Cyber Threat Identification, Detection & Response

How do we help you keep Kaiser Permanente secure? Through early detection of possible cyber security incidents. Report suspicious or malicious activity immediately. This helps to:

  • Protect KP’s critical data, assets, and systems
  • Promote effective response and recovery
  • Prevent future cyber incidents

We also help to collect, identify, preserve, analyze and report data to support human resources, legal or compliance matters.

Report a Security or Compliance Incident

Alert us promptly to a possible incident, and we will work quickly to detect and respond, as well as to protect critical data, assets, and systems to prevent future incidents.

Getting Started

Computer Forensics

We investigate, gather, analyze, and preserve digital data from computing systems, networks, wireless communications, and storage devices.

Getting Started

eDiscovery

We identify, collect, and produce electronically stored information (ESI) to support legal proceedings.

Getting Started

Report a Security or Compliance Incident

The Cyber Risk Defense Center (CRDC) performs cyber threat identification, detection, and response. This includes reviewing logs for malicious activity, as well as investigating suspicious activity reported through the KP Service Desk.

By alerting us, we can work quickly to detect and respond to computer security incidents as well as to protect critical data, assets, and systems to prevent further threats.

Who can request this service?

Any Kaiser Permanente user.

Resources

Getting Started

Report a security incident:

Call the KP Service Desk at 1-888-457-4872 immediately and report the incident.


Report a potential phishing email as spam:

  • Click on the “Report Spam” button in the top right of the toolbar.
  • Mobile device and Macs: Email to phishing@kp.org.

Note: Unwanted mail that is not suspicious, such as unsolicited advertising, should be sent to your junk mail folder.


Report a lost or stolen computer, mobile device, or KP asset:

  • Tell your immediate supervisor.
  • Call the KP Service Desk at 1-888-457-4872.

Report a compliance issue:

  • Notify your immediate supervisor.
  • Report a compliance issue or suspicious activity by calling the National Compliance Hotline at 1-888-774-9100.
  • Report the issue via KP Webline.

Computer Forensics

Kaiser Permanente’s computer forensics service includes investigating, gathering, analyzing, and preserving digital data from computing systems, networks, wireless communications, and storage devices. This information can then be used as evidence in legal proceedings.

Who can request this service?

Computer forensics services are generally requested by Kaiser Permanente’s Legal Department, Human Resources (HR), or the National Compliance, Ethics & Integrity Office. Requests must be approved by a local HR, legal, or compliance representative.

Resources

Getting Started

Request a cyber forensics investigation:

  1. Contact your local HR, legal, or compliance representative for approval.
  2. Your representative will then complete a CFI intake form.

eDiscovery

Kaiser Permanente’s eDiscovery service involves identifying, collecting, and producing electronically stored information (ESI) to support legal proceedings. Examples of ESI include emails, documents, presentations, databases, voicemails, audio and video files, social media, and websites.

Who can request this service?

Departments that often request eDiscovery support include legal and HR, as well as Kaiser Permanente medical groups. eDiscovery requests must be approved by a local HR or legal representative.

Resources

Getting Started

Request eDiscovery support:

  1. Complete the eDiscovery intake form.
  2. Email it to your local HR or legal representative for approval.
  3. After approval, the representative will email the form to ediscovery@kp.org.
  4. The eDiscovery team will confirm they received the request and assess your request and determine how best to address it.
  5. You’ll receive an email letting you know who has been assigned to handle your request.

Please note that every project is unique, and while we work as quickly as possible, it can take up to several weeks to fulfill your request.