Securing Your Agile, Mobile Clinicians — Breach Case Study

Transcription

Securing Your Agile, Mobile Clinicians — Breach Case Study
Securing Your Agile, Mobile
Clinicians — Breach Case Study
Phil Alexander, Information Security Officer, UMC Health System
Ellen M. Derrico, Sr. Director Healthcare, RES Software
Conflict of Interest
Phil Alexander, B.S., Security +, CEH, C|CISO
Has no real or apparent conflicts of interest to report.
Conflict of Interest
Ellen Derrico, B.Sc., MBA
Salary: RES Software
Royalty: N/A
Receipt of Intellectual Property Rights/Patent Holder: N/A
Consulting Fees (e.g., advisory boards): N/A
Fees for Non-CME Services Received Directly from a Commercial Interest or
their Agents (e.g., speakers’ bureau): N/A
Contracted Research: N/A
Ownership Interest (stocks, stock options or other ownership interest excluding
diversified mutual funds): N/A
Other: N/A
Agenda
• Introduction
• Set up of the security problem
• UMC Health System – a case study of security best
practices
• Wrap up and Q&A
Learning Objectives
• Learning Objective 1: Diagram factors that affect quality of care delivery
and cost highlighting where security factors into both areas
• Learning Objective 2: Show relationship between the clinical workforce’s
need for agility, mobility and engagement and IT’s challenge to manage
risk, security and compliance
• Learning Objective 3: Recognize best practices implementing successful
security programs, education, training and technology at UMC Texas
• Learning Objective 4: Define cost justification in spending for security
education, training and technology
STEPS — Satisfaction
Security
Security
education
technology,
programs
education, and
Engaging programs help
breach plan
clinicians be more
Patients express more
security conscious, less
satisfaction knowing their
stressed, and more
records are safe & their
focused on patients
private information is
better protected
•
•
•
Reduction of executed phishing emails by 70%
Auditing issues down 80%
Clinician satisfaction up 88%
Poll — Security Question #1
Security breaches can occur through:
A. Viral attacks
B. Malware attacks
C. Phishing
D. All of the above
Poll — Security Question #2
The responsibility of preventing security breaches fall to:
A. Chief Security Officer
B. IT Staff
C. End Users
D. All of the above
Poll — Security Question #3
True/False:
• You can fully prevent a security breach with the right technology,
programs, education and training on security.
The Healthcare Landscape
& Role of Security
How do we balance quality of care and sustainability in an increasingly
risky environment and how risky is it?
Overall Healthcare Landscape
CARE DELIVERY
Organizational
Agility
Patient
Engagement
Cost
Reduction
SUSTAINABILITY
Manage Risk
Compliance &
Security
Can you afford to have your name in the press
for the next big data breach?
Breach Data
An alarming 91 percent of healthcare organizations reported a data breach in the past two years. Some
45 percent of them were the victims of deliberate attacks by cybercriminals seeking to steal the medical
and financial information of their patients – a figure that has risen 125 percent since 2010:
https://www.yahoo.com/tech/report-nearly-half-of-us-healthcare-organizations-118323228724.html.
Breach by Incident Type and Counter Measures
Counter Measures:
Immediate offboarding
and computer lock down
White & black listing
Profile management
Immediate offboarding
and computer lock down
All of the above
Why is Security So Important?
• According to the Spotlight Report: Insider Threat, conducted by the
Crowd Research Partners, the biggest risk for a data breach is with
privileged users like clinicians (59% of the threat).
• Clinicians are busy and should be focused on patients, so sometimes
they might not be concentrating on whether or not to click on an
email or a link.
• Clinicians roam – they are mobile and use multiple devices. Devices
can be lost or stolen. More devices and more movement = more
risk.
• On May 27th, NBC Nightly News aired another report by Stephanie
Gosk on how these data are being used to steal and sell on the open
market identities, medical services and to fraud insurance providers:
http://www.nbcnews.com/news/us-news/electronic-medical-recordslatest-target-identity-thieves-n365591.
UMC Health System, Texas
A case study on how best to approach security — the 3-prong approach
for mitigating risk of breach.
3 Pronged Approach to
Security & Compliance
Technology
Education
Response
Education & Awareness
• Myth or Reality
– User are the weakest link
– Users hate security training
• My PHILosophy
– Educate without users knowing
– Less “HIPAA” – Rules & Regulations w/o Relationships Result in Rebellion
– It’s not business it’s personal
– Start with Why
Education & Awareness Outcomes
Phishing incidents down 70%
Email & File Encryption up 50%
Technology
• Provisioning & De-Provisioning
– Role based access
– Quickly and accurately provision/de-provision,
– Variety of users — staff/students/vendors/etc.
• Delivery of Services
– Printing – quickly print to the right device in the right location,
without human intervention (printer mapping)
– Faster VDI loading due to not loading unneeded drivers
• Security
– AV and Firewalls are 8th grade level
– White Listing applications and files types (exe, zip, etc.)
Technology Outcomes
Printer related incidents down from 65% to 5%
Onboarding went from 3-4 months to less than 10 minutes
Off-Boarding dropped 6month to instantaneous
Response
• Assume you are already breached
– Where’s Waldo / Capture the Flag
• Monitoring and detection
– CSIRT team
– “Grow a Geek”
• Planning
– Written and tested plan
• Cat 1-7
• Go-Dark
Response Outcomes
CSIRT incidents from ~5mo Cat4 to ~20 Cat1-6
Risks identified = 25 HIGH
STEPS — Savings
Security breaches
Security Breaches take
are expensive
time to clean up
Ponemon Institute
We found that it took one of
survey* found average
our customers 3-4 days to
cost of a healthcare
clean up an executed
security breach is $3.8
malware virus that came in
million
through email
•
•
Est. savings for cleanup of basic infections $28k per year
Est. saving of onboarding and off boarding users was $187k per year
*http://www.nbcnews.com/tech/security/ponemon-institute-n364871
Poll — Security Question #1
Security breaches can occur through:
A. Viral attacks
B. Malware attacks
C. Phishing
D. All of the above
Poll — Security Question #1
Security breaches can occur through:
A. Viral attacks
B. Malware attacks
C. Phishing
D. All of the above
Poll — Security Question #2
The responsibility of preventing security breaches fall to:
A. Chief Security Officer
B. IT Staff
C. End Users
D. All of the above
Poll — Security Question #2
The responsibility of preventing security breaches fall to:
A. Chief Security Officer
B. IT Staff
C. End Users
D. All of the above
Poll — Security Question #3
True/False:
• You can fully prevent a security breach with the right technology,
programs, education and training on security.
Poll — Security Question #3
True/False:
• You can fully prevent a security breach with the right technology,
programs, education and training on security.
• Correct answer is: False.
While we would love to say this is true, the rate at which virus and
malware are being created (in the last 2 years it has doubled!), it is not a
matter of “if” but “when”. You can significantly reduce the possibility of a
breach by adding extra layers of security and by training and educating
your staff, and you can prepare and reduce impact by having a plan for
when it happens.
Thank You & Questions
Ellen M. Derrico
Phil Alexander
[email protected]
[email protected]
+1 484 787 8370
+1 806 775 9099
Twitter handle: @ellenmd1
twitter.com/PhilDAlexander
linkedin.com/in/ellenderrico
linkedin.com/in/philalexander1