SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Top Cyber Risk Mitigation
Strategies
________
● Steven Sarros, Chief Information Officer Baptist Health Care Pensacola
FL●
#LEAD15
A CHIME Leadership Education and Development Forum in collaboration with iHT2
• Department of Homeland Security Daily Open Source Infrastructure
Report (DOSIR) – 16 Critical Infrastructures
• Healthcare and Public Health
• Information Technology
• Defense Industrial Base
• United States Computer Emergency Readiness Team (US-CERT)
• Weekly Briefs and Situational Alerts
• FBI InfraGuard Program
Top Cybersecurity Risk Mitigation Strategies Gathering
Threat Intelligence to Establish Situational Awareness
A CHIME Leadership Education and Development Forum in collaboration with iHT2
• Awareness training
• Vetting (Team Members and Non-Team Members)
• User lifecycle management and granting access
• Monitoring
• FairWarning
• Web, Email and Chat Activity
• Workstation monitoring
• More awareness training
Top Cybersecurity Risk Mitigation Strategies
The “People Factor” Creating the Human Firewall
Q & A
Speaker(s) Contact Information
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Insert Twitter
handle(s) here
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Overall Words of Wisdom
________
Stuff I learned the hard way
● David Finn, Health IT Officer, Symantec ●
#LEAD15
A CHIME Leadership Education and Development Forum in collaboration with iHT2
You
are
here.
Privacy and Security
today in Healthcare
(foot of the hill)
The Changes You
Need to Make
(the summit)
A CHIME Leadership Education and Development Forum in collaboration with iHT2
• Security and usability are often inversely
proportional. (Security is not convenient)
• Security is an investment, not an expense.
• "Good enough" security now, is better than
"perfect" security . . . never.
• There is no such thing as “complete
security” in a usable system.
• A false sense of security is worse than a
true sense of insecurity.
• Your absolute security is only as strong as
your weakest link.
• Concentrate on known, probable threats.
• Security is not a static end state, it is an
iterative process.
• Security is directly related to the education
and ethics of your users.
• There are few forces in the universe
stronger than the desire of an individual to
get his or her job accomplished.
• Security is a people problem. Corollary:
People cause security problems, they don't
just happen.
• You only get to pick two: fast, secure,
cheap.
• In the absence of other factors, always use
the most secure options available. (You are
either serious about security, or you're just
fooling around).
Security Dogma . . . (after 30 years of doing this)
• Roles &
Responsibilities
• Risk Framework
• Reporting
• Build, Deploy &
Maintain
• Patch Management
• Log & Event Mgmt.
8
Copyright © 2015 Symantec Corporation
BusinessStrategy
andGovernance
On-GoingCompliance
andSecurityOperations
• Policies & Procedures
• Risk Mgmt. Process
• Establish Controls
• On-going Risk Analysis
• Impact Assessment
• Remediation &
Mitigation
• Access Management
Principles & Policy
• Org. Mapping
• Roles &
Responsibilities
• Accountability
• Digital Trust
• Identity Management
• Authentication
• Activity Review
• Document Lifecycle
• Data Criticality
• Communications Plan
• Training & Education
• Utilization Mgmt.
• Data Classification
• Encryption
• Mobile Security
• Email Security
• Lifecycle & Change
Management
• Maintenance Policies
• Inventory & Classification
• Digital Media Mgmt.
• Contract & BA Mgmt.
Informa
tion
Protection
Infrastruct
ure
Managem
ent
• Threat Intelligence
• Contingency Planning
• Executive Reporting
• Security Management
• Incident Response
• Anomaly Detection
• Malware Protection
• Audit Support
• Incident Response
Infrastruct
ure
Protection
Secure
Info
Access
A Mature Compliance and Security Model
Business Strategy and Governance driving Security Operations
Governance
(security,
privacy,
compliance)
Q & A
A CHIME Leadership Education and Development Forum in collaboration with iHT2
#LEAD15
• David_Finn@Symantec.com
• @DavidSFinn
• 832.816.2206

Más contenido relacionado

La actualidad más candente

How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30Ivanti
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecurityDoug Copley
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDoug Copley
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk ManagementDeepak Bansal, CPA CISSP
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1jhietala
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)James Neo
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingTony Martin-Vegue
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALSteve Knapp
 
Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Ideba
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack SurvivalSkoda Minotti
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical DevicesSecurityMetrics
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...Health IT Conference – iHT2
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 

La actualidad más candente (20)

How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
Information Technology Vendor Risk Management
Information Technology Vendor Risk ManagementInformation Technology Vendor Risk Management
Information Technology Vendor Risk Management
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)SingHealth Cyber Attack (project)
SingHealth Cyber Attack (project)
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Windstream Cloud Security Checklist
Windstream Cloud Security Checklist
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical Devices
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 

Destacado

EXAMEN MEDICINA PREVENTIVA ¿EFICIENTE HERRAMIENTA PESQUISANDO HIPERTENSIÓN AR...
EXAMEN MEDICINA PREVENTIVA ¿EFICIENTE HERRAMIENTA PESQUISANDO HIPERTENSIÓN AR...EXAMEN MEDICINA PREVENTIVA ¿EFICIENTE HERRAMIENTA PESQUISANDO HIPERTENSIÓN AR...
EXAMEN MEDICINA PREVENTIVA ¿EFICIENTE HERRAMIENTA PESQUISANDO HIPERTENSIÓN AR...MarceloMuller2015
 
IEEE International Conference on Data Engineering 2015
IEEE International Conference on Data Engineering 2015IEEE International Conference on Data Engineering 2015
IEEE International Conference on Data Engineering 2015Yousun Jeong
 
Informe reflexion en aplicación de control joven sano
Informe reflexion en aplicación de control joven sanoInforme reflexion en aplicación de control joven sano
Informe reflexion en aplicación de control joven sanoMarceloMuller2015
 
DELIVERED AT THE BORDER pdf
DELIVERED AT THE BORDER pdf DELIVERED AT THE BORDER pdf
DELIVERED AT THE BORDER pdf Wafa Goussous
 
El aparatopsíquico
El aparatopsíquicoEl aparatopsíquico
El aparatopsíquicoCamiYaM
 
Track B-3: Delivering Actionable Experiences Through Effective Digital Marketing
Track B-3: Delivering Actionable Experiences Through Effective Digital MarketingTrack B-3: Delivering Actionable Experiences Through Effective Digital Marketing
Track B-3: Delivering Actionable Experiences Through Effective Digital Marketingscoopnewsgroup
 
Spark streaming , Spark SQL
Spark streaming , Spark SQLSpark streaming , Spark SQL
Spark streaming , Spark SQLYousun Jeong
 
Track C-2: Creativity & Design-Led Innovation in the Public Sector
Track C-2: Creativity & Design-Led Innovation in the Public SectorTrack C-2: Creativity & Design-Led Innovation in the Public Sector
Track C-2: Creativity & Design-Led Innovation in the Public Sectorscoopnewsgroup
 

Destacado (9)

EXAMEN MEDICINA PREVENTIVA ¿EFICIENTE HERRAMIENTA PESQUISANDO HIPERTENSIÓN AR...
EXAMEN MEDICINA PREVENTIVA ¿EFICIENTE HERRAMIENTA PESQUISANDO HIPERTENSIÓN AR...EXAMEN MEDICINA PREVENTIVA ¿EFICIENTE HERRAMIENTA PESQUISANDO HIPERTENSIÓN AR...
EXAMEN MEDICINA PREVENTIVA ¿EFICIENTE HERRAMIENTA PESQUISANDO HIPERTENSIÓN AR...
 
IEEE International Conference on Data Engineering 2015
IEEE International Conference on Data Engineering 2015IEEE International Conference on Data Engineering 2015
IEEE International Conference on Data Engineering 2015
 
Informe reflexion en aplicación de control joven sano
Informe reflexion en aplicación de control joven sanoInforme reflexion en aplicación de control joven sano
Informe reflexion en aplicación de control joven sano
 
PRESENTACION
PRESENTACIONPRESENTACION
PRESENTACION
 
DELIVERED AT THE BORDER pdf
DELIVERED AT THE BORDER pdf DELIVERED AT THE BORDER pdf
DELIVERED AT THE BORDER pdf
 
El aparatopsíquico
El aparatopsíquicoEl aparatopsíquico
El aparatopsíquico
 
Track B-3: Delivering Actionable Experiences Through Effective Digital Marketing
Track B-3: Delivering Actionable Experiences Through Effective Digital MarketingTrack B-3: Delivering Actionable Experiences Through Effective Digital Marketing
Track B-3: Delivering Actionable Experiences Through Effective Digital Marketing
 
Spark streaming , Spark SQL
Spark streaming , Spark SQLSpark streaming , Spark SQL
Spark streaming , Spark SQL
 
Track C-2: Creativity & Design-Led Innovation in the Public Sector
Track C-2: Creativity & Design-Led Innovation in the Public SectorTrack C-2: Creativity & Design-Led Innovation in the Public Sector
Track C-2: Creativity & Design-Led Innovation in the Public Sector
 

Similar a 2015 Atlanta CHIME Lead Forum

"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013Adrian Wright
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small BusinessArt Ocain
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...Health IT Conference – iHT2
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...Health IT Conference – iHT2
 
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...Health IT Conference – iHT2
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsJayeshGadhave1
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramResilient Systems
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011Atlantic Security Conference
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & ManufacturingEvan Francen
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsInfonaligy
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk GovernanceDan Michaluk
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 

Similar a 2015 Atlanta CHIME Lead Forum (20)

"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
13734729.ppt
13734729.ppt13734729.ppt
13734729.ppt
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
CHIME LEAD San Francisco 2015 - "Creating an Effective Cyber Security Strateg...
 
Threat intelligence life cycle steps by steps
Threat intelligence life cycle steps by stepsThreat intelligence life cycle steps by steps
Threat intelligence life cycle steps by steps
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
 
Robert beggs incident response teams - atlseccon2011
Robert beggs   incident response teams - atlseccon2011Robert beggs   incident response teams - atlseccon2011
Robert beggs incident response teams - atlseccon2011
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Cybersecurity Risk Governance
Cybersecurity Risk GovernanceCybersecurity Risk Governance
Cybersecurity Risk Governance
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 

Más de Health IT Conference – iHT2

Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly HillsWelcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly HillsHealth IT Conference – iHT2
 

Más de Health IT Conference – iHT2 (20)

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 
Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly HillsWelcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
 
iHT2 Health IT Chicago Summit
iHT2 Health IT Chicago SummitiHT2 Health IT Chicago Summit
iHT2 Health IT Chicago Summit
 
iHT2 Health IT Chicago Summit
iHT2 Health IT Chicago SummitiHT2 Health IT Chicago Summit
iHT2 Health IT Chicago Summit
 

Último

kochi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
kochi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetkochi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
kochi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real MeetVip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real MeetAhmedabad Call Girls
 
Sexy Call Girl Dharmapuri Arshi 💚9058824046💚 Dharmapuri Escort Service
Sexy Call Girl Dharmapuri Arshi 💚9058824046💚 Dharmapuri Escort ServiceSexy Call Girl Dharmapuri Arshi 💚9058824046💚 Dharmapuri Escort Service
Sexy Call Girl Dharmapuri Arshi 💚9058824046💚 Dharmapuri Escort Servicejaanseema653
 
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
kozhikode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
kozhikode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetkozhikode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
kozhikode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Sangli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sangli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSangli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sangli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...mahaiklolahd
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Malda Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Malda Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMalda Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Malda Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Erode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Erode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetErode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Erode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...Ahmedabad Call Girls
 
Call Girl in Indore 8827247818 {Low Price}👉 Nitya Indore Call Girls * ITRG...
Call Girl in Indore 8827247818 {Low Price}👉   Nitya Indore Call Girls  * ITRG...Call Girl in Indore 8827247818 {Low Price}👉   Nitya Indore Call Girls  * ITRG...
Call Girl in Indore 8827247818 {Low Price}👉 Nitya Indore Call Girls * ITRG...mahaiklolahd
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 

Último (20)

kochi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
kochi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetkochi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
kochi Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real MeetVip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
 
Sexy Call Girl Dharmapuri Arshi 💚9058824046💚 Dharmapuri Escort Service
Sexy Call Girl Dharmapuri Arshi 💚9058824046💚 Dharmapuri Escort ServiceSexy Call Girl Dharmapuri Arshi 💚9058824046💚 Dharmapuri Escort Service
Sexy Call Girl Dharmapuri Arshi 💚9058824046💚 Dharmapuri Escort Service
 
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
kozhikode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
kozhikode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetkozhikode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
kozhikode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Sangli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sangli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSangli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sangli Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
Call Girl in Bangalore 9632137771 {LowPrice} ❤️ (Navya) Bangalore Call Girls ...
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Malda Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Malda Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMalda Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Malda Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Erode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Erode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetErode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Erode Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
Call Girl in Indore 8827247818 {Low Price}👉 Nitya Indore Call Girls * ITRG...
Call Girl in Indore 8827247818 {Low Price}👉   Nitya Indore Call Girls  * ITRG...Call Girl in Indore 8827247818 {Low Price}👉   Nitya Indore Call Girls  * ITRG...
Call Girl in Indore 8827247818 {Low Price}👉 Nitya Indore Call Girls * ITRG...
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetBareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Bareilly Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 

2015 Atlanta CHIME Lead Forum

  • 1. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Top Cyber Risk Mitigation Strategies ________ ● Steven Sarros, Chief Information Officer Baptist Health Care Pensacola FL● #LEAD15
  • 2. A CHIME Leadership Education and Development Forum in collaboration with iHT2 • Department of Homeland Security Daily Open Source Infrastructure Report (DOSIR) – 16 Critical Infrastructures • Healthcare and Public Health • Information Technology • Defense Industrial Base • United States Computer Emergency Readiness Team (US-CERT) • Weekly Briefs and Situational Alerts • FBI InfraGuard Program Top Cybersecurity Risk Mitigation Strategies Gathering Threat Intelligence to Establish Situational Awareness
  • 3. A CHIME Leadership Education and Development Forum in collaboration with iHT2 • Awareness training • Vetting (Team Members and Non-Team Members) • User lifecycle management and granting access • Monitoring • FairWarning • Web, Email and Chat Activity • Workstation monitoring • More awareness training Top Cybersecurity Risk Mitigation Strategies The “People Factor” Creating the Human Firewall
  • 4. Q & A Speaker(s) Contact Information A CHIME Leadership Education and Development Forum in collaboration with iHT2 Insert Twitter handle(s) here
  • 5. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Overall Words of Wisdom ________ Stuff I learned the hard way ● David Finn, Health IT Officer, Symantec ● #LEAD15
  • 6. A CHIME Leadership Education and Development Forum in collaboration with iHT2 You are here. Privacy and Security today in Healthcare (foot of the hill) The Changes You Need to Make (the summit)
  • 7. A CHIME Leadership Education and Development Forum in collaboration with iHT2 • Security and usability are often inversely proportional. (Security is not convenient) • Security is an investment, not an expense. • "Good enough" security now, is better than "perfect" security . . . never. • There is no such thing as “complete security” in a usable system. • A false sense of security is worse than a true sense of insecurity. • Your absolute security is only as strong as your weakest link. • Concentrate on known, probable threats. • Security is not a static end state, it is an iterative process. • Security is directly related to the education and ethics of your users. • There are few forces in the universe stronger than the desire of an individual to get his or her job accomplished. • Security is a people problem. Corollary: People cause security problems, they don't just happen. • You only get to pick two: fast, secure, cheap. • In the absence of other factors, always use the most secure options available. (You are either serious about security, or you're just fooling around). Security Dogma . . . (after 30 years of doing this)
  • 8. • Roles & Responsibilities • Risk Framework • Reporting • Build, Deploy & Maintain • Patch Management • Log & Event Mgmt. 8 Copyright © 2015 Symantec Corporation BusinessStrategy andGovernance On-GoingCompliance andSecurityOperations • Policies & Procedures • Risk Mgmt. Process • Establish Controls • On-going Risk Analysis • Impact Assessment • Remediation & Mitigation • Access Management Principles & Policy • Org. Mapping • Roles & Responsibilities • Accountability • Digital Trust • Identity Management • Authentication • Activity Review • Document Lifecycle • Data Criticality • Communications Plan • Training & Education • Utilization Mgmt. • Data Classification • Encryption • Mobile Security • Email Security • Lifecycle & Change Management • Maintenance Policies • Inventory & Classification • Digital Media Mgmt. • Contract & BA Mgmt. Informa tion Protection Infrastruct ure Managem ent • Threat Intelligence • Contingency Planning • Executive Reporting • Security Management • Incident Response • Anomaly Detection • Malware Protection • Audit Support • Incident Response Infrastruct ure Protection Secure Info Access A Mature Compliance and Security Model Business Strategy and Governance driving Security Operations Governance (security, privacy, compliance)
  • 9. Q & A A CHIME Leadership Education and Development Forum in collaboration with iHT2 #LEAD15 • David_Finn@Symantec.com • @DavidSFinn • 832.816.2206