Green Treatment Center

Similar documents
Security and Privacy Governance Program Guidelines

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Information Technology University Budget Hearing. April 5, 2018

Continuous protection to reduce risk and maintain production availability

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

NEN The Education Network

STRATEGIC PLAN

SIEM: Five Requirements that Solve the Bigger Business Issues

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Security Survey Executive Summary October 2008

State of South Carolina Interim Security Assessment

NW NATURAL CYBER SECURITY 2016.JUNE.16

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

The NIST Cybersecurity Framework

Department of Management Services REQUEST FOR INFORMATION

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

THE POWER OF TECH-SAVVY BOARDS:

Education Network Security

Position Title: IT Security Specialist

White Paper. View cyber and mission-critical data in one dashboard

Position Description IT Auditor

Implementing Executive Order and Presidential Policy Directive 21

Credential Awarding Body Timing Before, During or After Apprenticeship. hardware vendors

Emerging Technologies The risks they pose to your organisations

Company Builds Sustainable, Highly Efficient Headquarters Facility

DHS Cybersecurity: Services for State and Local Officials. February 2017

Emergency Operations Center Management Exercise Evaluation Guide

Big data privacy in Australia

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

DETAILED POLICY STATEMENT

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

CALIFORNIA CYBERSECURITY TASK FORCE

University of Pittsburgh Security Assessment Questionnaire (v1.7)

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Keys to a more secure data environment

EPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS

Digital Health Cyber Security Centre

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

SAN JOSÉ FIRE DEPARTMENT. Strategic Planning

Which Side Are You On?

What It Takes to be a CISO in 2017

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Mission Critical MPLS in Utilities

Cybersecurity in Higher Ed

Internet of Things Toolkit for Small and Medium Businesses

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

STRATEGIC PLAN. USF Emergency Management

Best Practices for Campus Security. January 26, 2017

Business Continuity Management Standards A Side-by-Side Comparison

Dell helps you simplify IT

Symantec Security Monitoring Services

Changing face of endpoint security

IT Security: Managing a New Reality

Canada Life Cyber Security Statement 2018

The Common Controls Framework BY ADOBE

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

Create the ideal conditions for your network to grow.

Why you should adopt the NIST Cybersecurity Framework

FDIC InTREx What Documentation Are You Expected to Have?

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

locuz.com SOC Services

QUIACLE TECHNOLOGY SOLUTIONS, INC. CLOUD SERVICES MANAGED SECURITY SERVICES

Halifax Regional Municipality

Cybersecurity and Hospitals: A Board Perspective

A Guide to Ensuring Security and Resiliency

Emergency Support Function #2 Communications Annex INTRODUCTION. Purpose. Scope. ESF Coordinator: Support Agencies: Primary Agencies:

Demystifying GRC. Abstract

POSITION DESCRIPTION

CCISO Blueprint v1. EC-Council

IBM SmartCloud Engage Security

BUSINESS CONTINUITY. Topics covered in this checklist include: General Planning

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance

Healthcare Security Success Story

Table of Contents. Sample

Space Cyber: An Aerospace Perspective

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Awareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology

Accelerate Your Enterprise Private Cloud Initiative

Threat and Vulnerability Assessment Tool

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

NCSF Foundation Certification

Illinois Cyber Navigator Program

Bright House Networks Enterprise Solutions. FINAL Proposal for: WE RE WIRED DIFFERENTLY. Voice Data Cloud Managed Services. Proposal Date: 4/14/2016

Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.

Transcription:

Green Treatment Center IT Strategic Goals and Objectives: 2017-2019 Technology Plan The Department s IT strategies for the next four years are grounded in legislative and regulatory drivers that inform the requirements of GTC programs in public health, social services, medical care, health insurance, research, prevention and response, and IT management. The Department, like many health care, financial, and service organizations, is undergoing a digital transformation that highlights fundamental shifts in how it interacts with its myriad public and private sector customers and partners. These changes include a focus on shared services, customer-centric operations, and mobile services. This shift means users and partners will have confidence in the timeliness, integrity, and security of the data they receive and its availability on a variety of platforms and devices. Goal 1: IT Workforce Aim Acquire, deploy, and sustain a technology-enabled workforce The most important aspect of any IT organization is its people. For most Federal agencies, with the reliance on IT to deliver services, a competent and effective IT cadre across the organization is vital to mission accomplishment. Building and maintaining a community of diverse IT professionals is essential to the successful execution of organizational objectives. GCT must effectively: Plan for, acquire, develop, and sustain a strong and diverse IT workforce with expanded learning and training programs across GTC, Further the overall IT knowledge, expertise and opportunities across competencies of the department, and Improve targeted recruitment, professional development, and talent/performance management.

Improved staff planning, recruitment, hiring, development, succession, and retention strategies enable HHS to build a diverse pipeline of top IT professionals and leaders. Further, through expanded learning and training programs across GTC, the overall IT competency of the Department improves. Objective 1.1: Identify and define capability and capacity needs to forecast staffing and effectively plan for IT hiring. GTC identifies and improves the processes, standards, people, and technology needed to support consistent ongoing workforce analysis. Through identification and cybersecurity role categories and competency requirements to support workforce analysis and planning, GTC actively monitors the coverage of current and future IT competency needs. GTC maintains and grows the capability for mature workforce analytics and planning enterprise-wide basis. Objective 1.2: Expand IT education and outreach programs for non -IT personnel Technology has expanded into almost every aspect of the GTC mission. Improved understanding of technology enables non-it personnel to be more effective in using the productivity tools provided. It also improves the ability of policy decision makers to factor technology enablers and impacts into key decisions. Through increased internal IT education and outreach programs. Goal 2: Cybersecurity and Privacy Aim Protect critical systems and data Protection of IT assets is critical to the reliability of GTC information systems and the fidelity of the data within them. GTC employs a robust risk management approach through improved asset management, robust threat and vulnerability analysis, and established response and recovery plans and procedures by utilizing state-of-the-art antivirus and threat protection Sophos. This allows GTC to maintain its security posture, considering the integrated operations of GTC, consistent with its mission and business needs. With the use of Smart (cloud based) software enables prioritization to ensure that critical data and information, such as personally identifiable information, personal health information and public health data, are protected according to the appropriate level of risk throughout the system or asset s lifecycle. Through

implementation of Department-level programs to support ongoing identification, validation, and prioritization of cybersecurity risks. Furthermore, information sharing, including cyber threat information, across the Staff Divisions enables improved situational awareness across the Department, its Federal partners, and private sector stakeholders Goal 3: Facilities Security Maintain a safe and secure facility GTC utilizes Vector Security services which supplied and installed: four(4) external High Definition security cameras, three(3) internal High Definition security cameras, along with five(5) strategically placed motion detection sensors. GTC s state mandated safe which holds all distributed medications with a password protected lock and alarm system. GTC also has seven(7) pull station fire alarms equipped with one(1) centrally located control panel and one(1) annunciator Two(2) electrical security pads Basic Interactive Services Monitoring Intrusion (Police) Monitoring Fire (Local Fire Department) Four(4) Remote Key Entrance Twelve(12) Silent alarm equipment 24/7 monitoring system Goal 4: Technology Equipment Deliver up-to-date state-of-the-art technology End-user equipment GTC utilizes Dell all-in-one desktop computers equipped with touch screens, in all offices and dosing rooms. All-in-one network HP Color Laserjet Printers Royal 100MX Crosscut paper shredders

Brothers Laser printer (dosing rm) Logitech HD Pro Webcam (front office) Hitachi Interactive white board system in each conference room (2) Vizio security monitor Topaz signature pads Allworx IP phone system with digital voice mail. Lenovo Yoga laptop computers (conference room and mobile use) Network Digital time clock Technology Infrastructure GTC was designed from the ground up knowing that GTC would be utilizing and depend on a secure, fast and reliable technology infrastructure. Wiring category 6 cable 4 to 8 ports in every room and office HDMI conference rooms Centrally located secured MDF room HP call manager server (ip phones) Next wave in WiFi- Netgear Nighthawk x8 with firewall enabled Windstream router (isdn connection with built-in redundancy and firewall) Goal 5 Maintenance GTC continually employs the latest up-to-date software, security intrusion detection and Windows OS with daily/weekly/monthly updates as they are created. GTC will stay abreast of requirements and changes as they emerge and ensue that application vendors and system developers are current. Both technical and operational processes for capturing and sharing information will need to be in compliance with the new standards as they evolve. Goal 6 Training and Education GTC continues to provide its staff with training as new and emerging technologies are developed and implemented. Provide relevant tools and process training for It and non-it staff Utilize Team-Viewer to provide on-site remote training and support

Continue onsite and remote staff training utilizing our conference room LCD projectors and Interactive white boards.