SlideShare a Scribd company logo
Healthcare Information Transformation #HIT12 | 4/3/2012 | Jacksonville, FL
Managing and Securing Mobile Devices
Marie-Michelle Strah, PhD
Introductions

   Marie-Michelle Strah, PhD
   Federal Program Manager
   Applied Information Sciences

   Ideas @ AIS: http://ideas.appliedis.com/
   michelle.strah@appliedis.com
   Twitter: @cyberslate
   Blog: http://lifeincapslock.com
   Linkedin: http://www.linkedin.com/in/drstrah
Workshop Goals
•   Building productivity
•   Reducing risk
•   Mobile device encryption
•   Access control
•   Policy vs. technical controls
•   MDM technologies – maturity?
•   Unexpected expenses of data protection

Source: http://www.readwriteweb.com/enterprise/2011/03/consumerization-of-
it-95-of-in.php
Agenda

 • Conceptualizing “mobile health” –
   business cases for IT infrastructure
   management
 • GRC – governance, risk and compliance in
   a CoIT framework
 • Best practices for CoIT in healthcare
    • Security Risk Analysis
    • PTA/PIA
    • Stakeholders
    • Policy vs. technical controls
 • Lessons learned | Considerations for the
   enterprise
Introduction: #mhealth Summit 2011

• Mobile is enabler…
  • Patients
  • Providers
  • “Wellness lifecycle”
  • Productivity

• From “there’s an app for that” to enterprise
  information management lifecycle
   • Content delivery
   • Cloud and thin client
   Source: http://healthpopuli.com/2011/02/15/success-factor-for-mobile-health-mash-up-
   the-development-team/
Conceptualizing “mobile health”
The Ideal




     Employees       Contractors       Partners
      Need to know
                                   Need to manage




      InfoSec          IT Ops             Legal
The Reality




    Employees   IT Ops        Contractors   Partners

       Manage

        Know




                    InfoSec     Legal
The Challenge



  •   There is no endpoint
  •   There is no perimeter
  •   Users own the data
                    Contractors  Partners
  •   No one owns the risk
         Employees

  •   Security doesn’t have control
  •   IT Ops own the databases
  •   IT Ops own the servers
  •   IT Ops own the apps
         InfoSec      IT Ops         Legal
GRC for Healthcare

 • Governance – organizational and IT
 • Risk – management and mitigation
 • Compliance – HITECH/Meaningful Use

 • BYOx/CoIT *must* be part of overall GRC
   strategy
    • Security Risk Analysis
    • PTA/PIA
    • Stakeholders – CPGs, workflow,
      training
    • Policy vs. technical controls
Enterprise Security Model

                         𝒙              𝒚
    𝑺 = (𝑷 ∗ 𝑨 )
Information Security (Collaborative Model)
Equals
People (all actors and agents)
Times
Architecture (technical, physical and
administrative)
Complexity = Higher Risks and Costs
Mobile Device Roundtable
Washington, DC
3/16/2012
http://healthit.hhs.gov/portal/server.pt?open=512&mode=2&objID=3816
Healthcare Information Transformation


      Master Data         Enterprise           Then…




                                        MDM2
MDM




                    EIM
      Management          Information          Master
                          Management           Device
                                               Management




                                                                        Data-
                                                                        centric
                                                            Device-     model
                                                            (or
                                                            hardware)
                               Reactive                     centric
                               Posture                      model
Minimum Technical Requirements


                                                 • Policy
           Encryption of
            Data at Rest
                                                 • Wireless
                                                 • Data segmentation (on premise, cloud,
                                                   metadata)
                                                 • Customer support (heterogeneity)
    Encryption of                                • Infection control
   Data in Motion
                                                 • MSIRT
                                                 • Vendor evaluation (the myth of the
                                                   “HIPAA Good Housekeeping Seal”)
           Two Factor                            • Applications: APM and ALM
          Authentication
                                                 • Infrastructure
                                                 • Costs

 HIPAA Security Rule: Remote Use
 http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf
Best Practices: Datacentric Model


1. This is NOT an IT problem
2. Privacy Impact Assessment: PHI, ePHI, PII
   (Compartmentalization and segregation)
3. Security Risk Analysis
4. MSIRT (policy and training)
5. Look to stakeholders for domain expertise in
   clinical workflows
6. Datacentricity: Use connected health framework
   reference (SOA) model
7. Governance, governance, governance
Lessons Learned: Risk-based Model


1. Define permissible mobile devices
2. Access control policies (time/geolocation)
3. Manage applications (third party tools/enterprise
   app store)
4. Integrate mobile devices onto network
5. Vendor evaluation
6. Costs

Source: http://www.beckershospitalreview.com/healthcare-information-technology/4-best-
practices-for-hospitals-managing-mobile-devices.html



Finally… consider issuing agency or organization
owned devices
THANK YOU!
 Marie-Michelle Strah, PhD
 Federal Program Manager
 Applied Information Sciences

 Ideas @ AIS: http://ideas.appliedis.com/
 michelle.strah@appliedis.com
 Twitter: @cyberslate
 Blog: http://lifeincapslock.com
 Linkedin: http://www.linkedin.com/in/drstrah

More Related Content

PDF
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
PDF
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
 
PPTX
Domain 2 - Asset Security
Maganathin Veeraragaloo
 
PDF
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Peter Tutty
 
PDF
Classification-HowToBoostInformationProtection
Gianmarco Ferri
 
DOC
Information security
Sanjay Tiwari
 
PPT
Introduction to information security - by Ivan Nganda
See You Rise Holdings
 
PPT
Dstca
ajay vj
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
 
Domain 2 - Asset Security
Maganathin Veeraragaloo
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
Peter Tutty
 
Classification-HowToBoostInformationProtection
Gianmarco Ferri
 
Information security
Sanjay Tiwari
 
Introduction to information security - by Ivan Nganda
See You Rise Holdings
 
Dstca
ajay vj
 

What's hot (20)

PDF
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Eryk Budi Pratama
 
PDF
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Cillian Kieran
 
PPTX
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
PPTX
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
NextLabs, Inc.
 
PDF
Whitepaper IBM Guardium Data Activity Monitor
Camilo Fandiño Gómez
 
PDF
Requirements for Implementing Data-Centric ABAC
NextLabs, Inc.
 
PDF
Addressing Gaps in Your Cyber Security
NextLabs, Inc.
 
PPTX
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
PDF
Digital Guardian and CDM
Greg Cranley
 
PPT
Privacy audittalkfinal
Alan Hartman
 
PDF
Data Center Security Market — Explore latest facts on networking 2025
Arushi00
 
PDF
Unit 5 v2
ShubhraGoyal4
 
PDF
Dlp Methodology
tbeckwith
 
PPTX
The privacy and security implications of AI, big data and predictive analytics
Dan Michaluk
 
PPTX
CISSP Certification-Asset Security
Hamed Moghaddam
 
PPTX
IT Asset Management by Miradore
Miradore
 
PPTX
Payment Card Industry Security Standards
Ashintha Rukmal
 
PPTX
CISSP - Chapter 2 - Asset Security
Karthikeyan Dhayalan
 
PDF
Executive Summary_2016
Annie Cute
 
PPTX
IT ASSET MANAGEMENT
Habeeb Abdul Kader
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Eryk Budi Pratama
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Cillian Kieran
 
GDPR Part 2: Quest Relevance
Adrian Dumitrescu
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
NextLabs, Inc.
 
Whitepaper IBM Guardium Data Activity Monitor
Camilo Fandiño Gómez
 
Requirements for Implementing Data-Centric ABAC
NextLabs, Inc.
 
Addressing Gaps in Your Cyber Security
NextLabs, Inc.
 
CISSP Certification- Security Engineering-part1
Hamed Moghaddam
 
Digital Guardian and CDM
Greg Cranley
 
Privacy audittalkfinal
Alan Hartman
 
Data Center Security Market — Explore latest facts on networking 2025
Arushi00
 
Unit 5 v2
ShubhraGoyal4
 
Dlp Methodology
tbeckwith
 
The privacy and security implications of AI, big data and predictive analytics
Dan Michaluk
 
CISSP Certification-Asset Security
Hamed Moghaddam
 
IT Asset Management by Miradore
Miradore
 
Payment Card Industry Security Standards
Ashintha Rukmal
 
CISSP - Chapter 2 - Asset Security
Karthikeyan Dhayalan
 
Executive Summary_2016
Annie Cute
 
IT ASSET MANAGEMENT
Habeeb Abdul Kader
 
Ad

Similar to Consumerization of IT: Mobile Infrastructure, Support and Security (20)

PDF
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
 
PDF
Security Awareness Training
Daniel P Wallace
 
PDF
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
 
PDF
Modern Methods for Managing Data Security
Enterprise Knowledge
 
PDF
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
PDF
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
Fabrizio Cilli
 
PPTX
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
PPTX
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
PDF
Integrating Information Protection Into Data Architecture & SDLC
DATAVERSITY
 
PDF
InDefend-Integrated Data Privacy Offerings
Data Resolve Technologies Pvt. Ltd.
 
PDF
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
 
PPTX
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
OnRamp
 
PPTX
Mobile Application Security
Lenin Aboagye
 
PPTX
Mobile application securitry risks ISACA Silicon Valley 2012
Symosis Security (Previously C-Level Security)
 
PPTX
Mobile device management v5
RoyGerritse
 
PDF
The Bigger They Are The Harder They Fall
Trillium Software
 
PDF
Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy
Qualcomm Life
 
PPTX
Health IT and Information security by Manish Tiwari
Apollo Hospitals Group and ATNF
 
PPTX
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
Danny Miller
 
PDF
Mergers and Acquisition Security - Areas of Interest
Matthew Rosenquist
 
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
 
Security Awareness Training
Daniel P Wallace
 
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
 
Modern Methods for Managing Data Security
Enterprise Knowledge
 
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
Fabrizio Cilli
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON
 
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP
 
Integrating Information Protection Into Data Architecture & SDLC
DATAVERSITY
 
InDefend-Integrated Data Privacy Offerings
Data Resolve Technologies Pvt. Ltd.
 
Guardium Data Activiy Monitor For C- Level Executives
Camilo Fandiño Gómez
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
OnRamp
 
Mobile Application Security
Lenin Aboagye
 
Mobile application securitry risks ISACA Silicon Valley 2012
Symosis Security (Previously C-Level Security)
 
Mobile device management v5
RoyGerritse
 
The Bigger They Are The Harder They Fall
Trillium Software
 
Qualcomm Life Connect 2013: 2net System Overview, Security and Privacy
Qualcomm Life
 
Health IT and Information security by Manish Tiwari
Apollo Hospitals Group and ATNF
 
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
Danny Miller
 
Mergers and Acquisition Security - Areas of Interest
Matthew Rosenquist
 
Ad

More from Marie-Michelle Strah, PhD (17)

PDF
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Marie-Michelle Strah, PhD
 
PDF
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
Marie-Michelle Strah, PhD
 
PDF
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
 
PDF
Security and Privacy in SharePoint 2010: Healthcare
Marie-Michelle Strah, PhD
 
PPTX
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
Marie-Michelle Strah, PhD
 
PPTX
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Marie-Michelle Strah, PhD
 
PPTX
Relational Productivity Applications: SharePoint 2010 and CRM 2011
Marie-Michelle Strah, PhD
 
PPTX
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
Marie-Michelle Strah, PhD
 
PPTX
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Marie-Michelle Strah, PhD
 
PPTX
Best Practices in Supply Chain Management: SharePoint
Marie-Michelle Strah, PhD
 
PPTX
Best Practices in SharePoint for Healthcare: US Army Medical Command
Marie-Michelle Strah, PhD
 
PPTX
Case Study for a SharePoint SDLC
Marie-Michelle Strah, PhD
 
PPTX
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Marie-Michelle Strah, PhD
 
PPTX
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Marie-Michelle Strah, PhD
 
PPTX
Business Process Re-Engineering and Improved Healthcare Outcomes
Marie-Michelle Strah, PhD
 
PPTX
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Marie-Michelle Strah, PhD
 
PPTX
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Marie-Michelle Strah, PhD
 
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
Marie-Michelle Strah, PhD
 
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
Marie-Michelle Strah, PhD
 
Securing Microsoft Technologies for HITECH Compliance
Marie-Michelle Strah, PhD
 
Security and Privacy in SharePoint 2010: Healthcare
Marie-Michelle Strah, PhD
 
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
Marie-Michelle Strah, PhD
 
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Marie-Michelle Strah, PhD
 
Relational Productivity Applications: SharePoint 2010 and CRM 2011
Marie-Michelle Strah, PhD
 
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
Marie-Michelle Strah, PhD
 
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Marie-Michelle Strah, PhD
 
Best Practices in Supply Chain Management: SharePoint
Marie-Michelle Strah, PhD
 
Best Practices in SharePoint for Healthcare: US Army Medical Command
Marie-Michelle Strah, PhD
 
Case Study for a SharePoint SDLC
Marie-Michelle Strah, PhD
 
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Marie-Michelle Strah, PhD
 
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Marie-Michelle Strah, PhD
 
Business Process Re-Engineering and Improved Healthcare Outcomes
Marie-Michelle Strah, PhD
 
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Marie-Michelle Strah, PhD
 
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Marie-Michelle Strah, PhD
 

Recently uploaded (20)

PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Event Presentation Google Cloud Next Extended 2025
minhtrietgect
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 

Consumerization of IT: Mobile Infrastructure, Support and Security

  • 1. Healthcare Information Transformation #HIT12 | 4/3/2012 | Jacksonville, FL Managing and Securing Mobile Devices Marie-Michelle Strah, PhD
  • 2. Introductions Marie-Michelle Strah, PhD Federal Program Manager Applied Information Sciences Ideas @ AIS: http://ideas.appliedis.com/ [email protected] Twitter: @cyberslate Blog: http://lifeincapslock.com Linkedin: http://www.linkedin.com/in/drstrah
  • 3. Workshop Goals • Building productivity • Reducing risk • Mobile device encryption • Access control • Policy vs. technical controls • MDM technologies – maturity? • Unexpected expenses of data protection Source: http://www.readwriteweb.com/enterprise/2011/03/consumerization-of- it-95-of-in.php
  • 4. Agenda • Conceptualizing “mobile health” – business cases for IT infrastructure management • GRC – governance, risk and compliance in a CoIT framework • Best practices for CoIT in healthcare • Security Risk Analysis • PTA/PIA • Stakeholders • Policy vs. technical controls • Lessons learned | Considerations for the enterprise
  • 5. Introduction: #mhealth Summit 2011 • Mobile is enabler… • Patients • Providers • “Wellness lifecycle” • Productivity • From “there’s an app for that” to enterprise information management lifecycle • Content delivery • Cloud and thin client Source: http://healthpopuli.com/2011/02/15/success-factor-for-mobile-health-mash-up- the-development-team/
  • 7. The Ideal Employees Contractors Partners Need to know Need to manage InfoSec IT Ops Legal
  • 8. The Reality Employees IT Ops Contractors Partners Manage Know InfoSec Legal
  • 9. The Challenge • There is no endpoint • There is no perimeter • Users own the data Contractors Partners • No one owns the risk Employees • Security doesn’t have control • IT Ops own the databases • IT Ops own the servers • IT Ops own the apps InfoSec IT Ops Legal
  • 10. GRC for Healthcare • Governance – organizational and IT • Risk – management and mitigation • Compliance – HITECH/Meaningful Use • BYOx/CoIT *must* be part of overall GRC strategy • Security Risk Analysis • PTA/PIA • Stakeholders – CPGs, workflow, training • Policy vs. technical controls
  • 11. Enterprise Security Model 𝒙 𝒚 𝑺 = (𝑷 ∗ 𝑨 ) Information Security (Collaborative Model) Equals People (all actors and agents) Times Architecture (technical, physical and administrative)
  • 12. Complexity = Higher Risks and Costs
  • 13. Mobile Device Roundtable Washington, DC 3/16/2012 http://healthit.hhs.gov/portal/server.pt?open=512&mode=2&objID=3816
  • 14. Healthcare Information Transformation Master Data Enterprise Then… MDM2 MDM EIM Management Information Master Management Device Management Data- centric Device- model (or hardware) Reactive centric Posture model
  • 15. Minimum Technical Requirements • Policy Encryption of Data at Rest • Wireless • Data segmentation (on premise, cloud, metadata) • Customer support (heterogeneity) Encryption of • Infection control Data in Motion • MSIRT • Vendor evaluation (the myth of the “HIPAA Good Housekeeping Seal”) Two Factor • Applications: APM and ALM Authentication • Infrastructure • Costs HIPAA Security Rule: Remote Use http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf
  • 16. Best Practices: Datacentric Model 1. This is NOT an IT problem 2. Privacy Impact Assessment: PHI, ePHI, PII (Compartmentalization and segregation) 3. Security Risk Analysis 4. MSIRT (policy and training) 5. Look to stakeholders for domain expertise in clinical workflows 6. Datacentricity: Use connected health framework reference (SOA) model 7. Governance, governance, governance
  • 17. Lessons Learned: Risk-based Model 1. Define permissible mobile devices 2. Access control policies (time/geolocation) 3. Manage applications (third party tools/enterprise app store) 4. Integrate mobile devices onto network 5. Vendor evaluation 6. Costs Source: http://www.beckershospitalreview.com/healthcare-information-technology/4-best- practices-for-hospitals-managing-mobile-devices.html Finally… consider issuing agency or organization owned devices
  • 18. THANK YOU! Marie-Michelle Strah, PhD Federal Program Manager Applied Information Sciences Ideas @ AIS: http://ideas.appliedis.com/ [email protected] Twitter: @cyberslate Blog: http://lifeincapslock.com Linkedin: http://www.linkedin.com/in/drstrah