Leveraging the Cloud & Managing Compliance HITRUST Alliance.

Similar documents
IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Deploying to the Cloud: A Case study on the Development of EHNAC s Cloud Enabled Accreditation Program (CEAP)

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Microsoft Security Management

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

Seamless Security in the Age of Cloud Services: Securing SaaS Applications & Cloud Workloads

SYMANTEC DATA CENTER SECURITY

Building your Castle in the Cloud for Flash Memory

Commercial Product Matrix

Best Practices in Securing a Multicloud World

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

Introduction To Cloud Computing

INTO THE CLOUD WHAT YOU NEED TO KNOW ABOUT ADOPTION AND ENSURING COMPLIANCE

The Data Center is Dead Long Live the Virtual Data Center

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Enterprise & Cloud Security

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Why the cloud matters?

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Securing the Cloud Today: How do we get there?

CHEM-E Process Automation and Information Systems: Applications

Cybowall Solution Overview

Mitigating Risks with Cloud Computing Dan Reis

HIPAA AND SECURITY. For Healthcare Organizations

Data Security: Public Contracts and the Cloud

Azure SQL Database Basics

Driving Business Outcomes: Cisco Data Center Innovation and Solutions

Computing as a Service

Securing Data in the Cloud: Point of View

The First Six Steps to Securing Remote Locations 1

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Building Trust in the Era of Cloud Computing

HITRUST ON THE CLOUD. Navigating Healthcare Compliance

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management

INFINIT Y TOTAL PROTECTION

Securing Your Cloud Introduction Presentation

Securing the Modern Data Center with Trend Micro Deep Security

Cloud Communications for Healthcare

Third Party Cloud Services Its Adoption in the New Age

Cloud Computing: Is it safe for you and your customers? Alex Hernandez DefenseStorm

Protecting Health Information

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

A Comprehensive Guide to Remote Managed IT Security for Higher Education

Cloud Computing, SaaS and Outsourcing

Qualys Cloud Platform

Cloud Computing and Its Impact on Software Licensing

ArcGIS in the Cloud. Andrew Sakowicz & Alec Walker

Data Loss Prevention:

Transform Your Business To An Open Hybrid Cloud Architecture. Presenter Name Title Date

Future Shifts in Enterprise Architecture Evolution. IPMA Marlyn Zelkowitz, SAP Industry Business Solutions May 22 nd, 2013

Converged Cloud and Digital Transformation: A Strategy for Business Success

Cloud Computing Briefing Presentation. DANU

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Cloud Services. Infrastructure-as-a-Service

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Flash in a Hybrid Cloud World. How Cloud Shift will affect flash in the Data Center Steve Knipple: Cloud Shift Advisors

Virtual Tech Update Intercloud Fabric. Michael Petersen Systems Engineer, Cisco Denmark

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

THALES DATA THREAT REPORT

SGS CYBER SECURITY GROWTH OPPORTUNITIES

Five Essential Capabilities for Airtight Cloud Security

Shaping the Cloud for the Healthcare Industry

McAfee Skyhigh Security Cloud for Amazon Web Services

Investor presentation

AWS Agility + Splunk Visibility = Cloud Success. Splunk App for AWS Demo. Laura Ripans, AWS Alliance Manager

Security Readiness Assessment

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Matrix IT work Copyright Do not remove source or Attribution from any graphic or portion of graphic

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

Moving Workloads to the Public Cloud? Don t Forget About Security.

Protecting PHI in the Cloud. Session #47, February 20, 2017 Kurt J. Long, Founder & CEO, FairWarning, Inc.

The Evolution of Data Center Security, Risk and Compliance

Encrypting PHI for HIPAA Compliance on IBM i. All trademarks and registered trademarks are the property of their respective owners.

Using Workload Automation to Optimize Hybrid Cloud Estates

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Government IT Modernization and the Adoption of Hybrid Cloud

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

Copyright 2011 EMC Corporation. All rights reserved.

IT your way - Hybrid IT FAQs

JOURNEY TO CLOUD (J2C) CONSUMING TECHNOLOGY, NOT OWNING IT

Modern Database Architectures Demand Modern Data Security Measures

in collaboration with

SIEMLESS THREAT MANAGEMENT

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Cybersecurity Roadmap: Global Healthcare Security Architecture

Layer Security White Paper

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Network Services, Cloud Computing and Virtualization

Azure Stack: The hybrid cloud revolution

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Accelerate your Azure Hybrid Cloud Business with HPE. Ken Won, HPE Director, Cloud Product Marketing

Reinvent Your 2013 Security Management Strategy

Presenting the VMware NSX ECO System May Geert Bussé Westcon Group Solutions Sales Specialist, Northern Europe

PULSE TAKING THE PHYSICIAN S

Transcription:

Leveraging the Cloud & Managing Compliance

Introduction Greg Miller Principal Schellman & Company, Inc. Blake Sutherland Vice President, Enterprise Business Trend Micro

Agenda Cloud Increase Characteristics Deployment Type Challenges Compliance Q/A

The cloud services companies of all sizes The cloud is for everyone. The cloud is a democracy. Marc Benioff, CEO - Salesforce.com

The Increase Scalability Cost Efficiency Services Healthcare Cloud Computing Market to Reach $9.48B by 2020

Characteristics Broad network access Resource pooling Measured service On-demand self-service Rapid elasticity (provisioning/de-provisioning)

Types Public Private Community Hybrid

Deployment SaaS On-Demand software typically in the cloud PaaS Delivery of a computing platform and solution stack as a service IaaS Delivery of computer infrastructure (virtualization) as a services along with storage and networking.

Challenge: Infrastructure for improving patient health, engagement and wellness is always changing 6000 Apps in itunes Telemedicine, e-health Internet of Things Medical Devices Cloud Portals Mobile Clinician

Challenge: In an already complex environment New & Legacy Systems Windows XP Windows 2003 Office 365 Cloud Environments with Azure, Amazon and others Third Party / Cloud Hosted Data Center Home Health PaAent Portal Claims EHR Billing Human Resources AnalyAcs Complexity is Growing Telemedicine mhealth Internet of Things Call in the consultants!!!! Various consultants brought in due to lower IT spend PaAent Portal web app Lab EHR PaAent Portal Human Resources Pharmacy AnalyAcs Billing / Finance EHR Home Health Lab Claims PaAent Portal On-Premise Data Center Medical Devices & Video systems

Challenge: With Patient Data constantly in motion Enterprise data management systems, legacy and new environments, cloud email.. Home users accessing their Pa=ent Portal In the doctor s EHR system Medical Devices Managing paaent data and keeping it secure along the way is of criacal importance Healthcare staff on the go, mobile devices etc. POS Systems, payment, payers, insurance Government Health Exchanges

Challenge: Which is valuable to criminals FiUh Annual Benchmark Study on Privacy & Security of Healthcare Data, Ponemon InsAtute, May 2015 And there are many ways to profit from this information (currently reported at selling for $50 per record): Drug fraud Create credit cards and/or use credit card information Create new identity Buy and sell prescriptions File false Medical Claims Tax fraud Bribery and ransom with embarassing health information

Result: a predictable outcome Breaches escalaang Medical/Healthcare: 42% of all breaches (IDRC) MulAple breaches in the last year at various healthcare organizaaons FBI: Healthcare is not prepared FDA to medical device manufacturers: Improve security Regulatory environment complex HIPAA, HITECH, PCI DSS 3.0 Healthcare organizaaons are behind in security Spend less on IT security than any other industry

The Statistics 253 breaches 112 million records 35% of the population 21% of the total number of incidents Compared to 2014, increase by 10%

Cloud Security is a Shared Responsibility Cloud User Cloud Provider Content and ApplicaAons Plaborm, ApplicaAons OperaAng System, Network & Firewall ConfiguraAon Data EncrypAon Network Traffic ProtecAon Founda=on Services Compute Storage Database Networking Global Infrastructure Domains, Availability Zones Regions Cloud providers deliver a secure infrastructure. But YOU need to protect what you pu IN the cloud your workloads.

Who s responsibility depends on the cloud service Source: Gartner April 2015

Mapping products to compliance

Connected Threat Defense Enable rapid response through shared threat intelligence and delivery of real-ame security updates RESPOND PREVENT Assess potenaal vulnerabiliaes and proacavely protect endpoints, servers and applicaaons Gain centralized visibility across the system, and analyze and assess impact of threats VISIBILITY & CONTROL DETECT Detect advanced malware, behavior and communicaaons invisible to standard defenses

Trend Micro Enterprise Security System SERVERS NETWORKS CENTRALIZED VISIBILITY & CONTROL USERS 3 rd Party SIEM, Provisioning, & OperaAonal Management Unified Dashboard User-Based Visibility SECURITY CAPABILITIES Forensics & AnalyAcs Policy Management EncrypAon & DLP AnA-Malware & Content Filtering Behavior Monitoring & Sandboxing ApplicaAon Control Intrusion PrevenAon Integrity Monitoring Response & Containment SHARED THREAT INTELLIGENCE 3 rd Party Threat InformaAon Local Threat Intelligence Threat AcAvity Recording 21 Copyright 2016 Trend Micro Inc.

Constantly improve our products The market leader in server security for the 6th straight year! 1 Trend Micro 30.3% A Leader in the Gartner MQ for Endpoint ProtecAon Plaborms for 13 consecuave years! #1 in protecaon and performance IDC, Server Security: VirtualizaAon and Cloud Changes Everything, January 2016 22 Copyright 2016 Trend Micro Inc. 2015 NSS Labs Breach DetecAon Tests Trend Micro Blog, January 2015 hmp://www.av-test.org (Jan 2014 Aug2015 test results, Corporate SoluAons on Win XP,7, 8 Systems)

Audit and Assessment

Options

Questions?

Thank You!