SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
Healthcare
Security
Essentials




Jean Pawluk, CISSP
                     1
A little bit of background




           Jean Pawluk       2
Healthcare
Headlines in the News




         Jean Pawluk    3
Cignet
$ 4.2 Million Fine
 Violations of HIPAA Privacy Rule




                 Jean Pawluk        4
Yep,
“They really are out to get you”




              Jean Pawluk          5
Motivation
Theft of services
Identity theft
Fraud
Embarrassment
Harm
Denial of Services



                     Jean Pawluk   6
Costs of Medical Identity Theft 2010

 $214 per healthcare record

 $20,663    average cost to victim

 $2 Million per healthcare data breach

                               Data courtesy of Ponemon Institute
                               • 2010 Benchmark Study on Patient Privacy and Data Security
                 Jean Pawluk   •Second Annual Survey on Medical Identity Theft   7
                               •2010 Annual Study: U.S. Cost of a Data Breach
Rules




 Jean Pawluk   8
Lot’s of rules




     Jean Pawluk   9
Confused ?
You Can…………
    You Can’t……...
You Can………
    You Can’t …….



        Jean Pawluk   10
Security is About



• People
• Process
• Technology

 It’s everyone business
         and it is your business in healthcare

                   Jean Pawluk              11
Lots of Healthcare Rules
•   HIPAA
•   HiTech
•   HL7
•   ISO/CEN
•   Non-US Healthcare
    – EU, Canada, Australia, Singapore



                         Jean Pawluk     12
Sensitive Health Information
“Individually identifiable health information” is
  information, including demographic data, that
  relates to:


   individual’s past, present or future physical or mental
    health or condition,
   provision of health care to the individual, or
   past, present, or future payment for the provision of
    health care to the individual


                           Jean Pawluk                   13
Electronic Protected Health Information
•    Name                                       •    Health plan beneficiary number
•    Address (all geographic subdivisions       •    Account number
    smaller than state, including street        •    Certificate/license number
    address, city, county, zip code)
                                                •    Any vehicle or other device serial
•   All elements (except years) of dates             number
    related to an individual (including
                                                •    Medical device identifiers or serial
    birth date, admission date, discharge
                                                     numbers on implants
    date, date of death and exact age)
                                                •    Finger or voice prints
•   Telephone numbers
                                                •    Photographic images
•   Fax number
                                                •    Passport number
•   Email address
                                                •    State ID card
•   Social Security number
                                                •    Any other characteristic that could
•   Medical record number
                                                     uniquely identify the individual

                                       Jean Pawluk                                   14
Gramm-Leach-Bliley Act (GLBA)

Provided to obtain (or in connection               Examples of customer private
   with) a financial product or service
                                                     personal information include
Results from any transaction involving a
  financial product or service between
                                                     but are not limited to:
  you and a customer                               • Social Security Number
                                                   • Credit Card Number
                                                   • Account Numbers
                                                   • Account Balances
                                                   • Any Financial Transactions
                                                   • Tax Return Information
                                                   • Driver’s License Number
                                                   • Date/Location of Birth
                                          Jean Pawluk                          15
Even More Rules
•   PCI
•   SOX (public)
•   FISMA
•   Privacy Rules
    – EU
    – Canada
    – Australia


                        Jean Pawluk   16
More Challenges




      Jean Pawluk   17
Health Technology Challenges

• Heterogeneous devices
• Laptops, portable devices, backup media, and
wireless infrastructure
• Portable devices
• Medical Devices
• Complexity
• Boundaries are not fixed



                       Jean Pawluk               18
Sources of Embarrassment ?




                             19
Healthcare Security Standards
                       Data Integrity
                                                             Internet Security
Authentication                            System Security
                       • Encryption
                                                             • Personal Health
• Identification                          • Communication
                       • Data Integrity                        Records
• Signature              Process          • Processing
                                                             • Secure Internet
• Non-repudiation      • Permanence       • Storage            Services




                      General Security Standards
                                          200+
                    Standards for Internet and Information Systems


                                                                                 20
Key Areas of ISO 17799
       Business
      Continuity                     Compliance                      Security Policy
       Planning



  Incident                                                                     Security
                   Confidentiality                       Integrity
  Handling                                                                   Organization

                                          DATA

Communication                                                                   Asset
 & Operations                                                               Classification
                                       Availability



    System                                                                    Personnel
                          Access
 Development &                                      Physical security          security
                          Control
  Maintenance
                                      Jean Pawluk                                         21
ISO 27799
Security management in health using ISO

• Personal health information
• Pseudo- Anonymous data derived from personal health information
• Statistical and research data derived by removal of personally identifying
  data
• Clinical / medical knowledge not related to specific patients (e.g., data on
  adverse drug reactions)
• Data on health professionals and staff
• Information related to public health surveillance
• Audit trail data that are produced by health information systems containing
  personal health information or data about the actions of users in regard to
  personal health information
• System security data, e.g.: access control data and other security related
  system configuration data for health information systems

                                                                        22
ISO 27799 2008 Healthcare

• Threats to health information security
• How to carry out the tasks of the Healthcare
  Information Security Management System
  described in ISO 17799




                                                 23
Healthcare Security Steps
1.   Identify Systems At Risk
     Systems containing sensitive healthcare, financial and IP data and/or having a high
          business risk
2.   Information Gathering and Planning
     Partner with subject matter experts to gather information to identify system exposures
3.   Evaluate Risk & Vulnerability
     Risk is the expectation of damage given the probability of attack
4.   Identify Possible Solutions (Controls / Mitigation)
     Processes, tools & procedures that reduce the probability of a exposure being exploited
     Leverage common security architecture & processes
5.   Determine Feasibility & Acceptable Risk
     Feasibility based on key dependencies, technological know-how and business readiness
     May decide to accept lower risk factors based on feasibility
6.   Roadmap Prioritization
     Putting it all together
7.   Execute the Plan
                                          Jean Pawluk                                      24
8.   Repeat
Information
  Security




    Jean Pawluk   25
2010 CWE/SANS
                           Top 25 Programming Errors
1. CWE-79 XSS                                                 14. CWE-129 Uncontrolled Array Index
2. CWE-89 SQL Injection                                       15. CWE-754 Improper Check for Exceptional Conditions
3. CWE-120 Classic Buffer Overflow                            16. CWE-209 Error Message Infoleak
4. CWE-352 CSRF                                               17. CWE-190 Integer Overflow/Wrap
5. CWE-285 Improper Authorization                             18. CWE-131 Incorrect Buffer Size Calculation
6. CWE-807 Reliance on Untrusted Inputs in Security           19. CWE-306 Missing Authentication
    Decision
                                                              20. CWE-494 Download of Code Without Integrity
7. CWE-22 Path Traversal                                           Check
8. CWE-434 File Upload                                        21. CWE-732 Insecure Permissions
9. CWE-78 OS Command Injection                                22. CWE-770 Allocation of Resources Without Limits or
                                                                   Throttling
10. CWE-311 Missing Encryption
                                                              23. CWE-601 Open Redirect
11. CWE-798 Hard-coded Credentials
                                                              24. CWE-327 Broken Crypto
12. CWE-805 Incorrect Length Value in Buffer Access
                                                              25. CWE-362 Race Condition
13. CWE-98 PHP Remote File Inclusion

                                                       http://www.sans.org/top25-software-errors/
                                                      Jean Pawluk                                                 26
Dark Side – Think about abuse




            Jean Pawluk         27
courtesy of xkdc.com
                       28
Knock, knock, who's there? Do you
 really know who has your data ?




                                    29
Hard Lessons Learned




                       30
What they did 1




     Jean Pawluk   31
What they did 2




                  32
What they did 3




     Jean Pawluk   33
Summary
• Health Risk Management means You are Liable
• Use Compensating Controls
• Plan for Failure
• Trust but Verify
• Web Services Security is a oxymoron because
  technology is dynamic and browsers are frail
• Good security = Compliance
            but Compliance ≠ Good Security

                                                 34
Still Confused ?




                   35
Additional Information




         Jean Pawluk     36
Resources
   NIST Intro Guide to test HIPAA security
     http://csrc.nist.gov/publications/nistpubs/800-66-Rev1/SP-800-66-Revision1.pdf


   NIST Health IT Standards and Testing program
     http://healthcare.nist.gov/

   PCI DSS Quick Reference Guide
     https://www.pcisecuritystandards.org/documents/PCI%20SSC%20Quick%20Reference%20Guide.pdf

   Cloud Security Alliance
         http://www.cloudsecurityalliance.org/
   JERICHO Forum
         http://www.opengroup.org/jericho/

   HIPAA & HiTech
        http://www.sharedassessments.org/

   ISO 27799:2008 Healthcare

         http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=41298

   ISO/TS 21091:2005 Directory services for security, communications and identification of professionals and patients

•   Open Web Application Security Project
      http://www.owasp.org/index.php?title=Category:OWASP_Guide_Project&redirect=no


                                                         Jean Pawluk                                                     37
Finis




Jean Pawluk   38

Contenu connexe

En vedette

Ministerio del Interior - Presentación norma iso 17799
Ministerio del Interior - Presentación norma iso 17799Ministerio del Interior - Presentación norma iso 17799
Ministerio del Interior - Presentación norma iso 17799Cuidando mi Automovil
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06gbroadbent67
 
Gestao da politica de segurança e operação da informacao
Gestao da politica de segurança e operação da informacaoGestao da politica de segurança e operação da informacao
Gestao da politica de segurança e operação da informacaoRui Gomes
 
Iso 17799
Iso 17799Iso 17799
Iso 17799rcm_007
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat PrognosisFireEye, Inc.
 
Information security in healthcare - a perspective on EMR Security
Information security in healthcare - a perspective on EMR SecurityInformation security in healthcare - a perspective on EMR Security
Information security in healthcare - a perspective on EMR SecurityMadhav Chablani
 
Соответствие между тех. специализациями и продуктами Trend Micro. 17 ноября 2011
Соответствие между тех. специализациями и продуктами Trend Micro. 17 ноября 2011Соответствие между тех. специализациями и продуктами Trend Micro. 17 ноября 2011
Соответствие между тех. специализациями и продуктами Trend Micro. 17 ноября 2011Валерий Коржов
 
Reconsidering talent development in a connective era
Reconsidering talent development in a connective eraReconsidering talent development in a connective era
Reconsidering talent development in a connective eraCarmen Tschofen
 
Disruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.ilDisruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.ilAmir Langer
 
インテキスト広告メディア向け資料簡易版
インテキスト広告メディア向け資料簡易版インテキスト広告メディア向け資料簡易版
インテキスト広告メディア向け資料簡易版kazuto sato
 
Food safety in one page talal khalid hasan
Food safety in one page talal khalid hasanFood safety in one page talal khalid hasan
Food safety in one page talal khalid hasanAmqc Almumtaz
 
Исследование рынка аутсорсинговых контактных центров Украины
Исследование рынка аутсорсинговых контактных центров УкраиныИсследование рынка аутсорсинговых контактных центров Украины
Исследование рынка аутсорсинговых контактных центров УкраиныМария Романенко
 
САМ - силовой активный материал
САМ - силовой активный материалСАМ - силовой активный материал
САМ - силовой активный материалkulibin
 

En vedette (20)

Ministerio del Interior - Presentación norma iso 17799
Ministerio del Interior - Presentación norma iso 17799Ministerio del Interior - Presentación norma iso 17799
Ministerio del Interior - Presentación norma iso 17799
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
USWNT Sponsorship
USWNT SponsorshipUSWNT Sponsorship
USWNT Sponsorship
 
Gestao da politica de segurança e operação da informacao
Gestao da politica de segurança e operação da informacaoGestao da politica de segurança e operação da informacao
Gestao da politica de segurança e operação da informacao
 
Iso 17799
Iso 17799Iso 17799
Iso 17799
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
Information security in healthcare - a perspective on EMR Security
Information security in healthcare - a perspective on EMR SecurityInformation security in healthcare - a perspective on EMR Security
Information security in healthcare - a perspective on EMR Security
 
Iso 27000
Iso 27000Iso 27000
Iso 27000
 
Tips to Transform Your Business with Cloud
Tips to Transform Your Business with CloudTips to Transform Your Business with Cloud
Tips to Transform Your Business with Cloud
 
Соответствие между тех. специализациями и продуктами Trend Micro. 17 ноября 2011
Соответствие между тех. специализациями и продуктами Trend Micro. 17 ноября 2011Соответствие между тех. специализациями и продуктами Trend Micro. 17 ноября 2011
Соответствие между тех. специализациями и продуктами Trend Micro. 17 ноября 2011
 
So much UX data! Now what?
So much UX data! Now what?So much UX data! Now what?
So much UX data! Now what?
 
Does the Bible mean what it says?
Does the Bible mean what it says?Does the Bible mean what it says?
Does the Bible mean what it says?
 
Reconsidering talent development in a connective era
Reconsidering talent development in a connective eraReconsidering talent development in a connective era
Reconsidering talent development in a connective era
 
Disruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.ilDisruptor 2015-12-22 @ java.il
Disruptor 2015-12-22 @ java.il
 
Raghavendra 1234
Raghavendra 1234Raghavendra 1234
Raghavendra 1234
 
インテキスト広告メディア向け資料簡易版
インテキスト広告メディア向け資料簡易版インテキスト広告メディア向け資料簡易版
インテキスト広告メディア向け資料簡易版
 
Food safety in one page talal khalid hasan
Food safety in one page talal khalid hasanFood safety in one page talal khalid hasan
Food safety in one page talal khalid hasan
 
Gifted futures
Gifted futures Gifted futures
Gifted futures
 
Исследование рынка аутсорсинговых контактных центров Украины
Исследование рынка аутсорсинговых контактных центров УкраиныИсследование рынка аутсорсинговых контактных центров Украины
Исследование рынка аутсорсинговых контактных центров Украины
 
САМ - силовой активный материал
САМ - силовой активный материалСАМ - силовой активный материал
САМ - силовой активный материал
 

Similaire à Healthcare Security Essentials jean pawluk april 28 2011

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)brentcarey
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16Glenn E. Davis
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyCompliancy Group
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013StampedeCon
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptssuser7ec6af
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
Standards of dental informatics, security issues
Standards of dental informatics, security issuesStandards of dental informatics, security issues
Standards of dental informatics, security issuesEbtissam Al-Madi
 
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsCombating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsTripwire
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidanceAmy Purcell
 
Meaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis WebinarMeaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis Webinardata brackets
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Security for heterogeneous enviroments
Security for heterogeneous enviromentsSecurity for heterogeneous enviroments
Security for heterogeneous enviromentsFederman Hoyos
 

Similaire à Healthcare Security Essentials jean pawluk april 28 2011 (20)

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
74 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.1674 x9019 bea legal slides short form ged12.12.16
74 x9019 bea legal slides short form ged12.12.16
 
Health Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of PrivacyHealth Data Encryption: The Seven Principals of Privacy
Health Data Encryption: The Seven Principals of Privacy
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
BMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.pptBMS _ 1. Biometrics and privacy.ppt
BMS _ 1. Biometrics and privacy.ppt
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Standards of dental informatics, security issues
Standards of dental informatics, security issuesStandards of dental informatics, security issues
Standards of dental informatics, security issues
 
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime ControlsCombating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Privacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and AvoidancePrivacy and Data Security: Risk Management and Avoidance
Privacy and Data Security: Risk Management and Avoidance
 
Meaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis WebinarMeaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis Webinar
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Security for heterogeneous enviroments
Security for heterogeneous enviromentsSecurity for heterogeneous enviroments
Security for heterogeneous enviroments
 

Dernier

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 

Dernier (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 

Healthcare Security Essentials jean pawluk april 28 2011

  • 2. A little bit of background Jean Pawluk 2
  • 3. Healthcare Headlines in the News Jean Pawluk 3
  • 4. Cignet $ 4.2 Million Fine Violations of HIPAA Privacy Rule Jean Pawluk 4
  • 5. Yep, “They really are out to get you” Jean Pawluk 5
  • 6. Motivation Theft of services Identity theft Fraud Embarrassment Harm Denial of Services Jean Pawluk 6
  • 7. Costs of Medical Identity Theft 2010 $214 per healthcare record $20,663 average cost to victim $2 Million per healthcare data breach Data courtesy of Ponemon Institute • 2010 Benchmark Study on Patient Privacy and Data Security Jean Pawluk •Second Annual Survey on Medical Identity Theft 7 •2010 Annual Study: U.S. Cost of a Data Breach
  • 9. Lot’s of rules Jean Pawluk 9
  • 10. Confused ? You Can………… You Can’t……... You Can……… You Can’t ……. Jean Pawluk 10
  • 11. Security is About • People • Process • Technology It’s everyone business and it is your business in healthcare Jean Pawluk 11
  • 12. Lots of Healthcare Rules • HIPAA • HiTech • HL7 • ISO/CEN • Non-US Healthcare – EU, Canada, Australia, Singapore Jean Pawluk 12
  • 13. Sensitive Health Information “Individually identifiable health information” is information, including demographic data, that relates to:  individual’s past, present or future physical or mental health or condition,  provision of health care to the individual, or  past, present, or future payment for the provision of health care to the individual Jean Pawluk 13
  • 14. Electronic Protected Health Information • Name • Health plan beneficiary number • Address (all geographic subdivisions • Account number smaller than state, including street • Certificate/license number address, city, county, zip code) • Any vehicle or other device serial • All elements (except years) of dates number related to an individual (including • Medical device identifiers or serial birth date, admission date, discharge numbers on implants date, date of death and exact age) • Finger or voice prints • Telephone numbers • Photographic images • Fax number • Passport number • Email address • State ID card • Social Security number • Any other characteristic that could • Medical record number uniquely identify the individual Jean Pawluk 14
  • 15. Gramm-Leach-Bliley Act (GLBA) Provided to obtain (or in connection Examples of customer private with) a financial product or service personal information include Results from any transaction involving a financial product or service between but are not limited to: you and a customer • Social Security Number • Credit Card Number • Account Numbers • Account Balances • Any Financial Transactions • Tax Return Information • Driver’s License Number • Date/Location of Birth Jean Pawluk 15
  • 16. Even More Rules • PCI • SOX (public) • FISMA • Privacy Rules – EU – Canada – Australia Jean Pawluk 16
  • 17. More Challenges Jean Pawluk 17
  • 18. Health Technology Challenges • Heterogeneous devices • Laptops, portable devices, backup media, and wireless infrastructure • Portable devices • Medical Devices • Complexity • Boundaries are not fixed Jean Pawluk 18
  • 20. Healthcare Security Standards Data Integrity Internet Security Authentication System Security • Encryption • Personal Health • Identification • Communication • Data Integrity Records • Signature Process • Processing • Secure Internet • Non-repudiation • Permanence • Storage Services General Security Standards 200+ Standards for Internet and Information Systems 20
  • 21. Key Areas of ISO 17799 Business Continuity Compliance Security Policy Planning Incident Security Confidentiality Integrity Handling Organization DATA Communication Asset & Operations Classification Availability System Personnel Access Development & Physical security security Control Maintenance Jean Pawluk 21
  • 22. ISO 27799 Security management in health using ISO • Personal health information • Pseudo- Anonymous data derived from personal health information • Statistical and research data derived by removal of personally identifying data • Clinical / medical knowledge not related to specific patients (e.g., data on adverse drug reactions) • Data on health professionals and staff • Information related to public health surveillance • Audit trail data that are produced by health information systems containing personal health information or data about the actions of users in regard to personal health information • System security data, e.g.: access control data and other security related system configuration data for health information systems 22
  • 23. ISO 27799 2008 Healthcare • Threats to health information security • How to carry out the tasks of the Healthcare Information Security Management System described in ISO 17799 23
  • 24. Healthcare Security Steps 1. Identify Systems At Risk Systems containing sensitive healthcare, financial and IP data and/or having a high business risk 2. Information Gathering and Planning Partner with subject matter experts to gather information to identify system exposures 3. Evaluate Risk & Vulnerability Risk is the expectation of damage given the probability of attack 4. Identify Possible Solutions (Controls / Mitigation) Processes, tools & procedures that reduce the probability of a exposure being exploited Leverage common security architecture & processes 5. Determine Feasibility & Acceptable Risk Feasibility based on key dependencies, technological know-how and business readiness May decide to accept lower risk factors based on feasibility 6. Roadmap Prioritization Putting it all together 7. Execute the Plan Jean Pawluk 24 8. Repeat
  • 25. Information Security Jean Pawluk 25
  • 26. 2010 CWE/SANS Top 25 Programming Errors 1. CWE-79 XSS 14. CWE-129 Uncontrolled Array Index 2. CWE-89 SQL Injection 15. CWE-754 Improper Check for Exceptional Conditions 3. CWE-120 Classic Buffer Overflow 16. CWE-209 Error Message Infoleak 4. CWE-352 CSRF 17. CWE-190 Integer Overflow/Wrap 5. CWE-285 Improper Authorization 18. CWE-131 Incorrect Buffer Size Calculation 6. CWE-807 Reliance on Untrusted Inputs in Security 19. CWE-306 Missing Authentication Decision 20. CWE-494 Download of Code Without Integrity 7. CWE-22 Path Traversal Check 8. CWE-434 File Upload 21. CWE-732 Insecure Permissions 9. CWE-78 OS Command Injection 22. CWE-770 Allocation of Resources Without Limits or Throttling 10. CWE-311 Missing Encryption 23. CWE-601 Open Redirect 11. CWE-798 Hard-coded Credentials 24. CWE-327 Broken Crypto 12. CWE-805 Incorrect Length Value in Buffer Access 25. CWE-362 Race Condition 13. CWE-98 PHP Remote File Inclusion http://www.sans.org/top25-software-errors/ Jean Pawluk 26
  • 27. Dark Side – Think about abuse Jean Pawluk 27
  • 29. Knock, knock, who's there? Do you really know who has your data ? 29
  • 31. What they did 1 Jean Pawluk 31
  • 33. What they did 3 Jean Pawluk 33
  • 34. Summary • Health Risk Management means You are Liable • Use Compensating Controls • Plan for Failure • Trust but Verify • Web Services Security is a oxymoron because technology is dynamic and browsers are frail • Good security = Compliance but Compliance ≠ Good Security 34
  • 36. Additional Information Jean Pawluk 36
  • 37. Resources  NIST Intro Guide to test HIPAA security http://csrc.nist.gov/publications/nistpubs/800-66-Rev1/SP-800-66-Revision1.pdf  NIST Health IT Standards and Testing program http://healthcare.nist.gov/  PCI DSS Quick Reference Guide https://www.pcisecuritystandards.org/documents/PCI%20SSC%20Quick%20Reference%20Guide.pdf  Cloud Security Alliance http://www.cloudsecurityalliance.org/  JERICHO Forum http://www.opengroup.org/jericho/  HIPAA & HiTech http://www.sharedassessments.org/  ISO 27799:2008 Healthcare http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=41298  ISO/TS 21091:2005 Directory services for security, communications and identification of professionals and patients • Open Web Application Security Project http://www.owasp.org/index.php?title=Category:OWASP_Guide_Project&redirect=no Jean Pawluk 37