SlideShare une entreprise Scribd logo
1  sur  33
Healing
Healthcare
Security
Barry Caplin, VP & CISO, Fairview Health
Services
bc@bjb.org
bcaplin1@fairview.org
@bcaplin
https://securityandcoffee.blogspot.com/
Secure360 May 16, 2017
Healthcare Breach Stats
2009
18 breaches
135K records
2010
198 breaches
5.5M records
2011
196 breaches
13.2M records
2012
209 breaches
2.8M records
2013
274 breaches
7M records
2014
307 breaches
12.7M records
2015
270 breaches
113.3M records
2016
329 breaches
16.5M records
Total
1801 breaches
171M+ records
Tweet along: #Sec360
WTF!
• What’s the problem
Healthcare?
• Is Healthcare fundamentally
bad at security?
• The opinions herein, yadda, yadda…
• Mine, not my employer’s, yadda, yadda…
Tweet along: #Sec360
@bcaplin
http://about.me/barrycaplin
securityandcoffee.blogspot.com
Tweet along: #Sec360
o Not-for-profit established in 1906
o Academic Health System since
1997
partnership with University of
Minnesota
o >22K employees
o >2500 aligned physicians
o Employed, faculty, independent
o 7 hospitals/medical centers
(>2,500 licensed beds)
o 40-plus primary care clinics
o 55-plus specialty clinics
o 54 senior housing locations
o 30-plus retail pharmacies
2015 volumes
o 6.6M outpatient encounters
o 1.55M clinic visits
o 67,682 inpatient admissions
o 78,157 surgeries
o 9,060 births
o 290 blood and marrow
transplants
o 45 organ transplants
o >$4 billion total revenue
2015 At-a-Glance
Tweet along: #Sec360
Who is Fairview?
A partnership of North Memorial and Fairview
Tweet along: #Sec360
Healthcare
Pressures
• Healthcare delivery is expensive
• Reimbursements, therefore
margins, are low
• Not-for-profit – nearly 2/3s of
hospitals
• Healthcare workers need
instantaneous, unfettered
access…
• And must spew data everywhere,
now…
• Or someone could die!
• Med Devices
• M & A
Tweet along: #Sec360
Regulatory
• HIPAA – Health Insurance Portability and
Accountability Act
• Focused on portability – mandated use of
EHR
• Privacy and Security were add-on’s
• Security Rule finalized in 2003 (Privacy in
2002)
• Focus on confidentiality of PHI
(Protected Health Information)
• Fines for data breaches, violations
• Fines were initially small
• HITECH Act changed that (2009)
• Health Information Technology for
Economic and Clinical Health
Tweet along: #Sec360
Regulatory
Small revenue margins + high fines
= not much extra for IT or
security
= focus on PHI data breach only
Tweet along: #Sec360
User Population
• Clinicians – Nurses, Doctors, Specialists, “-
ologists”, Researchers, Professors
• All are:
• Very smart
• Very busy
• Will find a way
• We need them to use their brain-cycles to heal,
not to work around security controls
• Must provide controls that complement workflows
• “wasted” time could be a patient safety issue
The Value of Your Data
Tweet along: #Sec360
Adversaries
• Then and Now
• It’s about… speed to market, low
cost/high return
• So Healthcare is the obvious target!
• Or is it?????
Tweet along: #Sec360
Financial/Retail
Data
• PII – Personally Identifiable
Information
• Often includes SSN,
mother’s maiden name
• 1-to-many
• You have many credit
cards
• Easy to monetize
• Asymmetric theft model
• The victim often doesn’t
bear the cost
• (I’m not minimizing ID
Fraud which is a very
real and very bad thing.
But the vast majority
here are simple account
hijacking.)
Tweet along: #Sec360
Healthcare
Data
• “Rich”, complete information
• Basically 1-to-1
• You have many credit
cards
• You have 1 healthcare
record (yes, it might be
fragmented)
• >112M records breached in
2015; >171M through 2016
(via OCR Wall of Shame)
• Over 171M healthcare records
breached actually means…
Healthcare data on over
>171M Americans breached!
• US population is >300M
• So can we be done
now???
Tweet along: #Sec360
Effects of a
Healthcare data
breach
• Your healthcare data is
breached and
• You have surgery scheduled
tomorrow… What happens?
• You have your surgery
• OTOH, if the hospital is hit by
major ransomware?
• What if you’re actually on
the OR table???
Tweet along: #Sec360
Effects of a Healthcare
data breach
• But… very hard to monetize
• Data can be used to commit financial
crime
• But it’s easier to just steal credit card
numbers
• Medical Service fraud
• Yes, but you have to show up
• This can be a very nasty problem –
the fraudster pollutes the victim’s
medical record
• And no one needs to steal your
medical data to do this
• Drugs!
• Real, but you have to show up
• Data theft is too complex for most of
the drug-seekers; volume is too low
for the big players
• And no one needs to steal your
medical data to do this
Let’s Review
• Healthcare data is the most
valuable data
• Healthcare has limited funds
for security
• Focus on PHI data breach
• Professional thieves
• It’s about… speed to market,
low cost/high return
• So Healthcare is the obvious
target!
• Or is it?????Tweet along: #Sec360
What’s Worse?
• Credit card theft is annoying
• It’s like retail “shrinkage”
• Yes, it does cost us all
• Real ID Fraud is very bad for the victim but rates
are low
• Medical ID Fraud can be committed without theft of
your medical record
• Remember the OPM breach???
• Is this the most significant breach of PII ever?
• Intellectual Property
• IP theft may have even greater negative impact
to our economy
• And what about theft of military secrets?
Reality
• If healthcare data is the most valuable, and…
• Healthcare orgs have weak security, and…
• Financial orgs have great security, then…
• Why did the bad people hit the financial/retail
industry first?
• Footprint? Opportunity?
• Ease of Monetization?
• Volume?
Tweet along: #Sec360
Reality
• Why are they hitting healthcare now?
• Financial/Retail hardened their defenses?
• Financial/Retail no longer interesting?
• Monetization? – still hard
• Volume? – fewer total records to get
Tweet along: #Sec360
Sidebar Rant
– The Real
Problem
• Is the problem that PII
gets breached?
• Or…
• That it’s too easy to
commit ID fraud or other
crimes with the data?
• Can we make it harder to:
• Get services
• Open accounts
• Masquerade
… with other’s
information???Tweet along: #Sec360
Did HIPAA Help?
• Initially… Yes!
• Woke healthcare up
• But the focus on
Confidentiality is the
problem
• (yes, I know there’s more
to it, but look at the CMS
Wall of Shame)
• The fines are material, but
healthcare still has no excess
funds!
• Kick ‘em when they’re
down?
• So, no, HIPAA doesn’t helpTweet along: #Sec360
Gimme a “C”
• Do Regulations help?
• Initially… Yes! – but they
must keep up with the
times
• Security can’t be
• A point solution
• About one data type – PHI,
CC data, FTI, etc.
• Just about Confidentiality
• Winter is coming!
• Well, really it’s spring!
• We’re already thinking
about Availibility
• Can you spell DDoS?
• Can you spell
Brickerbot?
http://www.healthcareinfosecurity.com/blogs/hipaa-enforcement-look-ahead-p-2463
Tweet along: #Sec360
What about data
Integrity?
• What if rather than decrypting
our data for some bitcoin…
• It was fix our slightly altered
data for a “small consulting
fee”?
• Now that’s scary!
Tweet along: #Sec360
Solution #1
• Play in the same sandbox
• The alphabet soup of regulations has got to go
• We need a single security framework and standard that will
work across all areas of critical infrastructure?
• Sound familiar…?
• NIST CSF – CyberSecurity Framework
• History
• Yes, I realize that this is very US-centric
• Think globally, act locally – I can’t be responsible for all the world’s
problems!Tweet along: #Sec360
Solution #1 – NIST CSF
• It maps to everything
• Already directed at every critical
infrastructure industry vertical
• Can easily apply a maturity
model
• 800-53 provides the detailed
standard
Tweet along: #Sec360
Solution #2
• Many organizations still need an
“incentive”
• Are fines useful?
• Potentially
• How about rather than fine organizations,
force them instead to put an equivalent
amount of funding into an enterprise
security program!
• Perhaps some fine members of the
vendor community can offer holistic
security services?
• Maybe not
Tweet along: #Sec360
Regulations
• Are they necessary?
• Why can’t we solve these things ourselves?
Tweet along: #Sec360
What about 3rd party solutions and med
devices?
• Can’t live with ‘em, can’t live without ‘em.
• The same principles stand for these providers
• They must be held to the same high standard
• Vulnerabilities or other issues that can weaken their customers’ security
posture must be fixed
• All software must be patchable
• Even better – use solid, secure software engineering principles!
Tweet along: #Sec360
The Bottom Line
Point solutions and regulatory compliance will never
replace a holistic enterprise security program based upon
a solid framework
Tweet along: #Sec360
Barry Caplin
Fairview Health Services
bcaplin1@fairview.org
bc@bjb.org
@bcaplin
securityandcoffee.blogspot.com

Contenu connexe

Similaire à Healing healthcare security

Accidental Insider
Accidental InsiderAccidental Insider
Accidental InsiderBarry Caplin
 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Crafted
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveTargetX
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & ManufacturingEvan Francen
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Matt Hathaway
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
How To Entrepreneur
How To Entrepreneur How To Entrepreneur
How To Entrepreneur Ken Berkun
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardLERNER Consulting
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardLERNER Consulting
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
Enemy at the Gates - Silicon Halton Meetup 53
Enemy at the Gates - Silicon Halton Meetup 53Enemy at the Gates - Silicon Halton Meetup 53
Enemy at the Gates - Silicon Halton Meetup 53Silicon Halton
 
Elder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationElder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationOKSecurities
 
Emma cartmell sxsw presentation 2014
Emma cartmell sxsw presentation 2014Emma cartmell sxsw presentation 2014
Emma cartmell sxsw presentation 2014exsede
 

Similaire à Healing healthcare security (20)

Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
How To Entrepreneur
How To Entrepreneur How To Entrepreneur
How To Entrepreneur
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
How to pitch your biotech idea
How to pitch your biotech ideaHow to pitch your biotech idea
How to pitch your biotech idea
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Security beyond compliance
Security beyond complianceSecurity beyond compliance
Security beyond compliance
 
BeHealth.Today | IDA
BeHealth.Today | IDABeHealth.Today | IDA
BeHealth.Today | IDA
 
Enemy at the Gates - Silicon Halton Meetup 53
Enemy at the Gates - Silicon Halton Meetup 53Enemy at the Gates - Silicon Halton Meetup 53
Enemy at the Gates - Silicon Halton Meetup 53
 
Elder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationElder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial Exploitation
 
Emma cartmell sxsw presentation 2014
Emma cartmell sxsw presentation 2014Emma cartmell sxsw presentation 2014
Emma cartmell sxsw presentation 2014
 

Plus de Barry Caplin

It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503Barry Caplin
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16Barry Caplin
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Barry Caplin
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusBarry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - PasswordsBarry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and CyberbullyingBarry Caplin
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13Barry Caplin
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Barry Caplin
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityBarry Caplin
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso saysBarry Caplin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11Barry Caplin
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksBarry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsBarry Caplin
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsBarry Caplin
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart ParentBarry Caplin
 

Plus de Barry Caplin (20)

It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart Parent
 

Dernier

FAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxFAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxMumux Mirani
 
Learn Tips for Managing Chemobrain or Mental Fogginess
Learn Tips for Managing Chemobrain or Mental FogginessLearn Tips for Managing Chemobrain or Mental Fogginess
Learn Tips for Managing Chemobrain or Mental Fogginessbkling
 
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书rnrncn29
 
EMS Response to Terrorism involving Weapons of Mass Destruction
EMS Response to Terrorism involving Weapons of Mass DestructionEMS Response to Terrorism involving Weapons of Mass Destruction
EMS Response to Terrorism involving Weapons of Mass DestructionJannelPomida
 
Mental Health for physiotherapy and other health students
Mental Health for physiotherapy and other health studentsMental Health for physiotherapy and other health students
Mental Health for physiotherapy and other health studentseyobkaseye
 
Immediate care of newborn, midwifery and obstetrical nursing
Immediate care of newborn, midwifery and obstetrical nursingImmediate care of newborn, midwifery and obstetrical nursing
Immediate care of newborn, midwifery and obstetrical nursingNursing education
 
Medisep insurance policy , new kerala government insurance policy for govrnm...
Medisep insurance policy , new  kerala government insurance policy for govrnm...Medisep insurance policy , new  kerala government insurance policy for govrnm...
Medisep insurance policy , new kerala government insurance policy for govrnm...LinshaLichu1
 
Understanding Cholera: Epidemiology, Prevention, and Control.pdf
Understanding Cholera: Epidemiology, Prevention, and Control.pdfUnderstanding Cholera: Epidemiology, Prevention, and Control.pdf
Understanding Cholera: Epidemiology, Prevention, and Control.pdfSasikiranMarri
 
Exploring the Integration of Homeopathy and Allopathy in Healthcare.pdf
Exploring the Integration of Homeopathy and Allopathy in Healthcare.pdfExploring the Integration of Homeopathy and Allopathy in Healthcare.pdf
Exploring the Integration of Homeopathy and Allopathy in Healthcare.pdfDharma Homoeopathy
 
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are HeardAdvance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are HeardVITASAuthor
 
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdfPreventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdfAditiAlishetty
 
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...The Lifesciences Magazine
 
CROHNS DISEASE.pptx by Dr. Chayanika Das
CROHNS DISEASE.pptx by Dr. Chayanika DasCROHNS DISEASE.pptx by Dr. Chayanika Das
CROHNS DISEASE.pptx by Dr. Chayanika DasChayanika Das
 
2024 Compliatric Webinar Series - OSV Overview and Panel Discussion April 202...
2024 Compliatric Webinar Series - OSV Overview and Panel Discussion April 202...2024 Compliatric Webinar Series - OSV Overview and Panel Discussion April 202...
2024 Compliatric Webinar Series - OSV Overview and Panel Discussion April 202...Compliatric Where Compliance Happens
 
Evidence-based resources -2023-PRUH SS.pptx
Evidence-based resources -2023-PRUH SS.pptxEvidence-based resources -2023-PRUH SS.pptx
Evidence-based resources -2023-PRUH SS.pptxMrs S Sen
 
Incentive spirometry powerpoint presentation
Incentive spirometry powerpoint presentationIncentive spirometry powerpoint presentation
Incentive spirometry powerpoint presentationpratiksha ghimire
 
20 Benefits of Empathetic Listening in Mental Health Support
20 Benefits of Empathetic Listening in Mental Health Support20 Benefits of Empathetic Listening in Mental Health Support
20 Benefits of Empathetic Listening in Mental Health SupportSayhey
 
Artificial Intelligence Robotics & Computational Fluid Dynamics
Artificial Intelligence Robotics & Computational Fluid DynamicsArtificial Intelligence Robotics & Computational Fluid Dynamics
Artificial Intelligence Robotics & Computational Fluid DynamicsParag Kothawade
 

Dernier (20)

FAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptxFAMILY in sociology for physiotherapists.pptx
FAMILY in sociology for physiotherapists.pptx
 
Learn Tips for Managing Chemobrain or Mental Fogginess
Learn Tips for Managing Chemobrain or Mental FogginessLearn Tips for Managing Chemobrain or Mental Fogginess
Learn Tips for Managing Chemobrain or Mental Fogginess
 
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
『澳洲文凭』买莫道克大学毕业证书成绩单办理澳洲Murdoch文凭学位证书
 
EMS Response to Terrorism involving Weapons of Mass Destruction
EMS Response to Terrorism involving Weapons of Mass DestructionEMS Response to Terrorism involving Weapons of Mass Destruction
EMS Response to Terrorism involving Weapons of Mass Destruction
 
Mental Health for physiotherapy and other health students
Mental Health for physiotherapy and other health studentsMental Health for physiotherapy and other health students
Mental Health for physiotherapy and other health students
 
Immediate care of newborn, midwifery and obstetrical nursing
Immediate care of newborn, midwifery and obstetrical nursingImmediate care of newborn, midwifery and obstetrical nursing
Immediate care of newborn, midwifery and obstetrical nursing
 
Medisep insurance policy , new kerala government insurance policy for govrnm...
Medisep insurance policy , new  kerala government insurance policy for govrnm...Medisep insurance policy , new  kerala government insurance policy for govrnm...
Medisep insurance policy , new kerala government insurance policy for govrnm...
 
Understanding Cholera: Epidemiology, Prevention, and Control.pdf
Understanding Cholera: Epidemiology, Prevention, and Control.pdfUnderstanding Cholera: Epidemiology, Prevention, and Control.pdf
Understanding Cholera: Epidemiology, Prevention, and Control.pdf
 
Exploring the Integration of Homeopathy and Allopathy in Healthcare.pdf
Exploring the Integration of Homeopathy and Allopathy in Healthcare.pdfExploring the Integration of Homeopathy and Allopathy in Healthcare.pdf
Exploring the Integration of Homeopathy and Allopathy in Healthcare.pdf
 
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are HeardAdvance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
Advance Directives and Advance Care Planning: Ensuring Patient Voices Are Heard
 
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdfPreventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
 
Coping with Childhood Cancer - How Does it Hurt Today
Coping with Childhood Cancer - How Does it Hurt TodayCoping with Childhood Cancer - How Does it Hurt Today
Coping with Childhood Cancer - How Does it Hurt Today
 
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
Importance of Assessing Level of Consciousness in Medical Care | The Lifescie...
 
CROHNS DISEASE.pptx by Dr. Chayanika Das
CROHNS DISEASE.pptx by Dr. Chayanika DasCROHNS DISEASE.pptx by Dr. Chayanika Das
CROHNS DISEASE.pptx by Dr. Chayanika Das
 
2024 Compliatric Webinar Series - OSV Overview and Panel Discussion April 202...
2024 Compliatric Webinar Series - OSV Overview and Panel Discussion April 202...2024 Compliatric Webinar Series - OSV Overview and Panel Discussion April 202...
2024 Compliatric Webinar Series - OSV Overview and Panel Discussion April 202...
 
Kidney Transplant At Hiranandani Hospital
Kidney Transplant At Hiranandani HospitalKidney Transplant At Hiranandani Hospital
Kidney Transplant At Hiranandani Hospital
 
Evidence-based resources -2023-PRUH SS.pptx
Evidence-based resources -2023-PRUH SS.pptxEvidence-based resources -2023-PRUH SS.pptx
Evidence-based resources -2023-PRUH SS.pptx
 
Incentive spirometry powerpoint presentation
Incentive spirometry powerpoint presentationIncentive spirometry powerpoint presentation
Incentive spirometry powerpoint presentation
 
20 Benefits of Empathetic Listening in Mental Health Support
20 Benefits of Empathetic Listening in Mental Health Support20 Benefits of Empathetic Listening in Mental Health Support
20 Benefits of Empathetic Listening in Mental Health Support
 
Artificial Intelligence Robotics & Computational Fluid Dynamics
Artificial Intelligence Robotics & Computational Fluid DynamicsArtificial Intelligence Robotics & Computational Fluid Dynamics
Artificial Intelligence Robotics & Computational Fluid Dynamics
 

Healing healthcare security

  • 1. Healing Healthcare Security Barry Caplin, VP & CISO, Fairview Health Services bc@bjb.org bcaplin1@fairview.org @bcaplin https://securityandcoffee.blogspot.com/ Secure360 May 16, 2017
  • 2.
  • 3. Healthcare Breach Stats 2009 18 breaches 135K records 2010 198 breaches 5.5M records 2011 196 breaches 13.2M records 2012 209 breaches 2.8M records 2013 274 breaches 7M records 2014 307 breaches 12.7M records 2015 270 breaches 113.3M records 2016 329 breaches 16.5M records Total 1801 breaches 171M+ records Tweet along: #Sec360
  • 4. WTF! • What’s the problem Healthcare? • Is Healthcare fundamentally bad at security? • The opinions herein, yadda, yadda… • Mine, not my employer’s, yadda, yadda… Tweet along: #Sec360
  • 6. o Not-for-profit established in 1906 o Academic Health System since 1997 partnership with University of Minnesota o >22K employees o >2500 aligned physicians o Employed, faculty, independent o 7 hospitals/medical centers (>2,500 licensed beds) o 40-plus primary care clinics o 55-plus specialty clinics o 54 senior housing locations o 30-plus retail pharmacies 2015 volumes o 6.6M outpatient encounters o 1.55M clinic visits o 67,682 inpatient admissions o 78,157 surgeries o 9,060 births o 290 blood and marrow transplants o 45 organ transplants o >$4 billion total revenue 2015 At-a-Glance Tweet along: #Sec360
  • 7. Who is Fairview? A partnership of North Memorial and Fairview Tweet along: #Sec360
  • 8. Healthcare Pressures • Healthcare delivery is expensive • Reimbursements, therefore margins, are low • Not-for-profit – nearly 2/3s of hospitals • Healthcare workers need instantaneous, unfettered access… • And must spew data everywhere, now… • Or someone could die! • Med Devices • M & A Tweet along: #Sec360
  • 9. Regulatory • HIPAA – Health Insurance Portability and Accountability Act • Focused on portability – mandated use of EHR • Privacy and Security were add-on’s • Security Rule finalized in 2003 (Privacy in 2002) • Focus on confidentiality of PHI (Protected Health Information) • Fines for data breaches, violations • Fines were initially small • HITECH Act changed that (2009) • Health Information Technology for Economic and Clinical Health Tweet along: #Sec360
  • 10. Regulatory Small revenue margins + high fines = not much extra for IT or security = focus on PHI data breach only Tweet along: #Sec360
  • 11. User Population • Clinicians – Nurses, Doctors, Specialists, “- ologists”, Researchers, Professors • All are: • Very smart • Very busy • Will find a way • We need them to use their brain-cycles to heal, not to work around security controls • Must provide controls that complement workflows • “wasted” time could be a patient safety issue
  • 12. The Value of Your Data Tweet along: #Sec360
  • 13. Adversaries • Then and Now • It’s about… speed to market, low cost/high return • So Healthcare is the obvious target! • Or is it????? Tweet along: #Sec360
  • 14. Financial/Retail Data • PII – Personally Identifiable Information • Often includes SSN, mother’s maiden name • 1-to-many • You have many credit cards • Easy to monetize • Asymmetric theft model • The victim often doesn’t bear the cost • (I’m not minimizing ID Fraud which is a very real and very bad thing. But the vast majority here are simple account hijacking.) Tweet along: #Sec360
  • 15. Healthcare Data • “Rich”, complete information • Basically 1-to-1 • You have many credit cards • You have 1 healthcare record (yes, it might be fragmented) • >112M records breached in 2015; >171M through 2016 (via OCR Wall of Shame) • Over 171M healthcare records breached actually means… Healthcare data on over >171M Americans breached! • US population is >300M • So can we be done now??? Tweet along: #Sec360
  • 16. Effects of a Healthcare data breach • Your healthcare data is breached and • You have surgery scheduled tomorrow… What happens? • You have your surgery • OTOH, if the hospital is hit by major ransomware? • What if you’re actually on the OR table??? Tweet along: #Sec360
  • 17. Effects of a Healthcare data breach • But… very hard to monetize • Data can be used to commit financial crime • But it’s easier to just steal credit card numbers • Medical Service fraud • Yes, but you have to show up • This can be a very nasty problem – the fraudster pollutes the victim’s medical record • And no one needs to steal your medical data to do this • Drugs! • Real, but you have to show up • Data theft is too complex for most of the drug-seekers; volume is too low for the big players • And no one needs to steal your medical data to do this
  • 18. Let’s Review • Healthcare data is the most valuable data • Healthcare has limited funds for security • Focus on PHI data breach • Professional thieves • It’s about… speed to market, low cost/high return • So Healthcare is the obvious target! • Or is it?????Tweet along: #Sec360
  • 19. What’s Worse? • Credit card theft is annoying • It’s like retail “shrinkage” • Yes, it does cost us all • Real ID Fraud is very bad for the victim but rates are low • Medical ID Fraud can be committed without theft of your medical record • Remember the OPM breach??? • Is this the most significant breach of PII ever? • Intellectual Property • IP theft may have even greater negative impact to our economy • And what about theft of military secrets?
  • 20. Reality • If healthcare data is the most valuable, and… • Healthcare orgs have weak security, and… • Financial orgs have great security, then… • Why did the bad people hit the financial/retail industry first? • Footprint? Opportunity? • Ease of Monetization? • Volume? Tweet along: #Sec360
  • 21. Reality • Why are they hitting healthcare now? • Financial/Retail hardened their defenses? • Financial/Retail no longer interesting? • Monetization? – still hard • Volume? – fewer total records to get Tweet along: #Sec360
  • 22. Sidebar Rant – The Real Problem • Is the problem that PII gets breached? • Or… • That it’s too easy to commit ID fraud or other crimes with the data? • Can we make it harder to: • Get services • Open accounts • Masquerade … with other’s information???Tweet along: #Sec360
  • 23. Did HIPAA Help? • Initially… Yes! • Woke healthcare up • But the focus on Confidentiality is the problem • (yes, I know there’s more to it, but look at the CMS Wall of Shame) • The fines are material, but healthcare still has no excess funds! • Kick ‘em when they’re down? • So, no, HIPAA doesn’t helpTweet along: #Sec360
  • 24.
  • 25. Gimme a “C” • Do Regulations help? • Initially… Yes! – but they must keep up with the times • Security can’t be • A point solution • About one data type – PHI, CC data, FTI, etc. • Just about Confidentiality • Winter is coming! • Well, really it’s spring! • We’re already thinking about Availibility • Can you spell DDoS? • Can you spell Brickerbot? http://www.healthcareinfosecurity.com/blogs/hipaa-enforcement-look-ahead-p-2463 Tweet along: #Sec360
  • 26. What about data Integrity? • What if rather than decrypting our data for some bitcoin… • It was fix our slightly altered data for a “small consulting fee”? • Now that’s scary! Tweet along: #Sec360
  • 27. Solution #1 • Play in the same sandbox • The alphabet soup of regulations has got to go • We need a single security framework and standard that will work across all areas of critical infrastructure? • Sound familiar…? • NIST CSF – CyberSecurity Framework • History • Yes, I realize that this is very US-centric • Think globally, act locally – I can’t be responsible for all the world’s problems!Tweet along: #Sec360
  • 28. Solution #1 – NIST CSF • It maps to everything • Already directed at every critical infrastructure industry vertical • Can easily apply a maturity model • 800-53 provides the detailed standard Tweet along: #Sec360
  • 29. Solution #2 • Many organizations still need an “incentive” • Are fines useful? • Potentially • How about rather than fine organizations, force them instead to put an equivalent amount of funding into an enterprise security program! • Perhaps some fine members of the vendor community can offer holistic security services? • Maybe not Tweet along: #Sec360
  • 30. Regulations • Are they necessary? • Why can’t we solve these things ourselves? Tweet along: #Sec360
  • 31. What about 3rd party solutions and med devices? • Can’t live with ‘em, can’t live without ‘em. • The same principles stand for these providers • They must be held to the same high standard • Vulnerabilities or other issues that can weaken their customers’ security posture must be fixed • All software must be patchable • Even better – use solid, secure software engineering principles! Tweet along: #Sec360
  • 32. The Bottom Line Point solutions and regulatory compliance will never replace a holistic enterprise security program based upon a solid framework Tweet along: #Sec360
  • 33. Barry Caplin Fairview Health Services bcaplin1@fairview.org bc@bjb.org @bcaplin securityandcoffee.blogspot.com

Notes de l'éditeur

  1. http://healthitsecurity.com/news/healthcare-data-security-incidents-second-highest-in-2016
  2. Anthem 79M; Premera 11M; Excellus 10M = 100M
  3. If your healthcare data is breached, the only thing you may die of is embarrassment!
  4. Schneier has said that regulations are the result of not solving these issues ourselves