“91% Of Healthcare Orgs Have Had A Data Breach”

2y ago
50 Views
3 Downloads
2.13 MB
36 Pages
Last View : 7d ago
Last Download : 3m ago
Upload by : Grant Gall
Transcription

“91% of healthcare orgs have had a data breach”- Jackson Shaw, Sr. Director Product Management - Dell

Advania gruppen

Fredrik PålerudTechnical Architect

Fredrik PålerudTechnicalArchitectStockholm, Sweden@palerudDell SoftwareIdentitySolutionsMicrosoft MCSEhttp://itinreality.blogspot.se/Dell Software IAM SMEDell Software GRC SME

Agenda GRC- Governance, Risk and Compliance. GDPR – The General Data Protection Regulation. The Stairway to Identity - in general. GRC, GDPR and The Stairway to Identity. Success Factors. Questions?

The 5 W’s Who What When Why Which (workstation)

Governance, Risk and ComplianceAround-the-clock peace of mind Analyze access rightsand permissions Determine configuration settings Set baselines

Governance, Risk and ComplianceAround-the-clock peace of mind Analyze access rightsand permissions Determine configuration settings Set baselines Track key performance andsecurity indicators Audit and report on user activity Enable real-time alerts

Governance, Risk and ComplianceAround-the-clock peace of mind Analyze access rightsand permissions Determine configuration settings Set baselines Implement preventative controls Report on and rectify deviationsand security breachesTrack key performance andsecurity indicators Audit and report on user activity Enable real-time alerts Discover and restore AD objects,forests, email content andmailboxes

Governance, Risk and ComplianceAround-the-clock peace of mind Administer access rightsand permissions Analyze access rightsand permissions Implement best-practicecompliance reporting Determine configuration settings Set baselines Retain and retrieve data Implement preventative controls Report on and rectify deviationsand security breachesTrack key performance andsecurity indicators Audit and report on user activity Enable real-time alerts Discover and restore AD objects,forests, email content andmailboxes

What is GDPR?The General Data Protection Regulation (GDPR) is a newpiece of legislation that was agreed in December 2015, andwill be effective from early 2018.Goal: removes the complexities that businesses currentlyface around complying with multiple local regulations acrossthe EU (28).GDPR unifies EU data protection legislation, simplifyingprocesses and legal obligations for any country dealing withmore than one EU state.

GDPR BenefitsBusiness One EU Market - One law One single authority Same rules for all companiesEU Citizens Improved data security Forcing new behavior arounddata security control

Some of the Key Features Personal dataGDPR's scope is limited to personal data. For example, an IP address that can identify a specific user's device isregarded as personal data. Data breachGDPR defines a data breach as an action that leads to "the accidental or unlawful destruction, loss , alteration,unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed.“ However,the EU regards a loss of encrypted data as not constituting a data breach, and many companies will use thisguideline as justification for encrypting as much data as deemed necessary. Continuous compliance and auditGDPR introduces the concept of continuous compliance: yearly, every 6months, monthly, weekly. At any pointan auditor can ask a company to demonstrate compliance, and the company must be able to do that more orless immediately.

Who does it apply to?All companies that process EU citizen data are subject to GDPR complianceexcept for companies with 250 employees or less, and some exceptions thatrelate to national security.GDPR also applies to the collection of personal data of EU citizens. It is importantto understand that the new regulations apply irrespective of whether the datacontroller or processor have a physical presence in the EU.The implications here are important: any provider that is not based, or has nopresence, in the EU is included. This means, for example, cloud service providersbased in the US.

Why should our customers care?GDPR changes the game for organizations because of two key features: The fine for non-compliance with GDPR reaches a maximum of 4% of global revenue. Theprospect of receiving such a fine gets boardroom attention. No board member will want tohave to explain to shareholders why profits and stock price have fallen due to a data breachresulting in a substantial fine. GDPR introduces the concept of mandatory breach notifications. For almost all companieswithin the EU this will be the first time that they will have had to, by law, admit to databreaches. While the extent of reporting breaches is limited to the Supervisory Authority andaffected customers, bad news travels quickly, and such information would leak quickly into thepublic domain. Organizations then have the media spotlight shone directly upon them.

Software features requiredto map with GDPR Support Role-Based Access Control as well as Context-Based rules. Full traceability of access to sensitive data not only by regular users but also by privilegedaccess ones. Detailed reports of access to different sets of data, fully embracing Data Governance discipline. Individual accountability and adoption of attestation and re-certification so that the businessknows the impact. Deployment of segregation of duties to enhance visibility and responsibility.

Conditions for complying with GDPRConditionsProcessing LimitationPurpose SpecificationFurther ProcessingInformation DescriptionProcess only as much as you need and for no longer than necessaryOnly process for specific purposeConsider original purpose before passing on information or re-purposeingEnsure information is relevant and up to dateClearly communicate why the information is processed and who sees itAllow the data subject accessThe party that determines the means of, and purpose for processing is ultimately responsibleTake reasonable measures to protect the personal information

Connecting to reality

IAM Maturity processOptimizedManagedDefinedRepeatableInitial

IAM Maturity hoc provisioningAd-hoc de-provisioningAd-hoc administration responsibility

IAM Maturity ined Security PolicyEmail requests for Provisioning using templateGroup rather than Role membershipAd-hoc provisioningAd-hoc de-provisioningAd-hoc administration responsibility

IAM Maturity ined Procedures, Template Provisioning FormHR defined Re-certification of Users (Attestation)De-provisioning of Users, Groups and ComputersDefined Security PolicyEmail requests for ProvisioningGroup rather than Role membershipAd-hoc provisioningAd-hoc de-provisioningAd-hoc administration responsibility

IAM Maturity processThe Stairway to Identity – IAM Maturity omated Provisioning , Approval workflowRecurring Re-certification of User AccessSelf-ServiceDefined Procedures, Template Provisioning FormHR defined Re-certification of Users (Attestation)De-provisioning of Users, Groups and ComputersDefined Security PolicyEmail requests for ProvisioningGroup rather than Role membershipAd-hoc provisioningAd-hoc de-provisioningAd-hoc administration responsibility

IAM Maturity processOptimizedUnique Identity across EnterpriseResources defined in RolesEntitlements provided through Role membershipAutomated Identity Lifecycle ManagementManagedAutomated Provisioning , Approval workflowRecurring Re-certification of User AccessSelf-ServiceDefinedRepeatableInitialDefined Procedures, Template Provisioning FormHR defined Re-certification of Users (Attestation)De-provisioning of Users, Groups and ComputersDefined Security PolicyEmail requests for ProvisioningGroup rather than Role membershipAd-hoc provisioningAd-hoc de-provisioningAd-hoc administration responsibility

IAM Maturity processSoftware mappingOptimizedManagedDefinedRepeatableInitial

IAM Maturity processSoftware mappingOptimizedManagedDefinedRepeatableKnowledge Factory ADHC – AD Cleanup (KF IP)Dell Change AuditorInitialDell Recovery Manager AD FEDell Enterprise ReporterMicrosoft Extended Native AuditingMicrosoft Powershell / Recycle Bin

IAM Maturity processSoftware mappingOptimizedManagedDefinedDell InTrustRepeatableDell GPO AdminMicrosoft Advanced Group Policy ManagementKnowledge Factory ADHC – AD Cleanup (KF IP)Dell Change AuditorInitialDell Recovery Manager AD FEDell Enterprise ReporterMicrosoft Extended Native AuditingMicrosoft Powershell / Recycle Bin

IAM Maturity processSoftware mappingOptimizedManagedDefinedDell One ActiveRoles Server / Quick ConnectMicrosoft Identity Manager / BHOLDDell InTrustRepeatableDell GPO AdminMicrosoft Advanced Group Policy ManagementKnowledge Factory ADHC – AD Cleanup (KF IP)Dell Change AuditorInitialDell Recovery Manager AD FEDell Enterprise ReporterMicrosoft Extended Native AuditingMicrosoft Powershell / Recycle Bin

IAM Maturity processSoftware mappingOptimizedManagedDefinedDell One Identity Manager AD Edition / Password ManagerMicrosoft Identity Manager / BHOLDDell One ActiveRoles Server / Quick ConnectMicrosoft Identity Manager / BHOLDDell InTrustRepeatableDell GPO AdminMicrosoft Advanced Group Policy ManagementKnowledge Factory ADHC – AD Cleanup (KF IP)Dell Change AuditorInitialDell Recovery Manager AD FEDell Enterprise ReporterMicrosoft Extended Native AuditingMicrosoft Powershell / Recycle Bin

IAM Maturity processSoftware mappingDell One Identity Manager Data Governance Edition / TPAMOptimizedManagedDefinedMicrosoft Identity Manager / BHOLD / PIM / PAMDell One Identity Manager AD Edition / Password ManagerMicrosoft Identity Manager / BHOLDDell One ActiveRoles Server / Quick ConnectMicrosoft Identity Manager / BHOLDDell InTrustRepeatableDell GPO AdminMicrosoft Advanced Group Policy ManagementKnowledge Factory ADHC – AD Cleanup (KF IP)Dell Change AuditorInitialDell Recovery Manager AD FEDell Enterprise ReporterMicrosoft Extended Native AuditingMicrosoft Powershell / Recycle Bin

Understanding is keySuccess FactorsProjectTrainingSet the barOwnershipKnowledgeFollow the stair, step by stepAlign vision with realityUnderstand requirementsProcessesSupportExperienceSoftware is just part of itSelect the solution suitable for your requirementsArchitecture Governance

Var med i vår enkla tävling genom a skannaQR-koden nedan och svara på tre enkla frågor.Tävlingen pågår både idag och i morgon, torsdag.Vinnaren meddelas via e-post nästa vecka.Tävla och vinn en Apple TV!Lycka till!

See you in the partner areaThank you for listening!

Dell Change Auditor Dell Recovery Manager AD FE Dell Enterprise Reporter Microsoft Extended Native Auditing Microsoft Powershell / Recycle Bin Dell InTrust Dell GPO Admin Microsoft Advanced Group Policy Management Dell One ActiveRoles Server / Quick Connect Microsoft Identity Manager / BHOLD Dell

Related Documents:

Step 1: Upsert - With Informatica Cloud data integration, data is migrated onto the reporting hub and synchronized with operating Salesforce orgs to ensure that reports are up to date. Step 2: Standardization - Informatica Cloud MDM is a native Force.com application that ensures all data is

10 Apr. 1962 Supplies of Books from HCO WW 199 22 June 1962 Autographed Free Books 199 13 May 1963 Supplies of Books to Scientology Organizations 200 21 Nov. 1964 Discounts-Central Orgs-Books 201 19 July 1965 Discounts-Central Orgs-Books (corrects 21 Nov. 1964) 202 23 Sept. 1965 Keeping Stocks Up (reissued 14 Sept. 1967) 203

makers in healthcare management. 2 / 2022 Media Kit / ache.org The American College of Healthcare Executives is an international professional society of more than 40,000 healthcare executives who lead hospitals, healthcare systems and other healthcare organizations. Healthcare Executive e-TOC Published bimonthly, e-TOC is a

Function 1: Develop recovery processes for the healthcare delivery system 12 P1. Healthcare recovery planning 12 P2. Assessment of healthcare delivery recovery needs post disaster 13 P3. Healthcare organization recovery assistance and participation 13 Function 2: Assist healthcare organizations to implement Continuity of Operations (COOP) 13 P1.

healthcare industry through local support initiatives like GS1 Healthcare US in the United States. About GS1 Healthcare US GS1 Healthcare US is an industry group that focuses on driving the adoption and implementation of GS1 Standards in the healthcare industry in the United States to help improve patient safety and supply chain efficiency.

Google Cloud FHIR APIs Dharmesh Patel Google Cloud Healthcare & Life Sciences. Agenda Healthcare Interoperability & FHIR SMART on FHIR 1 2 3 Google's Cloud Healthcare FHIR API. Healthcare 01 Interoperability & FHIR. The Interoperability Challenge in Healthcare. FHIR as the Data Model and API Spec for Interoperability

healthcare workforce and increase the use of telehealth.5 Base (unweighted): Total healthcare leaders (United States n 200; 14-country avg. n 2800; France n 200; Germany n 200; Netherlands n 200) Healthcare leaders who agree that current healthcare policies and plans in their country are contributing to building a resilient healthcare system

healthcare professionals. The next steps for healthcare reform. The pandemic potentially set the stage for . healthcare reform along three dimensions: COVID-19-era waivers that could become permanent; actions that may be taken to strengthen the healthcare system to deal with pandemics; and reforms to address COVID-19. Between early March 2020 and