SlideShare a Scribd company logo
Information Security is NOT an
           IT Issue

           Medi-Sota – March 21st, 2012
   Presented by Evan Francen, President – FRSecure, LLC




             www.FRSecure.com | 952-467-6381
Introduction
 Before we get started:
 • This is not your typical presentation.
 • What you have to say is as important as what I am
   going to tell you.
 • You are encouraged to participate!

       I will ask you questions, if you don’t ask me some!




Healthcare Security Solutions
Introduction
 FRSecure
 • Information security consulting company – it’s all
   we do.
 • Established in 2008 by people who have earned
   their stripes in the field.
 • We help small to medium sized organizations
   solve information security challenges.


Healthcare Security Solutions
Introduction
Speaker – Evan Francen, CISSP CISM CCSK
•   President & Co-founder of FRSecure
•   20 years of information security experience
•   Security evangelist with more than 700 published articles
•   Experience with 150+ public & private organizations.




Healthcare Security Solutions
Introduction
                                Topics

          • Information Security Explained
• The Problem – Information Security Is Not an IT Issue
   • The Solution – Making Information Security a
                     Business Issue
          • FRSecure Healthcare Solutions



Healthcare Security Solutions
When you think of information
   security, how do you feel?
   Be honest




Healthcare Security Solutions
What is information
   security?

    This is really a question for you




Healthcare Security Solutions
What is Information Security?
 The application of Administrative, Physical and Technical controls in an effort
 to protect the Confidentiality, Integrity, and Availability of Information.
 Controls:
 Administrative – Policies, procedures, processes
 Physical – Locks, cameras, alarm systems
 Technical – Firewalls, anti-virus software, permissions

 Protect:
 Confidentiality – Disclosure to authorized entities
 Integrity – Accuracy and completeness
 Availability – Accessible when required and authorized



Healthcare Security Solutions
The Problem – Information Security Is Not an IT
                      Issue
 The application of Administrative, Physical and Technical controls in an effort
 to protect the Confidentiality, Integrity, and Availability of Information.


 IT-centric information security over-emphasizes Technical Control, often at
 the expense of Administrative and Physical Control.


 IT-centric information security also places an over-emphasis on Availability of
 systems, sometimes at the expense of Confidentiality and Integrity.




Healthcare Security Solutions
The Problem – Information Security Is Not an IT
                      Issue
 Lack of Administrative Controls:
 • People are the greatest risk
 • How well does IT write information security policy?
 • Poor information security training and awareness
 • Does IT have the necessary visibility into other parts of the business?
 • IT is the data custodian, not the data owner.
 • It’s easier to go through your secretary than it is your firewall.



Healthcare Security Solutions
The Problem – Information Security Is Not an IT
                      Issue
 Lack of Physical Controls:
 • IT is technical in nature, physical controls are not
 • It doesn’t matter how well your server is protected by permissions, anti-
   virus, host-based firewalls and intrusion prevention, if a bad guy (or gal)
   can walk in and steal it.
 • How does IT manage paper-based records with technology?
 • IT people don’t usually make good security guards.




Healthcare Security Solutions
The Problem – Information Security Is Not an IT
                      Issue
 In IT, availability is critical.
 • At times there are serious conflicts of interest between convenience and
   security.
 • IT can demonstrate an ROI for IT investments, but there is no ROI in
   information security.
 • IT has a budget (probably). Does information security have a budget?




Healthcare Security Solutions
The Solution – Making Information Security a
                  Business Issue

  Ultimately, the responsibility for information security
                lies with ______________.

                                   Do they know it?

                                Are they informed about
                                 information security?



Healthcare Security Solutions
The Solution – Making Information Security a
                    Business Issue
1. Obtain management approval for the establishment of an
   information security committee. (information security is NOT
   compliance)
2. Staff the committee with the right people.
3. Charter the information security committee.
4. Write policies in committee, and write the policies the right way.
5. Use the committee to communicate and advocate policy.



 Healthcare Security Solutions
The Solution – Making Information Security a
                  Business Issue
6. Conduct a thorough risk assessment (annually)
7. Regularly brief management on status.
8. Train employees and make it relevant to their personal and
work lives.
9. Establish and enforce compliance with policy.
10. Don’t forget about waivers.




Healthcare Security Solutions
FRSecure Healthcare Solutions
FRSecure LLC is a full-service information security consulting company;
dedicated to information security education, awareness, application, and
improvement. FRSecure helps our clients understand, design, implement, and
manage best-in-class information security solutions; thereby achieving optimal
value for every information security dollar spent. Visit us online at
http://www.frsecure.com.

We have helped dozens of healthcare organizations cost-effectively
understand, assess, and manage information security.

• Meaningful Use Risk Assessments
• Information Security Program Development
• Information Security Program Management


Healthcare Security Solutions
FRSecure Value Proposition
• FRSecure’s Methodology – FRSecure has developed a proprietary approach to assessing
    information security risks. It’s more than a checklist of questions and recorded answers. Our
    approach gives you a full picture of your risks - prioritized and rated - with recommended
    solutions, so you know which security investments will have the greatest impact.
•   FRSecure’s Project Management – FRSecure’s Project Management leader is Evan
    Francen. Evan possesses a unique blend of real-world experience and a passion for the industry
    that is unparalleled amongst the competition. Evan has more than 15 years of information
    security experience as a leader in, and consultant for hundreds of companies ranging from the
    Fortune 100 to SMBs. Evan’s BIO is available upon request.
•   Full Transparency – FRSecure strongly believes in empowering our customers. The more
    knowledge transfer that occurs during our engagement, the more value our customers realize.
    FRSecure fully discloses the methods, tools, and configurations used to perform analysis work
    for our customers in the hope that they can easily adopt our processes for their future benefit.




Healthcare Security Solutions

More Related Content

DOCX
The Role of Information Security Policy
PPTX
Information Systems Policy
PDF
Trustwave Cybersecurity Education Catalog
PPTX
Importance Of A Security Policy
PDF
Security Awareness Training
PPT
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
PPTX
Cybertopicsecurity_3
PPTX
Information security: importance of having defined policy & process
The Role of Information Security Policy
Information Systems Policy
Trustwave Cybersecurity Education Catalog
Importance Of A Security Policy
Security Awareness Training
Information Security Lesson 11 - Policies & Procedures - Eric Vanderburg
Cybertopicsecurity_3
Information security: importance of having defined policy & process

What's hot (20)

PPTX
Become CISSP Certified
PDF
How To Promote Security Awareness In Your Company
PDF
Aetna information security assurance program
PDF
International Journal of Engineering Research and Development
PDF
IT Security & Governance Template
PPTX
Cissp- Security and Risk Management
PDF
Simplifying the data privacy governance quagmire building automated privacy ...
PPTX
Information Security - Back to Basics - Own Your Vulnerabilities
PPTX
20100224 Presentation at RGIT Mumbai - Information Security Awareness
PPSX
Information Security Governance: Concepts, Security Management & Metrics
PPTX
Information Security For Small Business
PDF
Security Awareness
PPTX
CISSP Certification-Asset Security
PDF
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
PDF
IT Security - Guidelines
PPTX
CISSP Certification- Security Engineering-part1
PPTX
IT Security Management -- People, Procedures and Tools
PPTX
Security Awareness and Training
PPT
Security Lifecycle Management
Become CISSP Certified
How To Promote Security Awareness In Your Company
Aetna information security assurance program
International Journal of Engineering Research and Development
IT Security & Governance Template
Cissp- Security and Risk Management
Simplifying the data privacy governance quagmire building automated privacy ...
Information Security - Back to Basics - Own Your Vulnerabilities
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Information Security Governance: Concepts, Security Management & Metrics
Information Security For Small Business
Security Awareness
CISSP Certification-Asset Security
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
IT Security - Guidelines
CISSP Certification- Security Engineering-part1
IT Security Management -- People, Procedures and Tools
Security Awareness and Training
Security Lifecycle Management
Ad

Viewers also liked (20)

PDF
NTXISSACSC3 - Metasploit Year in Review by James Lee
PPTX
FRSecure Company Overview
PDF
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
PDF
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
PDF
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
PDF
NTXISSACSC4 - The Art of Evading Anti-Virus
PDF
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
PDF
NTXISSACSC4 - A Day in the Life of a CISO
PDF
NTXISSACSC4 - A Brief History of Cryptographic Failures
PDF
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
PDF
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
PDF
NTXISSACSC4 - World of Discovery
PDF
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
PDF
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
PPTX
#5 DataBeersBCN -"Location Based Business Oportunity Detector"
PDF
NTXISSACSC4 - How Not to Build a Trojan Horse
PDF
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
PDF
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
PDF
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
PDF
NTXISSACSC4 - Security for a New World
NTXISSACSC3 - Metasploit Year in Review by James Lee
FRSecure Company Overview
NTXISSACSC4 - Between The Keyboard And The Chair - Cybersecurity's Secret Weapon
NTXISSACSC4 - Array Networks - A Layered Approach to Web and Application Secu...
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - The Art of Evading Anti-Virus
NTXISSACSC4 - Artifacts Are for Archaeologists: Why Hunting Malware Isn't Enough
NTXISSACSC4 - A Day in the Life of a CISO
NTXISSACSC4 - A Brief History of Cryptographic Failures
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
#5 DataBeersBCN -"Location Based Business Oportunity Detector"
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - Ransomware: History Analysis & Mitigation
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Introducing the Vulnerability Management Maturity Model - VM3
NTXISSACSC4 - Security for a New World
Ad

Similar to Information Security is NOT an IT Issue (20)

PPTX
Information+security rutgers(final)
PPTX
Risk Management Approach to Cyber Security
PDF
Improving Healthcare Risk Assessments to Maximize Security Budgets
PDF
Herzig preview
PPTX
WANTED – People Committed to Solving our Information Security Language Problem
PDF
arcsight_scmag_hcspecial
PPT
FRSecure Sales Deck
PDF
Bearing solutions healthcare security ver 0.1
PDF
Healthcare Security by Senior Security Consultant Lennart Bredberg
PDF
Information security in healthcare managing risk Terrell W. Herzig
PDF
Addressing Cybersecurity Strategically
PDF
Electronic Healthcare Record Security and Management in Healthcare Organizations
PPTX
Cyber Security and Healthcare
DOCX
Project securing a microsoft windows environment e
PDF
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
PDF
Cybersecurity Challenges in Healthcare
PDF
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
PPTX
WANTED - People Committed to Solving Our Information Security Language Problem
DOCX
CST 610 RANK Inspiring Innovation--cst610rank.com
PDF
CST 610 RANK Become Exceptional--cst610rank.com
Information+security rutgers(final)
Risk Management Approach to Cyber Security
Improving Healthcare Risk Assessments to Maximize Security Budgets
Herzig preview
WANTED – People Committed to Solving our Information Security Language Problem
arcsight_scmag_hcspecial
FRSecure Sales Deck
Bearing solutions healthcare security ver 0.1
Healthcare Security by Senior Security Consultant Lennart Bredberg
Information security in healthcare managing risk Terrell W. Herzig
Addressing Cybersecurity Strategically
Electronic Healthcare Record Security and Management in Healthcare Organizations
Cyber Security and Healthcare
Project securing a microsoft windows environment e
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Cybersecurity Challenges in Healthcare
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
WANTED - People Committed to Solving Our Information Security Language Problem
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com

More from Evan Francen (19)

PPTX
Keynote @ ISC2 Cyber Aware Dallas
PPTX
Harrisburg BSides Presentation - 100219
PPTX
Managing Third-Party Risk Effectively
PPTX
Step Up Your Data Security Against Third-Party Risks
PPTX
Information Security & Manufacturing
PPTX
Simple Training for Information Security and Payment Fraud
PPTX
MHTA Social Engineering Presentation - 050917
PPTX
People. The Social Engineer's Dream - TechPulse 2017
PPTX
AFCOM - Information Security State of the Union
PPTX
Managing Risk or Reacting to Compliance
PPTX
TIES 2013 Education Technology Conference
PPTX
Mobile Information Security
PPTX
Information security challenges in today’s banking environment
PPTX
Information Security in a Compliance World
PPTX
Information Security For Leaders, By a Leader
PPTX
People are the biggest risk
PPTX
FRSecure's Ten Security Principles to Live (or die) By
PPTX
Meaningful Use and Security Risk Analysis
PPTX
An Introduction to Information Security
Keynote @ ISC2 Cyber Aware Dallas
Harrisburg BSides Presentation - 100219
Managing Third-Party Risk Effectively
Step Up Your Data Security Against Third-Party Risks
Information Security & Manufacturing
Simple Training for Information Security and Payment Fraud
MHTA Social Engineering Presentation - 050917
People. The Social Engineer's Dream - TechPulse 2017
AFCOM - Information Security State of the Union
Managing Risk or Reacting to Compliance
TIES 2013 Education Technology Conference
Mobile Information Security
Information security challenges in today’s banking environment
Information Security in a Compliance World
Information Security For Leaders, By a Leader
People are the biggest risk
FRSecure's Ten Security Principles to Live (or die) By
Meaningful Use and Security Risk Analysis
An Introduction to Information Security

Recently uploaded (20)

PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
Cloud computing and distributed systems.
PDF
Machine learning based COVID-19 study performance prediction
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Advanced IT Governance
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
Big Data Technologies - Introduction.pptx
PDF
KodekX | Application Modernization Development
PDF
Approach and Philosophy of On baking technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
DOCX
The AUB Centre for AI in Media Proposal.docx
Advanced Soft Computing BINUS July 2025.pdf
Cloud computing and distributed systems.
Machine learning based COVID-19 study performance prediction
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Advanced IT Governance
The Rise and Fall of 3GPP – Time for a Sabbatical?
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
GamePlan Trading System Review: Professional Trader's Honest Take
Big Data Technologies - Introduction.pptx
KodekX | Application Modernization Development
Approach and Philosophy of On baking technology
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
“AI and Expert System Decision Support & Business Intelligence Systems”
The AUB Centre for AI in Media Proposal.docx

Information Security is NOT an IT Issue

  • 1. Information Security is NOT an IT Issue Medi-Sota – March 21st, 2012 Presented by Evan Francen, President – FRSecure, LLC www.FRSecure.com | 952-467-6381
  • 2. Introduction Before we get started: • This is not your typical presentation. • What you have to say is as important as what I am going to tell you. • You are encouraged to participate! I will ask you questions, if you don’t ask me some! Healthcare Security Solutions
  • 3. Introduction FRSecure • Information security consulting company – it’s all we do. • Established in 2008 by people who have earned their stripes in the field. • We help small to medium sized organizations solve information security challenges. Healthcare Security Solutions
  • 4. Introduction Speaker – Evan Francen, CISSP CISM CCSK • President & Co-founder of FRSecure • 20 years of information security experience • Security evangelist with more than 700 published articles • Experience with 150+ public & private organizations. Healthcare Security Solutions
  • 5. Introduction Topics • Information Security Explained • The Problem – Information Security Is Not an IT Issue • The Solution – Making Information Security a Business Issue • FRSecure Healthcare Solutions Healthcare Security Solutions
  • 6. When you think of information security, how do you feel? Be honest Healthcare Security Solutions
  • 7. What is information security? This is really a question for you Healthcare Security Solutions
  • 8. What is Information Security? The application of Administrative, Physical and Technical controls in an effort to protect the Confidentiality, Integrity, and Availability of Information. Controls: Administrative – Policies, procedures, processes Physical – Locks, cameras, alarm systems Technical – Firewalls, anti-virus software, permissions Protect: Confidentiality – Disclosure to authorized entities Integrity – Accuracy and completeness Availability – Accessible when required and authorized Healthcare Security Solutions
  • 9. The Problem – Information Security Is Not an IT Issue The application of Administrative, Physical and Technical controls in an effort to protect the Confidentiality, Integrity, and Availability of Information. IT-centric information security over-emphasizes Technical Control, often at the expense of Administrative and Physical Control. IT-centric information security also places an over-emphasis on Availability of systems, sometimes at the expense of Confidentiality and Integrity. Healthcare Security Solutions
  • 10. The Problem – Information Security Is Not an IT Issue Lack of Administrative Controls: • People are the greatest risk • How well does IT write information security policy? • Poor information security training and awareness • Does IT have the necessary visibility into other parts of the business? • IT is the data custodian, not the data owner. • It’s easier to go through your secretary than it is your firewall. Healthcare Security Solutions
  • 11. The Problem – Information Security Is Not an IT Issue Lack of Physical Controls: • IT is technical in nature, physical controls are not • It doesn’t matter how well your server is protected by permissions, anti- virus, host-based firewalls and intrusion prevention, if a bad guy (or gal) can walk in and steal it. • How does IT manage paper-based records with technology? • IT people don’t usually make good security guards. Healthcare Security Solutions
  • 12. The Problem – Information Security Is Not an IT Issue In IT, availability is critical. • At times there are serious conflicts of interest between convenience and security. • IT can demonstrate an ROI for IT investments, but there is no ROI in information security. • IT has a budget (probably). Does information security have a budget? Healthcare Security Solutions
  • 13. The Solution – Making Information Security a Business Issue Ultimately, the responsibility for information security lies with ______________. Do they know it? Are they informed about information security? Healthcare Security Solutions
  • 14. The Solution – Making Information Security a Business Issue 1. Obtain management approval for the establishment of an information security committee. (information security is NOT compliance) 2. Staff the committee with the right people. 3. Charter the information security committee. 4. Write policies in committee, and write the policies the right way. 5. Use the committee to communicate and advocate policy. Healthcare Security Solutions
  • 15. The Solution – Making Information Security a Business Issue 6. Conduct a thorough risk assessment (annually) 7. Regularly brief management on status. 8. Train employees and make it relevant to their personal and work lives. 9. Establish and enforce compliance with policy. 10. Don’t forget about waivers. Healthcare Security Solutions
  • 16. FRSecure Healthcare Solutions FRSecure LLC is a full-service information security consulting company; dedicated to information security education, awareness, application, and improvement. FRSecure helps our clients understand, design, implement, and manage best-in-class information security solutions; thereby achieving optimal value for every information security dollar spent. Visit us online at http://www.frsecure.com. We have helped dozens of healthcare organizations cost-effectively understand, assess, and manage information security. • Meaningful Use Risk Assessments • Information Security Program Development • Information Security Program Management Healthcare Security Solutions
  • 17. FRSecure Value Proposition • FRSecure’s Methodology – FRSecure has developed a proprietary approach to assessing information security risks. It’s more than a checklist of questions and recorded answers. Our approach gives you a full picture of your risks - prioritized and rated - with recommended solutions, so you know which security investments will have the greatest impact. • FRSecure’s Project Management – FRSecure’s Project Management leader is Evan Francen. Evan possesses a unique blend of real-world experience and a passion for the industry that is unparalleled amongst the competition. Evan has more than 15 years of information security experience as a leader in, and consultant for hundreds of companies ranging from the Fortune 100 to SMBs. Evan’s BIO is available upon request. • Full Transparency – FRSecure strongly believes in empowering our customers. The more knowledge transfer that occurs during our engagement, the more value our customers realize. FRSecure fully discloses the methods, tools, and configurations used to perform analysis work for our customers in the hope that they can easily adopt our processes for their future benefit. Healthcare Security Solutions