Background
In 2010 there were 18 major breaches, potential compromise of more than 500 individual records containing unprotected patient health information, reported monthly to the Office of Civil Rights (OCR). To be exact 214 total notifications were made in 2010. As bad as this sounds it was probably nowhere near the real number. Why? Because most organizations still do not have the level of system or data awareness needed to even know when unauthorized access or disclosure is occurring. This does not even address the higher number of smaller compromises that occur every day in most healthcare organizations. The take away from this ought to be validation that the old practices of relying on barriers to keep the bad guys out and data secure are not sufficient anymore.
In addition the regulatory landscape continues to have new privacy and security requirements introduced making compliance all the more challenging. It's not simply HIPAA anymore. Now its HIPAA, HITECH, PCI, FRCP, Red Flags, State laws, business partner requirements, etc. It ought to be obvious, once again, that there is an emerging standard of care in healthcare for data security that requires a more precise level of informational awareness.
Such awareness is enabled by harnessing the intelligence waiting in the log information within the enterprise. But simply collecting the logs and reviewing them reactively, or even periodically, is not enough. Healthcare today needs the right tools and technologies to automate the collection, analysis and reporting, but more importantly the need to be able to correlate multiple log inputs from myriad sources to create a more accurate picture of exactly what happened, who was involved, and the status of the information or system involved.
In this exclusive session, healthcare organizations will learn about:
- Why system and data security awareness is so important and what makes it difficult in healthcare today;
- Basic log management functions and why automation is necessary and critical;
- Whats involved in user activity monitoring and what makes this a challenge in healthcare;
- What is SIEM, how it enables proactive or near real time security and compliance, and why its such a powerful tool for transforming user behavior.