Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
The What Ifs: Navigating Compliance and High Risk Threats
October 6, 2016
Speakers
Robert Mireles, CIPMSr. Healthcare Privacy Specialist for Managed Privacy Services
FairWarning
Chuck BurbankCISO and Director of
Managed Privacy ServicesFairWarning
Trent Long, CHPManager of Managed
Privacy ServicesFairWarning
Vinson Cao, CIPP/USLead Privacy Analyst
FairWarning
Agenda
• What If Scenarios:
Self Modification
Patients of Interest
Compromised/Misused Credentials
• Do You Know Who Your Users Are?
What If: Self Modification
What if users were modifying their personal medical records at your organization?
Would you know if…
- Your users were deleting charges?
- Credentialed staff were self-prescribing narcotics?
- Users were altering undesirable medical results?
What implications would this have on your organization?
- Federal Investigations
- Fraud
- Patient Safety
- Lost Revenue
What If: Self Modification
How to prevent and detect users from modifying their personal records:
-Verify which events in your data are tied to modifying, creating or deleting records
-Build a self-exam report that specifically looks at these types of events
What If: Self Modification
What If: Patients of Interest
• What if you had victims from a high profile incident at your facility?
• Would you be worried about their records being improperly accessed?
• How would you feel if you were one of those victims?
• How would the organization be impacted?
What If: Patients of Interest
How do you detect users accessing your high profile patients?
• Patient of Interest Report detects how many users touch a patient’s record
• Determine the average amount of users that access a patient on a daily basis
Benefits of Report include:
• Patient of Interest supplements your VIP Snooping Reports
• Catches patients that are not flagged in system
What If: Patients of Interest
What If: Patients of Interest
What If: Patients of Interest
What If: Compromised/Misused Credentials
• What if a user’s credentials were compromised from a phishing or malware attack?
• What Impact could this have on your organization?
• What if you have a disgruntled employee abusing their access rights in your organization?
What If: Compromised/Misused Credentials
Detection and Prevention:
-Monitor User Behavior through High Access Reports
-Focus on users that have access to full demographic and insurance information
-Review your event data to potential filter down on patient demographic access
What If: Compromised/Misused Credentials
What If: Compromised/Misused Credentials
Compromised/Misused Credentials: Detecting Simultaneous Logins
• Simultaneous login reports detect abnormal user behavior You can identify anomalies that may be indicative of a brute force attack on your organizations data.
• This report can also identity users that are sharing their credentials with other individuals.
• Credentials are compromised through phishing and malware attacks
• Report is accessed via the Analytics Library
Compromised/Misused Credentials: Detecting Simultaneous Logins
Compromised/Misused Credentials: Detecting Simultaneous Logins
Do You Know Who Your Users Are?
• If you were audited, would you be able to identify all your users?
• Can you audit for a specific user across all applications?
• What are best practices?
• Implement Identity Management throughout your applications
• Know where ALL your users are-This includes your contractors, vendors, etc.
Questions?For more information, please visit:
www.FairWarning.com
Email:[email protected]
When: October 18, 2016
Time: 2:00 pm EDT/ 11:00 am PDT
Registration Fee: No Charge
How FairWarning Managed Privacy Services reduces risk and enhances compliance through expert monitoring.
How We Can Help
Join us for the next FairWarning Executive Series Webinar on October 18, 2016