A CHIME Leadership Education and Development Forum in collaboration with iHT2
What is Cyber Security and Why is it
Crucial to Your Organization?
_______
Key Attributes for Success, Challenges and
Critical Success Factors
● Mac McMillan | FHIMSS/CISM | CEO | CynergisTek, Inc. ●
#LEAD14
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Sun Tzu & Cybercrime
“If you know the enemy, and know yourself,
then you may not fear the results of a
hundred battles. If you know yourself but
not the enemy, for every victory gained you
will suffer a defeat.”
HIMSS Cyber Security Survey
Limited Disruption to Operations
Loss of Data/Information
Significant Impact on IT Systems
Damage to IT Systems
Other Impact
62%
21%
8%
8%
7%
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Threat Actors & Their Motivation
• Organized Crime
• Hacktivists
• Cyber Thieves
• Malicious Insiders
• Careless Insiders
• Busy Insiders
• State Actors
• Financial Gain
• Intellectual Property
• Extortion
• ID/Med ID Theft
• Espionage
• Embarrassment
• Good Intentions
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Accidents, Mistakes & Deliberate Acts
• Phishing/hacking nets nearly $3M from six healthcare entities
• Vendor sells hospital’s X-rays (films) to third party
• Resident loses track of USB with over 500 orthopedic patients information
• Portable electronic device with patient data stolen from hospital
• Physician has laptop stolen from vacation home
• 2,200 physicians victims of ID theft/tax fraud
• Printers returned to leasing company compromise thousands of patient records
• Health System reports third stolen laptop with 13,000 patient records
• 400 hospitals billings delayed as clearinghouse hit with ransomware
• Children’s hospital hacked with successful DOS for three days in protest for treatment and
holding of girl by Anonymous
• Physician robbed at gun point, phone and computer taken, thief demands passwords
• International hacking group uses phishing, then steals information on almost 80M people
• Medical devices hacked to compromise hospital networks using MedJack attack
• Seven health systems hit by phishing resulting in major breaches
• New York hospital hacked by pro-ISIS supporters, website defaced with ISIS propoganda
• And, on and on it goes…
A CHIME Leadership Education and Development Forum in collaboration with iHT2
The Emergent Threat
DefCon/BlackHat 2015
• Medical Devices: Pawnage and Honey Pots
• Shall We Play a Game?
• USB Attack to Decrypt WiFi
• WhyMI so Sexy? WMI Attacks & Defense
• I Will Kill You
• Scared Poopless – LTE and “your” Laptop
• Confessions of a Professional Cyber Stalker
• From 0 to Pwnd – Social Engineering
• Jailbreaking & Rooting Devices
• Advanced Infrastructure Hacking
• Advanced Windows Exploitation
• Advanced Web Attacks
Healthcare in the Media
• Hacking healthcare: A Guide to
Standards, Workflows and MU
• Hacking Healthcare
• MIT Hacking Medicine
• Hacking Health Care
• Let’s Hack Healthcare
Significant Threats of the Future
34%
39%
49%
50%
53%
53%
59%
63%
65%
69%
Brute Force Attacks
Denial of Services (DoS)
Social Engineering Attacks
Malicious Insiders
Exploit Known Software Vulnerabilities
Zero Day Attacks
Cyber Attacks
APT Attacks
Negligent Insiders
Phishing Attacks
Challenges To Data Security
CISOComplexity
Insiders
Vendors
Mobile
Devices
mHealth
Fraud
ID Theft
Physical
Loss/Theft
Cyber
Attacks
Regulations
Staffing
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Increased Reliance
• More than 98% of all processes
are automated, more than 98%
of all devices are networkable,
more than 95% of all patient
information is digitized
• Hyper connectivity dominates
what we do
• IT systems and applications
are critical to care delivery,
business operations
• Moving to a patient centric
model will only further
complicate the enterprise
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Insider Abuse: Trust, But Verify
• It is estimated that more than half of
all security incidents involve staff.
• 51% of respondents in a SANS study
believe the negligent insider is the
chief threat.
• 37% believe that security awareness
training is ineffective.
• Traditional audit methods & manual
auditing is completely inadequate.
• Behavior modeling, pattern analysis
and anomaly detection is what is
needed.
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Questionable Supply Chains
• Better inventories of vendors w/ PHI
• Risk based approach to managing third
parties
• Greater due diligence in vetting vendors
• Security requirements in contracting
should be SLA based
• Particular attention to cloud, SaaS,
infrastructure support, critical service
providers
• Life cycle approach to data protection
• Detailed breach and termination
provisions
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Devices Threaten Safety & Information
• 2010/2011 successful hacks of an
insulin pump and ICD
• In June 2013 the DHS tested 300
devices from 40 vendors, ALL failed
• 2014 multiple variants of a popular
blood pump hacked
• 2015 MedJack hacks demonstrates
vulnerability of the network from
medical devices
• We are no closer….
“Yes, Terrorists could have
hacked Dick Cheney’s heart.”
-The Washington Post
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Malware & Persistent Threats
• 3.4 million BotNets active
• 20-40% of recipients in phishing exercises fall for
scam
• 26% of malware delivered via HTML, one in less than
300 emails infected
• Malware analyzed was found undetectable by nearly
50% of all anti-virus engines tested
• As of April 2014 Microsoft no longer provides patches
for WN XP, WN 2003 and WN 2000, NT, etc.
• EOL systems still prevalent in healthcare networks
• Hardening, patching, configuration, change
management…all critical
• Objective testing and assessment
“FBI alert warns healthcare
not prepared”
2006
200K 2008
17M
2013
73M
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Mobility & Data
• Medical staff are turning to their mobile devices to
communicate because its easier, faster, more efficient…
• Sharing lab or test results, locating another physician
for a consult, sharing images of wounds and radiology
images, updating attending staff on patient condition,
getting direction for treatment, locating a specialist
and collaborating with them, transmitting trauma
information or images to EDs, prescribing or placing
orders
• Priority placed on the data first and the device second
• Restrict physical access where possible, encrypt the
rest
A CHIME Leadership Education and Development Forum in collaboration with iHT2
ID Theft & Fraud
• Medical Identity theft and fraud costs billions
each year, affecting everyone
• US CERT estimates 47% of cybercrime aimed at
healthcare
• Healthcare directed attacks have increased more
than 20% per year for the last three years
• Identity theft comes in all forms and is costly
– Insiders selling information to others
– Hackers exploiting systems
– Malware with directed payloads
– Phishing for the “big” ones
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Theft & Losses Thriving
• 68% of healthcare data breaches due to
loss or theft of assets
• 1 in 4 houses is burglarized, a B&E
happens every 9 minutes, more than
20,000 laptops are left in airports each
year…
• First rule of security: no one is immune
• 138%: the % increase in records exposed in
2013
• 6 – 10%: the average shrinkage rate for
mobile devices
• Typical assets inventories are off by 60%
“Unencrypted laptops and mobile devices
pose significant risk to the security of
patient information.” -Sue McAndrew,
OCR
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Hacking & Other Cyber Criminals
• Defenses are not keeping pace
• Three most common attacks: spear
phishing, Trojans & Malvertising
• APTs, phishing, water cooler attacks, fraud,
etc.
• Most organizations can’t detect or address
these threats effectively
• An advanced incident response capability is
required
• Results in losses of time, dollars, downtime,
reputation, litigation, etc.
• Conduct independent risk assessments
regularly
0 50 100
Organizations suffering a
targeted attack
Sophistication of attack
hardest element to defeat
No increase in budget for
defenses
Targeted Attacks
“I feel like I am a targeted class, and I
want to know what this institution is
doing about it!” -Anonymous Doctor
A CHIME Leadership Education and Development Forum in collaboration with iHT2
More Compliance
• OIG shifts focus to funds recovery
• OCRs permanent audit program will resume in
FY 2015 with new capabilities
• Improvements and automation in reporting
and handling complaints
• Meaningful Use takes a step backwards with
Stage 3
• The FTC, FDA, FCC, HHS and DoJ take a more
active role in Healthcare privacy and security
• States continue to create new laws
– Florida Information Protection Act
– New Jersey Health Insurers Encryption Law
SB1353 seeks to establish common framework for security
and create universal requirement for notification.
When organizations tell consumers
they will protect their personal
information, the FTC can and will
take enforcement action to ensure
they live up to these promises.
A CHIME Leadership Education and Development Forum in collaboration with iHT2
CISO Needed…
• HIMSS Cyber Security survey found 52%
had a full time security person
• In a 2014 study HC CISOs gave themselves
an average maturity rating of 4.35 on a scale
of 1-7
• Many report missing critical technologies
to fight today’s threats, improving in 2015
• More than half of healthcare entities spend
less than 3% of their IT budget on data
protection, no improvement
• Focus, alignment, and staffing challenges
• Many healthcare security managers are first
timers
Healthcare finds itself in a contest for
security professionals when everyone,
both government and private sector,
need them – and the outlook is not
positive.
Barriers to Successful
Implementation of Data Security
Percent
Lack of Personnel 64%
Lack of Financial Resources 60%
Too Many Emerging/New Threats 42%
Too Many Endpoints 32%
Not Enough Cyber Threat Intelligence 28%
Too Many Applications 25%
Lack of Tools to Use/Deploy Cyber Threat Intel 20%
Q & A
Mac McMillan
mac.mcmillan@cynergistek.com
(512) 402-8555
A CHIME Leadership Education and Development Forum in collaboration with iHT2
@mmcmillan07

More Related Content

PDF
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
PDF
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
PDF
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
PDF
2015 Atlanta CHIME Lead Forum
PPTX
Panel Cyber Security and Privacy without Carrie Waggoner
PPTX
Cybersecurity Seminar March 2015
PDF
Internal or insider threats are far more dangerous than the external - bala g...
PPTX
NumaanHuq_Hackfest2015
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
2015 Atlanta CHIME Lead Forum
Panel Cyber Security and Privacy without Carrie Waggoner
Cybersecurity Seminar March 2015
Internal or insider threats are far more dangerous than the external - bala g...
NumaanHuq_Hackfest2015

What's hot (20)

PDF
wp-follow-the-data
PPTX
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
PDF
The case for a Cybersecurity Expert on the Board of an SEC firm
PDF
Final presentation january iia cybersecurity securing your 2016 audit plan
PDF
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
PPTX
Common and Concerning Risks In IT
PDF
[MU630] 005. Ethics, Privacy and Security
PDF
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
PDF
Cyber Security Threats | IIA Boise Chapter
PPTX
SucessfulInsiderThreat
PDF
Forcepoint Whitepaper 2016 Security Predictions
PDF
Internal Threats: The New Sources of Attack
PDF
Cybercrime and the Healthcare Industry
 
PDF
Drivers & Enablers of Insider Threats by Christina Lekati
PDF
Ijnsa050201
PPT
The insider versus external threat
PDF
2014 Executive Breach Preparedness Research Report
PDF
Protecting Automotive Intellectual Property from Insider Threats
PPTX
Marc Crudgington Who I Am
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
wp-follow-the-data
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
The case for a Cybersecurity Expert on the Board of an SEC firm
Final presentation january iia cybersecurity securing your 2016 audit plan
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
Common and Concerning Risks In IT
[MU630] 005. Ethics, Privacy and Security
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
Cyber Security Threats | IIA Boise Chapter
SucessfulInsiderThreat
Forcepoint Whitepaper 2016 Security Predictions
Internal Threats: The New Sources of Attack
Cybercrime and the Healthcare Industry
 
Drivers & Enablers of Insider Threats by Christina Lekati
Ijnsa050201
The insider versus external threat
2014 Executive Breach Preparedness Research Report
Protecting Automotive Intellectual Property from Insider Threats
Marc Crudgington Who I Am
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Ad

Similar to CHIME Lead Forum - Seattle 2015 (20)

PDF
2015 Atlanta CHIME Lead Forum
PDF
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
PDF
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
PDF
2015 Atlanta CHIME Lead Forum
PDF
2015 Atlanta CHIME Lead Forum
PDF
Insider_Threats_in_Healthcare_1651617236.pdf
PDF
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
PDF
NextLevel Cyber Security Executive Briefing
PPTX
Hot Topics in Privacy and Security
PDF
Cybersecurity Challenges in Healthcare
PPTX
A Brave New World of Cyber Security and Data Breach
PPTX
Using Technology and People to Improve your Threat Resistance and Cyber Security
PPTX
Hacking the Human - How Secure Is Your Organization?
PPTX
An Introduction to Ethical Hacking.pptx (2).pptx
PPTX
2016-Symposium-Cybersecurity-Slides.pptx
PPT
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
PPTX
IT & Network Security Awareness
PDF
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
PPTX
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
PPTX
Cyber security
2015 Atlanta CHIME Lead Forum
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
Insider_Threats_in_Healthcare_1651617236.pdf
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
NextLevel Cyber Security Executive Briefing
Hot Topics in Privacy and Security
Cybersecurity Challenges in Healthcare
A Brave New World of Cyber Security and Data Breach
Using Technology and People to Improve your Threat Resistance and Cyber Security
Hacking the Human - How Secure Is Your Organization?
An Introduction to Ethical Hacking.pptx (2).pptx
2016-Symposium-Cybersecurity-Slides.pptx
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
IT & Network Security Awareness
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Cyber security
Ad

More from Health IT Conference – iHT2 (20)

PDF
2016 iHT2 Miami Health IT Summit
PDF
2016 iHT2 Miami Health IT Summit
PDF
2016 iHT2 San Diego Health IT Summit
PDF
2016 iHT2 San Diego Health IT Summit
PPTX
2016 iHT2 San Diego Health IT Summit
PDF
2016 iHT2 San Diego Health IT Summit
PDF
2016 iHT2 San Diego Health IT Summit
PDF
2016 iHT2 San Diego Health IT Summit
PDF
2015 Houston CHIME Lead Forum
PDF
2015 Houston CHIME Lead Forum
PDF
2015 Houston CHIME Lead Forum
PDF
2015 Atlanta CHIME Lead Forum
PDF
2015 iHT2 Health IT Beverly Hills Summit
PDF
2015 iHT2 Health IT Beverly Hills Summit
PDF
2015 iHT2 Health IT Beverly Hills Summit
PDF
2015 iHT2 Health IT Beverly Hills Summit
PDF
2015 iHT2 Health IT Beverly Hills Summit
PDF
iHT2 Health IT Beverly Hills Summit - 2015
PDF
Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
PDF
iHT2 Health IT Chicago Summit
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
iHT2 Health IT Beverly Hills Summit - 2015
Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
iHT2 Health IT Chicago Summit

Recently uploaded (20)

PPTX
SlideEgg_100085- World Mental Health Day.pptx
PPTX
Head Spine trauma assesment and managementATLS Final.pptx
PPTX
Seizures in paediatrics as a big cause of morbidity.pptx
PDF
WHO Global TUBERCULOSIS Report 2018-2019
PPTX
Conflict Management: Defining conflict and understanding why it occurs is t...
PPTX
The Process of Infection by Windy Mesolas-Luzon.pptx
PPTX
CLASS III MALOCCLUSION IN ORTHODONTICS
PPTX
Non-Variceal-Upper-GI-Bleeding_-Comprehensive-Review_121037.pptx
PPT
53afocus7fluidelectrolytesacid-basebalance-121205082904-phpapp01.ppt
PDF
Key Updates for Pulmonary Tuberculosis Multiple Drug Resistance
PPTX
MONOCHORIONIC TWIN PREGNANCY details.pptx
PPTX
Oncological Emergencies in hospital setting
PPTX
Symphosium Dr saurab ad Dr. Khushbu.pptx
PDF
odontologia na oncologia - carie de radiação
PDF
ICU Main Equipments and its explanations
PPTX
Maternal and child health. The normal new born.pptx
PPTX
MONOCHORIONIC TWIN PREGNANCY detailed.pptx
PPT
NEPHROTIC SYNDROME POWER POINT PRESENTATION
PDF
CASE PRESENTATION1.pdf bipolar disorder in which both mania and depression h...
PDF
Joint Commission EBPCD24_samplepages.pdf
SlideEgg_100085- World Mental Health Day.pptx
Head Spine trauma assesment and managementATLS Final.pptx
Seizures in paediatrics as a big cause of morbidity.pptx
WHO Global TUBERCULOSIS Report 2018-2019
Conflict Management: Defining conflict and understanding why it occurs is t...
The Process of Infection by Windy Mesolas-Luzon.pptx
CLASS III MALOCCLUSION IN ORTHODONTICS
Non-Variceal-Upper-GI-Bleeding_-Comprehensive-Review_121037.pptx
53afocus7fluidelectrolytesacid-basebalance-121205082904-phpapp01.ppt
Key Updates for Pulmonary Tuberculosis Multiple Drug Resistance
MONOCHORIONIC TWIN PREGNANCY details.pptx
Oncological Emergencies in hospital setting
Symphosium Dr saurab ad Dr. Khushbu.pptx
odontologia na oncologia - carie de radiação
ICU Main Equipments and its explanations
Maternal and child health. The normal new born.pptx
MONOCHORIONIC TWIN PREGNANCY detailed.pptx
NEPHROTIC SYNDROME POWER POINT PRESENTATION
CASE PRESENTATION1.pdf bipolar disorder in which both mania and depression h...
Joint Commission EBPCD24_samplepages.pdf

CHIME Lead Forum - Seattle 2015

  • 1. A CHIME Leadership Education and Development Forum in collaboration with iHT2 What is Cyber Security and Why is it Crucial to Your Organization? _______ Key Attributes for Success, Challenges and Critical Success Factors ● Mac McMillan | FHIMSS/CISM | CEO | CynergisTek, Inc. ● #LEAD14
  • 2. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Sun Tzu & Cybercrime “If you know the enemy, and know yourself, then you may not fear the results of a hundred battles. If you know yourself but not the enemy, for every victory gained you will suffer a defeat.”
  • 3. HIMSS Cyber Security Survey Limited Disruption to Operations Loss of Data/Information Significant Impact on IT Systems Damage to IT Systems Other Impact 62% 21% 8% 8% 7%
  • 4. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Threat Actors & Their Motivation • Organized Crime • Hacktivists • Cyber Thieves • Malicious Insiders • Careless Insiders • Busy Insiders • State Actors • Financial Gain • Intellectual Property • Extortion • ID/Med ID Theft • Espionage • Embarrassment • Good Intentions
  • 5. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Accidents, Mistakes & Deliberate Acts • Phishing/hacking nets nearly $3M from six healthcare entities • Vendor sells hospital’s X-rays (films) to third party • Resident loses track of USB with over 500 orthopedic patients information • Portable electronic device with patient data stolen from hospital • Physician has laptop stolen from vacation home • 2,200 physicians victims of ID theft/tax fraud • Printers returned to leasing company compromise thousands of patient records • Health System reports third stolen laptop with 13,000 patient records • 400 hospitals billings delayed as clearinghouse hit with ransomware • Children’s hospital hacked with successful DOS for three days in protest for treatment and holding of girl by Anonymous • Physician robbed at gun point, phone and computer taken, thief demands passwords • International hacking group uses phishing, then steals information on almost 80M people • Medical devices hacked to compromise hospital networks using MedJack attack • Seven health systems hit by phishing resulting in major breaches • New York hospital hacked by pro-ISIS supporters, website defaced with ISIS propoganda • And, on and on it goes…
  • 6. A CHIME Leadership Education and Development Forum in collaboration with iHT2 The Emergent Threat DefCon/BlackHat 2015 • Medical Devices: Pawnage and Honey Pots • Shall We Play a Game? • USB Attack to Decrypt WiFi • WhyMI so Sexy? WMI Attacks & Defense • I Will Kill You • Scared Poopless – LTE and “your” Laptop • Confessions of a Professional Cyber Stalker • From 0 to Pwnd – Social Engineering • Jailbreaking & Rooting Devices • Advanced Infrastructure Hacking • Advanced Windows Exploitation • Advanced Web Attacks
  • 7. Healthcare in the Media • Hacking healthcare: A Guide to Standards, Workflows and MU • Hacking Healthcare • MIT Hacking Medicine • Hacking Health Care • Let’s Hack Healthcare
  • 8. Significant Threats of the Future 34% 39% 49% 50% 53% 53% 59% 63% 65% 69% Brute Force Attacks Denial of Services (DoS) Social Engineering Attacks Malicious Insiders Exploit Known Software Vulnerabilities Zero Day Attacks Cyber Attacks APT Attacks Negligent Insiders Phishing Attacks
  • 9. Challenges To Data Security CISOComplexity Insiders Vendors Mobile Devices mHealth Fraud ID Theft Physical Loss/Theft Cyber Attacks Regulations Staffing
  • 10. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Increased Reliance • More than 98% of all processes are automated, more than 98% of all devices are networkable, more than 95% of all patient information is digitized • Hyper connectivity dominates what we do • IT systems and applications are critical to care delivery, business operations • Moving to a patient centric model will only further complicate the enterprise
  • 11. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Insider Abuse: Trust, But Verify • It is estimated that more than half of all security incidents involve staff. • 51% of respondents in a SANS study believe the negligent insider is the chief threat. • 37% believe that security awareness training is ineffective. • Traditional audit methods & manual auditing is completely inadequate. • Behavior modeling, pattern analysis and anomaly detection is what is needed.
  • 12. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Questionable Supply Chains • Better inventories of vendors w/ PHI • Risk based approach to managing third parties • Greater due diligence in vetting vendors • Security requirements in contracting should be SLA based • Particular attention to cloud, SaaS, infrastructure support, critical service providers • Life cycle approach to data protection • Detailed breach and termination provisions
  • 13. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Devices Threaten Safety & Information • 2010/2011 successful hacks of an insulin pump and ICD • In June 2013 the DHS tested 300 devices from 40 vendors, ALL failed • 2014 multiple variants of a popular blood pump hacked • 2015 MedJack hacks demonstrates vulnerability of the network from medical devices • We are no closer…. “Yes, Terrorists could have hacked Dick Cheney’s heart.” -The Washington Post
  • 14. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Malware & Persistent Threats • 3.4 million BotNets active • 20-40% of recipients in phishing exercises fall for scam • 26% of malware delivered via HTML, one in less than 300 emails infected • Malware analyzed was found undetectable by nearly 50% of all anti-virus engines tested • As of April 2014 Microsoft no longer provides patches for WN XP, WN 2003 and WN 2000, NT, etc. • EOL systems still prevalent in healthcare networks • Hardening, patching, configuration, change management…all critical • Objective testing and assessment “FBI alert warns healthcare not prepared” 2006 200K 2008 17M 2013 73M
  • 15. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Mobility & Data • Medical staff are turning to their mobile devices to communicate because its easier, faster, more efficient… • Sharing lab or test results, locating another physician for a consult, sharing images of wounds and radiology images, updating attending staff on patient condition, getting direction for treatment, locating a specialist and collaborating with them, transmitting trauma information or images to EDs, prescribing or placing orders • Priority placed on the data first and the device second • Restrict physical access where possible, encrypt the rest
  • 16. A CHIME Leadership Education and Development Forum in collaboration with iHT2 ID Theft & Fraud • Medical Identity theft and fraud costs billions each year, affecting everyone • US CERT estimates 47% of cybercrime aimed at healthcare • Healthcare directed attacks have increased more than 20% per year for the last three years • Identity theft comes in all forms and is costly – Insiders selling information to others – Hackers exploiting systems – Malware with directed payloads – Phishing for the “big” ones
  • 17. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Theft & Losses Thriving • 68% of healthcare data breaches due to loss or theft of assets • 1 in 4 houses is burglarized, a B&E happens every 9 minutes, more than 20,000 laptops are left in airports each year… • First rule of security: no one is immune • 138%: the % increase in records exposed in 2013 • 6 – 10%: the average shrinkage rate for mobile devices • Typical assets inventories are off by 60% “Unencrypted laptops and mobile devices pose significant risk to the security of patient information.” -Sue McAndrew, OCR
  • 18. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Hacking & Other Cyber Criminals • Defenses are not keeping pace • Three most common attacks: spear phishing, Trojans & Malvertising • APTs, phishing, water cooler attacks, fraud, etc. • Most organizations can’t detect or address these threats effectively • An advanced incident response capability is required • Results in losses of time, dollars, downtime, reputation, litigation, etc. • Conduct independent risk assessments regularly 0 50 100 Organizations suffering a targeted attack Sophistication of attack hardest element to defeat No increase in budget for defenses Targeted Attacks “I feel like I am a targeted class, and I want to know what this institution is doing about it!” -Anonymous Doctor
  • 19. A CHIME Leadership Education and Development Forum in collaboration with iHT2 More Compliance • OIG shifts focus to funds recovery • OCRs permanent audit program will resume in FY 2015 with new capabilities • Improvements and automation in reporting and handling complaints • Meaningful Use takes a step backwards with Stage 3 • The FTC, FDA, FCC, HHS and DoJ take a more active role in Healthcare privacy and security • States continue to create new laws – Florida Information Protection Act – New Jersey Health Insurers Encryption Law SB1353 seeks to establish common framework for security and create universal requirement for notification. When organizations tell consumers they will protect their personal information, the FTC can and will take enforcement action to ensure they live up to these promises.
  • 20. A CHIME Leadership Education and Development Forum in collaboration with iHT2 CISO Needed… • HIMSS Cyber Security survey found 52% had a full time security person • In a 2014 study HC CISOs gave themselves an average maturity rating of 4.35 on a scale of 1-7 • Many report missing critical technologies to fight today’s threats, improving in 2015 • More than half of healthcare entities spend less than 3% of their IT budget on data protection, no improvement • Focus, alignment, and staffing challenges • Many healthcare security managers are first timers Healthcare finds itself in a contest for security professionals when everyone, both government and private sector, need them – and the outlook is not positive.
  • 21. Barriers to Successful Implementation of Data Security Percent Lack of Personnel 64% Lack of Financial Resources 60% Too Many Emerging/New Threats 42% Too Many Endpoints 32% Not Enough Cyber Threat Intelligence 28% Too Many Applications 25% Lack of Tools to Use/Deploy Cyber Threat Intel 20%
  • 22. Q & A Mac McMillan [email protected] (512) 402-8555 A CHIME Leadership Education and Development Forum in collaboration with iHT2 @mmcmillan07