are
 5th Largest Catholic Healthcare System in the US Mercy Health (Who we are)
 ~$5.5 Billion in Annual Revenue
 30 acute care hospitals
 11 Specialty Hospitals (Heart, Children's, Rehab and Ortho)
 Virtual Care center
 Over 800 Clinics Physician Practices and Outpatient Facilities
 Operates in seven-state area encompassing Missouri, Arkansas, Oklahoma,
Kansas, Louisiana, Mississippi and Texas
 ~44,000 co-workers and over 2,100 physicians
9/6/2018 4
Challenges
Organizational
◦ Establishing compliance culture – history of audit findings
◦ Leadership (External Audit)
◦ Security Concerns
◦ Complex and Challenging Technical Environment
◦ Staffing
Operational Challenges
◦ IT burdened with ad hoc data requests
◦ Data Integrity, Incomplete data, duplicate requests
◦ Difficult to review results and ensure consistency
◦ Unclear process
◦ Unclear accountability
Change
◦ New/changing regulatory and compliance requirements (External Auditors, PCI,
and HIPAA Security/Privacy)
◦ Governance
9/6/2018 5
Business Case and Implementation Approach
Business Case
Savings (time and money)
Successful audit and compliance efforts
Reporting to support controls in place
Governance of controls
 Implementation Approach
 Prioritize
 Engage owners early
 Define reporting needs
 Training
9/6/2018 6
IT Service Management ITIL Components
9/6/2018 7
People
Process
Technology
Process
Change Management Process
◦ Reinvigorated need for approvals prior to modifications
◦ Clarified definition of a “change”
Governance
◦ Senior Management review and approval for each change to monitoring
profile once in production
◦ Clear communication on additional volume of work created
◦ Opportunity to focus on groups that were less compliant
Monitoring rules
◦ Accepted Tripwire as a recognized expert and used the published rules as often as possible (OS,
database …)
◦ Avoided historic pitfalls of internal debates to merits of monitoring critical items
9/6/2018 8
People
Policy created to support effort
◦ Initially Change Management
◦ Added PCI compliance as Tripwire became viewed as critical success factor
Meetings with technical teams
◦ Often “selling” effort one person at a time
◦ Open and honest discussions
◦ Focus on real purpose of monitoring
Auditing
◦ Remediation notes
◦ Change orders
◦ Matching criteria
9/6/2018 9
Technology
Integration into ITSM Tool
◦ Used to validate approved change orders
◦ Remediation becomes component of daily routine obligations
◦ Change detection, File integrity monitoring and Vulnerability Notifications
Rule Tuning
◦ Focus on most critical elements leveraging data analytics
◦ Often used features to identify “normal” activity limited to a specific account
to reduce volume of alerts
Reporting
◦ Reporting to application owners during rule development phase
◦ Reporting attached to each incident showing the details of modifications
◦ Reporting to Governance group for volume of activity
◦ Reporting to internal auditors to demonstrate good faith effort and help focus auditing efforts
9/6/2018 10
Present and Future
 Present
 Tripwire Enterprise change detection viewed as a key strategy for SOC, PCI and commercialization
efforts
 Expansion from Change Detection to also include File Integrity Monitoring and Threat Detection
 Visibility and monitoring for Epic Financial data
 Better visibility and governance around change management
 Reliable IT Environment around financial reporting
 Reporting to support controls in place
 Future
 Using for other regulatory compliance needs
 Security Configuration Management
9/6/2018 11
Tripwire Solutions For Healthcare Challenges
Onyeka Jones, Product Manager, Healthcare Solutions
13
#1: Secure PHI
Detection and alerts on all changes
to established baseline—
what, who, and business context
Detect unauthorized changes on
critical assets and EHR systems
Extensive library of security
configuration best-practices to
establish and monitor configurations
Assess configurations
against security policies
Discover assets, vulnerabilities and malicious
changes, and help automate the workflow
and process of remediation
Identify risk on critical assets and
EHR systems
End-to-end visibility: discovery, inventory, and
change data for all your critical assets and
EHR systems
Know what’s happening in your environment
14
#2: Achieve Compliance
Out-of-the-box audit report templates,
and automated compliance reporting
Reduce the time spent on compliance
Continuous monitoring and reporting
identifies remediation to stay compliant
Maintain compliance over time
Industry’s most comprehensive library
of policy tests for all major standards
Demonstrate compliance with standards
HIPAA, PCI, NIST and many more
Logging of changes to in-scope assets with
details on who and when
Produce data for audits and for forensics
15
#3: Address the Skills Gap
Integrity monitoring and change
audit to find root cause
Ensure system availability and
speed up investigation
Integration with ITSM to tell authorized from
unauthorized changes
Validate changes and reduce unplanned work
Real-time change detection—
what, who, when and what it means
Control changes that compromise systems
Automate manual processes associated with
dealing with change—isolate and escalate
changes and events of interest
Deal with security data overload
Tripwire Capabilities
17
Log
Management
Configuration
Assessment
Change
Detection
Policy
ManagementVulnerability
Assessment
Asset
Discovery
Centralized
Operations
Reporting &
Analytics
IT OT
Factory
automation
systems
Network
devices
& SCADA
systems
Capabilities
18
Lack of Visibility to Security Posture of
Critical Assets, including EHR Systems
Lack of Resources to Combat Growing
Cyberattacks against Healthcare
Maintaining and achieving compliance with
HIPAA/HITRUST/NIST is time consuming
Tripwire Enterprise EHR monitoring solution
provides a detailed understanding of good vs. bad
changes on all critical assets and EHR systems
Tripwire Enterprise helps you achieve and maintain
compliance HIPAA, NIST, PCI and other security
controls, with audit-ready evidence
Assess on-premise, virtual and cloud assets in a
single product. Integrate with CMDB tools.
Managed services to supplement your team
19
Advanced vulnerability risk scoring and prioritization
helps you focus on the most critical vulnerabilities.
Prioritze changes in Tripwire Enterprise based on
risk
Industry’s most robust risk scoring algorithim helps
you accurately assess vulnerabilities in your
environment
Comprehensive discovery and profiling of all
assets on your network to help you quickly identify
vulnerabilities on your network.
Limited Resources, Infinite Vulnerabilities
False Positives Waste Everyone’s Time
Lack of visibility to devices on my network
integrity monitoring
secure configuration management
unauthorized
changes ensure compliance
Benefits
Stronger Security Posture, Faster Incident Investigation and Proof of Compliance
dieu.tran@mercy.net
jody.howard@mercy.net
ojones@tripwire.com
21

Más contenido relacionado

La actualidad más candente

Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
Yun Lu
 

La actualidad más candente (17)

Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
OT Experts Share Their Strategies - Securing Critical Infrastructure in the P...
 
Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?Big Data & Security Have Collided - What Are You Going to do About It?
Big Data & Security Have Collided - What Are You Going to do About It?
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
Shadow IT
Shadow ITShadow IT
Shadow IT
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT Skills
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
Secure Digital Transformation- Cybersecurity Skills for a Safe Journey to Dev...
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
Big data for cybersecurity - skilledfield slides - 25032021
Big data for cybersecurity - skilledfield slides - 25032021Big data for cybersecurity - skilledfield slides - 25032021
Big data for cybersecurity - skilledfield slides - 25032021
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 

Similar a Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits

Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
JoshJaro
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC Compliance
Lumension
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
Rabia Jabeen
 
Chapter 4The Enterprise SolutionA Modern Model of HIM Pract
Chapter 4The Enterprise SolutionA Modern Model of HIM PractChapter 4The Enterprise SolutionA Modern Model of HIM Pract
Chapter 4The Enterprise SolutionA Modern Model of HIM Pract
WilheminaRossi174
 

Similar a Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits (20)

PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?PCI DSS Compliance and Security: Harmony or Discord?
PCI DSS Compliance and Security: Harmony or Discord?
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Accelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based CareAccelerating Your Move to Value-Based Care
Accelerating Your Move to Value-Based Care
 
Overview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptxOverview-of-an-IT-Audit-Lesson-1.pptx
Overview-of-an-IT-Audit-Lesson-1.pptx
 
How to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT InfrastructureHow to Effectively Audit your IT Infrastructure
How to Effectively Audit your IT Infrastructure
 
Six Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC ComplianceSix Keys to Securing Critical Infrastructure and NERC Compliance
Six Keys to Securing Critical Infrastructure and NERC Compliance
 
Building Information System
Building Information SystemBuilding Information System
Building Information System
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 
Optimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big DataOptimizing Regulatory Compliance with Big Data
Optimizing Regulatory Compliance with Big Data
 
Data Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and MonitoringData Analytics for Auditors Analysis and Monitoring
Data Analytics for Auditors Analysis and Monitoring
 
Financial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital EraFinancial Services - New Approach to Data Management in the Digital Era
Financial Services - New Approach to Data Management in the Digital Era
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
Big Data Analytics for Healthcare Decision Support- Operational and Clinical
Big Data Analytics for Healthcare Decision Support- Operational and ClinicalBig Data Analytics for Healthcare Decision Support- Operational and Clinical
Big Data Analytics for Healthcare Decision Support- Operational and Clinical
 
Chapter 4The Enterprise SolutionA Modern Model of HIM Pract
Chapter 4The Enterprise SolutionA Modern Model of HIM PractChapter 4The Enterprise SolutionA Modern Model of HIM Pract
Chapter 4The Enterprise SolutionA Modern Model of HIM Pract
 
Health System Mergers & Acquisitions: Considerations for IT
Health System Mergers & Acquisitions: Considerations for IT Health System Mergers & Acquisitions: Considerations for IT
Health System Mergers & Acquisitions: Considerations for IT
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
 
Late-Binding Data Warehouse - An Update on the Fastest Growing Trend in Healt...
Late-Binding Data Warehouse - An Update on the Fastest Growing Trend in Healt...Late-Binding Data Warehouse - An Update on the Fastest Growing Trend in Healt...
Late-Binding Data Warehouse - An Update on the Fastest Growing Trend in Healt...
 
10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case10 Things to Consider When Building a CTMS Business Case
10 Things to Consider When Building a CTMS Business Case
 

Más de Tripwire

Más de Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7 Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
Jumpstarting Your Cyberdefense Machine with the CIS Controls V7
 
Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks Hunting for Cyber Threats Using Threat Modeling & Frameworks
Hunting for Cyber Threats Using Threat Modeling & Frameworks
 
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure TimelinesMost RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
Most RSAC Attendees Favor Shorter Vulnerability Disclosure Timelines
 

Último

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits

  • 2. Agenda  Introduction  Mercy Health (Who we are)  Organizational/Operational Challenges  Business Case and Implementation Methodology  Present and Future  Questions 9/6/2018 2
  • 3. Introduction Dieu Tran – Executive Director, IT Business Risk Services and Analytics (Mercy Health)  Designations – CISA, CISSP, GSNA, CRISC, CRMA, GISF, PCI-ISA Jody Howard – Manager PCI Compliance (Mercy Health)  Senior IT Architect 9/6/2018 3
  • 4. Who we are  5th Largest Catholic Healthcare System in the US Mercy Health (Who we are)  ~$5.5 Billion in Annual Revenue  30 acute care hospitals  11 Specialty Hospitals (Heart, Children's, Rehab and Ortho)  Virtual Care center  Over 800 Clinics Physician Practices and Outpatient Facilities  Operates in seven-state area encompassing Missouri, Arkansas, Oklahoma, Kansas, Louisiana, Mississippi and Texas  ~44,000 co-workers and over 2,100 physicians 9/6/2018 4
  • 5. Challenges Organizational ◦ Establishing compliance culture – history of audit findings ◦ Leadership (External Audit) ◦ Security Concerns ◦ Complex and Challenging Technical Environment ◦ Staffing Operational Challenges ◦ IT burdened with ad hoc data requests ◦ Data Integrity, Incomplete data, duplicate requests ◦ Difficult to review results and ensure consistency ◦ Unclear process ◦ Unclear accountability Change ◦ New/changing regulatory and compliance requirements (External Auditors, PCI, and HIPAA Security/Privacy) ◦ Governance 9/6/2018 5
  • 6. Business Case and Implementation Approach Business Case Savings (time and money) Successful audit and compliance efforts Reporting to support controls in place Governance of controls  Implementation Approach  Prioritize  Engage owners early  Define reporting needs  Training 9/6/2018 6
  • 7. IT Service Management ITIL Components 9/6/2018 7 People Process Technology
  • 8. Process Change Management Process ◦ Reinvigorated need for approvals prior to modifications ◦ Clarified definition of a “change” Governance ◦ Senior Management review and approval for each change to monitoring profile once in production ◦ Clear communication on additional volume of work created ◦ Opportunity to focus on groups that were less compliant Monitoring rules ◦ Accepted Tripwire as a recognized expert and used the published rules as often as possible (OS, database …) ◦ Avoided historic pitfalls of internal debates to merits of monitoring critical items 9/6/2018 8
  • 9. People Policy created to support effort ◦ Initially Change Management ◦ Added PCI compliance as Tripwire became viewed as critical success factor Meetings with technical teams ◦ Often “selling” effort one person at a time ◦ Open and honest discussions ◦ Focus on real purpose of monitoring Auditing ◦ Remediation notes ◦ Change orders ◦ Matching criteria 9/6/2018 9
  • 10. Technology Integration into ITSM Tool ◦ Used to validate approved change orders ◦ Remediation becomes component of daily routine obligations ◦ Change detection, File integrity monitoring and Vulnerability Notifications Rule Tuning ◦ Focus on most critical elements leveraging data analytics ◦ Often used features to identify “normal” activity limited to a specific account to reduce volume of alerts Reporting ◦ Reporting to application owners during rule development phase ◦ Reporting attached to each incident showing the details of modifications ◦ Reporting to Governance group for volume of activity ◦ Reporting to internal auditors to demonstrate good faith effort and help focus auditing efforts 9/6/2018 10
  • 11. Present and Future  Present  Tripwire Enterprise change detection viewed as a key strategy for SOC, PCI and commercialization efforts  Expansion from Change Detection to also include File Integrity Monitoring and Threat Detection  Visibility and monitoring for Epic Financial data  Better visibility and governance around change management  Reliable IT Environment around financial reporting  Reporting to support controls in place  Future  Using for other regulatory compliance needs  Security Configuration Management 9/6/2018 11
  • 12. Tripwire Solutions For Healthcare Challenges Onyeka Jones, Product Manager, Healthcare Solutions
  • 13. 13 #1: Secure PHI Detection and alerts on all changes to established baseline— what, who, and business context Detect unauthorized changes on critical assets and EHR systems Extensive library of security configuration best-practices to establish and monitor configurations Assess configurations against security policies Discover assets, vulnerabilities and malicious changes, and help automate the workflow and process of remediation Identify risk on critical assets and EHR systems End-to-end visibility: discovery, inventory, and change data for all your critical assets and EHR systems Know what’s happening in your environment
  • 14. 14 #2: Achieve Compliance Out-of-the-box audit report templates, and automated compliance reporting Reduce the time spent on compliance Continuous monitoring and reporting identifies remediation to stay compliant Maintain compliance over time Industry’s most comprehensive library of policy tests for all major standards Demonstrate compliance with standards HIPAA, PCI, NIST and many more Logging of changes to in-scope assets with details on who and when Produce data for audits and for forensics
  • 15. 15 #3: Address the Skills Gap Integrity monitoring and change audit to find root cause Ensure system availability and speed up investigation Integration with ITSM to tell authorized from unauthorized changes Validate changes and reduce unplanned work Real-time change detection— what, who, when and what it means Control changes that compromise systems Automate manual processes associated with dealing with change—isolate and escalate changes and events of interest Deal with security data overload
  • 18. 18 Lack of Visibility to Security Posture of Critical Assets, including EHR Systems Lack of Resources to Combat Growing Cyberattacks against Healthcare Maintaining and achieving compliance with HIPAA/HITRUST/NIST is time consuming Tripwire Enterprise EHR monitoring solution provides a detailed understanding of good vs. bad changes on all critical assets and EHR systems Tripwire Enterprise helps you achieve and maintain compliance HIPAA, NIST, PCI and other security controls, with audit-ready evidence Assess on-premise, virtual and cloud assets in a single product. Integrate with CMDB tools. Managed services to supplement your team
  • 19. 19 Advanced vulnerability risk scoring and prioritization helps you focus on the most critical vulnerabilities. Prioritze changes in Tripwire Enterprise based on risk Industry’s most robust risk scoring algorithim helps you accurately assess vulnerabilities in your environment Comprehensive discovery and profiling of all assets on your network to help you quickly identify vulnerabilities on your network. Limited Resources, Infinite Vulnerabilities False Positives Waste Everyone’s Time Lack of visibility to devices on my network
  • 20. integrity monitoring secure configuration management unauthorized changes ensure compliance Benefits Stronger Security Posture, Faster Incident Investigation and Proof of Compliance