the eighth national hipaa summit monday, march 8, 2004

26
1 The Eighth National HIPAA Summit Monday, March 8, 2004 Healthcare Security Professional Roundtable

Upload: ulysses-blackwell

Post on 02-Jan-2016

21 views

Category:

Documents


1 download

DESCRIPTION

Healthcare Security Professional Roundtable. The Eighth National HIPAA Summit Monday, March 8, 2004. Panelists. John Parmigiani, Sr.VP for Consulting Services, QuickCompliance, Inc.; President, John C. Parmigiani and Associates, LLC (moderator) Ali Pabrai, CEO, HIPAA Academy - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: The Eighth National  HIPAA Summit Monday, March 8, 2004

1

The Eighth National

HIPAA Summit

Monday, March 8, 2004

Healthcare Security

Professional

Roundtable

Page 2: The Eighth National  HIPAA Summit Monday, March 8, 2004

2

Panelists John Parmigiani, Sr.VP for Consulting

Services, QuickCompliance, Inc.; President, John C. Parmigiani and Associates, LLC (moderator)

Ali Pabrai, CEO, HIPAA Academy Tom Walsh, President, Tom Walsh

Consulting Chris Apgar, Data Security and HIPAA

Compliance Officer, Providence Health Plan Tom Welch, CEO, Secure Enterprise

Solutions Bob Tahmaseb, Principal Systems Engineer,

RSA Security

Page 3: The Eighth National  HIPAA Summit Monday, March 8, 2004

3

John Parmigiani

Sr. VP for Consulting Services

QuickCompliance, Inc.and

PresidentJohn C. Parmigiani and

Associates, LLC Ellicott City, MD

Page 4: The Eighth National  HIPAA Summit Monday, March 8, 2004

4

Action Items for Compliance Read and understand the Rule Appoint a CSO/HIPAA Security Team Determine ePHI data flow and

existence in information systems Conduct a risk analysis- assets,

vulnerabilities, threats, impacts Examine, update, and create security

policies and procedures in line with the implementation specifications

Work with your vendors and business associates to enlist their help

Page 5: The Eighth National  HIPAA Summit Monday, March 8, 2004

5

Action Items for Compliance Identify existing security safeguards-

administrative, physical, and technical Build and deliver security training

programs Identify and prioritize remediation projects Build an ongoing risk management process Create a security management process

with accompanying documentation that supports your decision making/choices relative to the security standards

Stay on top of “best practices” within the healthcare industry and federal guidance

Page 6: The Eighth National  HIPAA Summit Monday, March 8, 2004

6

Uday O. Ali Pabrai, CISSP, CHSS

Chief ExecutiveHIPAA AcademyWarrenville, IL

Page 7: The Eighth National  HIPAA Summit Monday, March 8, 2004

7

Seven Steps to HIPAA Security

Compliance

Page 8: The Eighth National  HIPAA Summit Monday, March 8, 2004

8

HIPAA Security Rule

Technical

Safeguards

for e-PHI

Technical

Safeguards

for e-PHI

Physical Safeguards

for e-PHI

Physical Safeguards

for e-PHI

Administrative Safeguards

for e-PHI

Administrative Safeguards

for e-PHI

Privacy Rule

“reasonable” safeguards for all PHI

Privacy Rule

“reasonable” safeguards for all PHI

•Security Mgmt. Process, Sec. Officer

•Workforce Security, Info. Access Mgmt.

•Security Training, Security Incident Proc.

•Contingency Plan, Evaluation, BACs

•Facility Access Controls

•Workstation Use

•Workstation Security

•Device & Media Controls

•Access Control

•Audit Control

•Integrity

•Person or Entity Authentication

•Transmission Security

CIA

Page 9: The Eighth National  HIPAA Summit Monday, March 8, 2004

9

HIPAAShieldTM Methodology

Page 10: The Eighth National  HIPAA Summit Monday, March 8, 2004

10

Tom Walsh, CISSP

President

Tom Walsh Consulting, LLCOverland Park, KS

Page 11: The Eighth National  HIPAA Summit Monday, March 8, 2004

11

What is it? How does this help with risk

analysis?

Example:

Car Insurance

Risk Profiling

Page 12: The Eighth National  HIPAA Summit Monday, March 8, 2004

12

Traditional Approach to Assessing Systems (Ref: NIST SP800-26)

Major App 1

Data

Application

Interfaces

Network

Hardware & Operating System

Physical/ Environment

Operational Practices

Major App 2

Data

Application

Interfaces

Network

Hardware & Operating System

Physical/ Environment

Operational Practices

Assessin

g C

on

trols

Assessin

g C

on

trols

Page 13: The Eighth National  HIPAA Summit Monday, March 8, 2004

13

Risk ProfileRisk

ProfileRisk

Profile

Risk Profile

Risk Profile

Risk Profile ApproachMajor App 1

Data

Application

Interfaces

Network

Hardware & Operating System

Physical/ Environment

Operational Practices

Major App 2

Data

Application

Interfaces

Network

Hardware & Operating System

Physical/ Environment

Operational Practices

A hierarchical approach to assessing

controls and risks

Assessin

g

Assessin

g

Page 14: The Eighth National  HIPAA Summit Monday, March 8, 2004

14

Chris Apgar, CISSP

Data Security and HIPAA Compliance Officer

Providence Health PlanBeaverton, OR

Page 15: The Eighth National  HIPAA Summit Monday, March 8, 2004

15

Security audit, like financial audit good business practice

Audit program should be designed to:

• Keep the masses honest

• Monitor potential vulnerabilities

• Be thorough without being onerous

Audit – Implementation is only the Beginning

Page 16: The Eighth National  HIPAA Summit Monday, March 8, 2004

16

Sized to fit the organization, technical configuration & business

Should include regular and random audits and audits when major changes occur (i.e., new technology, high level staff leave, etc.)

Need to publicize and follow through

Audit – Implementation is only the Beginning

Page 17: The Eighth National  HIPAA Summit Monday, March 8, 2004

17

Evaluation Evaluation on going Healthcare – an ever changing

environment while audits and risk assessments are snapshots in time

What was an effective audit process, security practice, etc. yesterday may not be today

Embed in culture, planning and processes

Page 18: The Eighth National  HIPAA Summit Monday, March 8, 2004

18

Thomas Welch, CPP,CISSP

Chief Executive Officer

Secure Enterprise Solutions, Inc.

Parsippany, NJ

Page 19: The Eighth National  HIPAA Summit Monday, March 8, 2004

19

Information Security Lifecycle

Building Blocks

• People• Process• Technology

Security is a process not a

product...

Policy & Architecture

Risk Assessment

Security Policy

Security Assurance

TestingReportingMonitoring Training

Technology

Implementation

Solution Design & Selection

Security DesignTechnology Selection

Business Applications & Services

Networks, Intranet, Internet, Remote Access

Hardware & Operating Systems

VPNEncryptionFirewalls

AuthenticationIDS

Patch Mgmt

CIRT & Forensics

Page 20: The Eighth National  HIPAA Summit Monday, March 8, 2004

20

Provides the foundation for the information security program

Puts employees and consultants on notice pertaining to issues of:• Acceptable use of IT resources• Employee Monitoring • General security requirements

Information Security Policy

Page 21: The Eighth National  HIPAA Summit Monday, March 8, 2004

21

Information Security Policy

HR Policies• Monitoring Awareness• Privacy Issues & 1st

Amendment Rights• Company Equipment Use• Who Owns the Data

Operational Policies• Internet & Intranet

Usage• Passwords• E-mail usage• File transfers &

Attachments• Virus Control• Data Classification

Sensitivity

Moral & Ethical Conduct• Etiquette and Proper

Usage• Pornography• Harassment

Legal Responsibilities, Penalties & Enforcement• Warning Notice• Incident Response

Plan

Page 22: The Eighth National  HIPAA Summit Monday, March 8, 2004

22

Policies provide the notice and guidelines, while awareness training provides the knowledge• Can be classroom-based or CBT-

based• An on-going program is more

effective that a one-time course•E-mail alerts, bulletins, reward

programs, posters, etc.

• Goal is to change behavior

InfoSec Awareness

Page 23: The Eighth National  HIPAA Summit Monday, March 8, 2004

23

Bob Tamaseb

Principal Systems Engineer

RSA Security, Inc.Bedford, MA

Page 24: The Eighth National  HIPAA Summit Monday, March 8, 2004

24

HIPAA Authentication: Proving Your Identity

Physical vs. Digital Identity Technical Safeguards for person and

entity authentication Types of Authentication

• Something you know• Something you have• Something you are

Leveraging authentication for access management

Page 25: The Eighth National  HIPAA Summit Monday, March 8, 2004

25

Types of Authentication

Something you know Something you have Something you are

Enter PINEnter PIN

OK Cancel

Page 26: The Eighth National  HIPAA Summit Monday, March 8, 2004

26