170 likes | 344 Views
Megan Yarabinetz September 10, 2010 The Pennsylvania State University IST 495. Coventry Health Care. Cranberry 1: Includes Data Center. Cranberry 2. Company Background. Incorporated November 21, 1986 as Coventry Corporation Headquarters are located in Bethesda, Maryland.
E N D
Megan Yarabinetz September 10, 2010 The Pennsylvania State University IST 495 Coventry Health Care
Company Background • Incorporated November 21, 1986 as Coventry Corporation • Headquarters are located in Bethesda, Maryland. • Provides health care solutions for group and individual health insurance, Medicare and Medicaid programs, Worker’s Compensation and Behavioral Health Care services. • Serves more than 5 million members in all 50 states. • Employs approximately 14,000 employees with over 1,000 Information Technology employees reference: www.cvty.com
To support the central mission of the company by ensuring business operational continuity and assuring the Confidentiality, Integrity and Availability (CIA) of its information and information systems. Information Risk Management-Mission Information Risk Management Mission Statement
Responsibilities • Participated in Risk Assessment Planning Meetings • Analyzed Coventry’s Information Risk Management Program (ISO 27001) • Participated in Information Security Policy Mapping Meetings • Interviewed Key Executives to document the Information Security Program impact on their departments
Objective 1: Risk Assessments in a Corporate Environment • Risk Assessment Methodology – OCTAVE Allegro
Objective 3: Information Security Policies & Procedures in a Corporate Environment • Coventry has a policy mapping group that meets on a regular basis • There is a standard policy template used • ISG team is responsible for policy development • Policies are drafted by the ISG team • Policies are published on a SharePoint site • Violation of policies can result in sanctions
Key Executive Interviews • Executives interviewed: • Enterprise Architect • Director, Application Development • Director, IT Finance • Director, Information IT Management (IT Audit) • Vice President, IT Infrastructure • Chief Compliance Officer • Senior Business Technology Leader • Vice President, E-Commerce • Vice President, Customer Service Operations
Key Executive Interviews (cont.) • Summary of Positive Impact of Information Security Program: • Established policies and standards • Keeps them out of legal trouble • ISG Team is helpful, as well as their security Spot Lights • Summary of Negative Impact of Information Security Program: • Many executives stated: None • Some found implementing policies and standards to be time consuming
Computer Forensics Lab • Director has 25lb Alienware “Laptop” • ~72inch Plasma TV used to monitor traffic and attacks • Ability to pinpoint where attacks come from • Use FTK and EnCase Computer Forensics Software • Hard drives kept in a safe with chain of custody forms • Ability to monitor employees as well as potential attackers