Deck 5 Flashcards

(21 cards)

1
Q

What are our key milestones?

A

Immediate MFA implementationyear-one foundational security enhancementsand year-three optimization and operationalization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do we measure the success of this investment?

A

Improved NIST scoresKPIsquicker threat detection and response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does this compare to industry benchmarks?

A

Brings UHG to industry average cybersecurity spend (7% of IT budget)aligning with mid-tier industry standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How will these improvements impact operations?

A

Minimal disruption planned; backend enhancements and carefully managed stakeholder processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can current staffing manage this transformation?

A

Noadditional FTEs and specialized roles are funded within the plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is our recovery readiness strategy?

A

Standardized backup protocolsregular testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What specific KPIs track improvement?

A

Asset coverageprivileged access violationsrecovery success rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What contingencies are planned for resource gaps?

A

Strategic staffing investmentsmanaged security services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How will this align with cloud migration initiatives?

A

Security improvements are designed to complement and accelerate cloud adoption securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Are third-party vendor risks being addressed?

A

Yesthrough enhanced third-party monitoring and automated vulnerability scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What role is Mandiant playing?

A

External advisory and validation of cybersecurity approach and implementation oversight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How will we address outdated IT systems?

A

Modernization initiatives including zero-trust frameworks and endpoint anomaly detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What training enhancements are proposed?

A

Immersiverole-specific cybersecurity training with gamification and real-world scenarios

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the compliance risks without funding?

A

Regulatory penaltiesfinesand increased scrutiny from bodies like HHS OCR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does this align with our risk appetite?

A

Directly reduces risks identified as unacceptable in UHG’s formal risk tolerance framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are our future cybersecurity trends?

A

Increased AI/ML-based detectionzero trust adoption

17
Q

What critical healthcare operations were disrupted?

A

Insurance verificationclaims processing

18
Q

What were the legal implications of the breach?

A

Multiple federal lawsuitsregulatory investigationsand ongoing litigation

19
Q

What are the governance improvements planned?

A

Unified policiesclarified roles and responsibilitiesexecutive simulations

20
Q

What’s unique about our governance framework?

A

Multi-layered governance from board-level oversight through executive and operational management

21
Q

How is recovery prioritized across critical functions?

A

Business Impact Analysis ensuring prioritization based on mission-critical operations and validated recovery times