The Role of Big Data in Improving the Quality and Efficiency of Healthcare – Part 2 RMADA

In part two of the healthcare analytics topic we take a look at the RMADA RFP.

It is only through measurement that the quality of healthcare delivered can be improved and its delivery made more efficient. The Federal government needs to facilitate the highest quality at the lowest cost. Medicare, Medicaid and the Children’s Health Insurance Program (CHIP) all involve the use of Federal dollars and the Center for Medicare Services (CMS) has access to a massive amount of data the that could be used for planning, analysis, implementation, and rapid cycle evaluation of innovation and determine program effectiveness.

The purpose of the RMADA RFP, (contract awarded July 2014) is to solicit bids to, “…develop a Research, Measurement, Assessment, …

» Continue reading

Splunk, Big Data and Healthcare Analytics in the Federal Government – Part 1 The Veterans Administration

There have been three interesting events that have occurred recently in the area of healthcare analytics that deserve our attention:

  • The passage through the US House and Senate of the Veterans Access to Care through Choice, Accountability, and Transparency Act;
  • The development of a government IDIQ (indefinite delivery/indefinite quantity) contract to develop a Research, Measurement, Assessment, Design, and Analysis (RMADA) that will provide analytic support and technical assistance for models and demonstration programs that are derived under the Patient Protection and Affordable Care Act (ACA) and;
  • Department of Defense Healthcare Management System Modernization (DHMSM) Program procurement task orders.

These three activities all highlight the need for a big data solution in healthcare that can provide accountability, …

» Continue reading

Karen Grimes — CRN 2014 Women of the Channel

I was very pleased to see my colleague, Karen Grimes be honored as part of a rarefied group of individuals called Computer Reseller News’ 2014 Women of the Channel. While I’ve been at Splunk for over four and a half years, I recently took on a new role as Senior Director of Public Sector Marketing. Moving into public sector sales organization, I knew before I got the new role the importance of the channel and channel partners for public sector sales. I didn’t know whom I’d be working with or the health of our channel relationships. I needn’t have been concerned.  I quickly realized that Karen had already laid the groundwork for a successful Splunk channel organization and a …

» Continue reading

Splunk and The Top 10 CIO Priorities for State and Local Goverment

On November 5, 2013, National Association of State Chief Information Officers (NASCIO) released a member service document representing the top 10 state CIO priorities for 2014. The list presents no surprises as state CIOs try to do more with less extracting the most value out of every dollar, providing constituent services, protecting customer data and preventing data breaches.  The list is almost a mirror image of the benefits our customers are seeing with Splunk. I won’t go through the whole list but lets look at the top three.

Security is the number one priority for state CIOs in 2014:

“Security: risk assessment, governance, budget and resource requirements, security frameworks, data protection, training and awareness, insider threats, third party security

» Continue reading

Splunk Joins Public-Private Partnership to Improve Cybersecurity

Last week Splunk joined several other companies at U.S. NIST’s signing ceremony symbolizing our participation and partnership in the National Cybersecurity Center of Excellence (NCCoE).

There’s no doubt that there is a critical need to protect private-sector intellectual property and other valuable business data from a growing number of cyber threats. This partnership illustrates our commitment to the spirit of collaboration while providing real-world cybersecurity capabilities that address business needs.

The NCCoE has three key goals:

  • Provide practical cybersecurity – Help people secure their data and digital infrastructure by equipping them with practical ways to implement cost-effective, repeatable and scalable cybersecurity solutions.
  • Increase rate of adoption – Enable companies rapidly adopt commercially available cybersecurity technologies by reducing their total cost
» Continue reading

Seeing the Future of Cybersecurity in Action

Submitted on behalf of Enoch Long

On March 14th I presented an overview of Splunk to contestant finalists at the CyberPatriot V National Finals Competition at the Gaylord National Resort and Convention Center in National Harbor, Maryland to approximately 125 – 130 students. Created by the Air Force Association (AFA), the Cyber Patriot competition was created as a response to the critical need for cyber professionals in the workforce by enhancing high school students’ knowledge of careers in cyber security, technology, engineering, and math disciplines. Splunk was a Diamond level sponsor of the event. This meant that for the first time in the history of the competition a proprietary piece of software allowed as part of the competition and …

» Continue reading

A Way of Thinking about Big Data and Security

I often get asked questions like, “I like Splunk but how much data should I be collecting for security purposes? Is there such a thing as too much data? How do I know what matters in my data?

These are good questions but unfortunately the answer really can be, “it depends.” I still believe there’s no such thing as too much data for security purposes if you are using Splunk. For me there are only two types of data, the data your are using for security and the data you’ll need later that you didn’t think you needed at the time. There will come a time when security folk will be looking at the fidelity of the data as an …

» Continue reading

Big data, Creativity and What I Learned On My Summer Vacation…

Vacations are good for you. You get a chance to decompress, experience new things and sometimes look at things in a new way or make a connection between things that at first glance may not seem connected at all. When I go on vacation I try to let my mind wander. Usually, I get rewarded with an epiphany or two that I take back to work when the vacation is done.

This vacation I read Imagine: How Creativity Works, by Jonah Lehreh, 2011 published by Canongate London. At 253 pages, it wasn’t very long read but as a former security practitioner it got me thinking a lot about the role of imagination and creativity in a security practice. Science …

» Continue reading

Security and the Splunk for VMware app

There is a lot to be excited about in the GA of the Splunk for VMware app — especially for the security practitioner. The VMware app is the first Splunk app (other than the Splunk app for Enterprise Security) to offer dashboards and data for both the IT operations folks that have to manage the environment and the security folks who need to monitor threats to this key business investment. The approach provides built-in transparency for a virtualized environment. It is not easy to dive into all the data being generated by ESX / ESXi, vSphere, the guest OS and applications. This is particularly problematic for security folks with little understanding of where to begin to look in all the …

» Continue reading

The first major HIPAA/HITECH fee levied

UPDATE

When you think about it, the fine levied by the HHS Office of Civil Rights isn’t all the cost of this HIPAA violation for BlueCross BlueShield of Tennessee. Turns out this was pricier than we thought. According to the law firm of Wilson Sonsini Goodrich and Rosati….

“BlueCross had self-reported the underlying incident under HIPAA’s requirements, and incurred more than $17 million in direct expenses relating to its investigation and remediation of the incident. The HHS investigators faulted BlueCross BlueShield for failing to implement appropriate administrative safeguards to protect information by storing protected health information on unencrypted computer hard drives. Under the settlement, BlueCross BlueShield also agreed to review and revise its healthcare information privacy and security policies, and

» Continue reading