1 / 11

XAHIVE International LLC Ottawa • New York

XAHIVE International LLC Ottawa • New York Comprehensive Secure Communication, Cybersecurity and Privacy Assessment Services Co-founders: David Mohajer & Sem Ponnambalam. Top 10 Healthcare data breaches in 2015.

bpulliam
Download Presentation

XAHIVE International LLC Ottawa • New York

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. XAHIVE International LLC Ottawa • New York Comprehensive Secure Communication, Cybersecurity and Privacy Assessment Services Co-founders: David Mohajer & Sem Ponnambalam

  2. Top 10 Healthcare data breaches in 2015 Source: Forbes - http://www.forbes.com/sites/danmunro/2015/12/31/data-breaches-in-healthcare-total-over-112-million-records-in-2015/#2715e4857a0b6c2d393e7fd5 Total: 111 Million (almost 35% U.S. Population)

  3. Cybersecurity Budget “At a minimum, 10% of the IT budget should be earmarked for the cybersecurity fundamentals.” Ponemon Institute, 2015 Cybersecurity fundamentals: • Education • Secure communication and encryption tools TechValidate Survey, 2015

  4. Increasing Knowledge & Raising Awareness Human error accounts for 30% of data loss. Increasing the awareness amongst end users is crucial. • Set up security compliance-related policies for all computer users • Increase education and awareness • Create an adequate communications plan in the event of a breach Source: http://gbr.pepperdine.edu/2010/08/the-cost-of-lost-data/

  5. Cybersecurity Governance Governance Framework: • Organizational structure • Work culture • Security Awareness • Cybersecurity governance Managing how the people, the applications and infrastructure interact.

  6. Everyone is Responsible for Cybersecurity • People • Training • Skills and Qualifications • Process • Management • Governance • IT Audits • Technology • Modern • Support deployment

  7. What is your Status Quo? Do you have systems and processes in place that 1. Involve high risk data? 2. Cannot be secured or audited?

  8. How is your data managed? Personal vs. Public information Data access Auditing Mission critical data

  9. Classify your Data Determine the threat level of the data being breached Determine the cost of auditing the data Determine how often access and control of the data changes

  10. Prevent Data Loss Policy review • Deterrents • Planned responses • Automated checks and balances

  11. Thank You! 347 Fifth Avenue. New York, New York, 10016 sales@xahive.com 646-205-2246

More Related