SOCIAL MEDIA: LEVERAGING VALUE WHILE MITIGATING RISK



Similar documents
Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Adversary ROI: Why Spend $40B Developing It, When You Can Steal It for $1M?

ONLINE RECONNAISSANCE

NSW Government. Social Media Policy and Guidelines

Top 10 Tips to Keep Your Small Business Safe

Social Media Marketing for Local Businesses

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

smart. uncommon. ideas.

Your step-by-step guide to getting your business online

SOCIAL MEDIA SECURITY MITIGATIONS

Social Media Management

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Big Data, Big Risk, Big Rewards. Hussein Syed

Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction

Keeping a Finger on the Pulse of Social Media in Healthcare: Understanding Evolving Roles and Risks

How to Use Social Media to Enhance Your Web Presence USING SOCIAL MEDIA FOR BUSINESS.

5 Point Social Media Action Plan.

Navigating the Web: Are You Missing The Boat?

experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation

Content Security: Protect Your Network with Five Must-Haves

OPSEC and Safe Social Networking

Your guide to using new media

Italy. EY s Global Information Security Survey 2013

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

10 Social Media Tips for Your Dental Practice

SAMPLE DOCUMENT Social Media Policy

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through trust

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Social Media and how Parks can benefit from it

Policy for Social Media Usage in Catawba County

GUIDE TO KEEPING YOUR SOCIAL MEDIA ACCOUNTS SECURE

Social Media for Business and Professional Use. An Introduction to Queens Library s Presence on Today s Most Popular Online Communities

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

CORE Security and GLBA

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

WHITE PAPER Social Media in Government. 5 Key Considerations

to get more customers online

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

Defending Against Data Beaches: Internal Controls for Cybersecurity

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

Data Breach Response Planning: Laying the Right Foundation

Social Media Guidelines

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

The Social Media and Communication Manager will implement the. Company s Social Media Strategy, develop brand awareness, generate

Conferences Going Mobile: 2012 Trends

Technical Testing. Network Testing DATA SHEET

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Add Social Media to Your Event Strategy

The Social Media Guide For Small Businesses

Essential Communication Methods for Today s Public Social Media 101. Presented by Tom D. Trimble, CIO Tulsa County Government

NYC Department of Education Social Media Guidelines

GUIDE Social Media Strategy Guide. How to build your strategy from start to finish

SOCIAL MEDIA POLICY. Introduction

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Whitepaper. 10 ways to integrate marketing and social media

Cyber R &D Research Roundtable

Social Media Guidelines

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

The Public Sector Guide to Social Media Strategy and Policy

CEDIA WHITE PAPER. Inbound Marketing 2014 CEDIA

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

KEY STEPS FOLLOWING A DATA BREACH

Best Practices for Social Media

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Social media 101. Social Enterprise East of England: Boot Camp. 5 June 2014

How To Make Money From Social Media

Information Technology Security Review April 16, 2012

Social Media Marketing UCSB Extension

Fire Risk Assessment Network

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Transcription:

SOCIAL MEDIA: LEVERAGING VALUE WHILE MITIGATING RISK Safeguarding Health Information: Building Assurance through HIPAA Security NIST / HHS OCR 2013 David Etue VP, Corporate Development Strategy May 21, 2013 - Rights Reserved

About David Etue @djetue VP, Corporate Development Strategy at SafeNet Former Cyber Security Practice Lead [PRTM Management Consultants, now PwC] Former VP Products and Markets [Fidelis Security Systems] Former Manager, Information Security [General Electric Company] Industry: Faculty: The Institute for Applied Network Security (IANS) Certified Information Privacy Professional (CIPP/G) Certified CISO (C CISO) Cyber things that interest me: Adversary innovation Social media security Applying intelligence cycle / OODA loop in cyber Supply chain security

Small Print I am not an attorney and do not provide legal advice (and did not stay in a Holiday Inn Express last night ) Topics in this presentation may touch on legal issues, which you should discuss with counsel Opinions stated here are my own and not of my employer

4 Defining Social Media Key attributes Individually focused Creates and maintains linkages between users Fosters interaction All users can be publishers Typically web and/or mobile-based Challenges of defining social media HUNDREDS of sites meet above criteria Becoming embedded as a feature of other sites Technology available to create private social media sites

5 Key Sites to Understand If you understand the operations (and implications) of these sites, you ll be prepared to address most social media risks Site Facebook Twitter Google+ LinkedIn FourSquare Ning Pinterest YouTube Flickr Blogger Yammer Purpose Social utility Microblogging Social utility Professional networking Location-based services Platform for creating social sites Virtual pinboard Video sharing Image sharing Web logs, self publishing Enterprise collaboration for controlled communities

Why Social Media is Important Like it or not social networks have become part of the fabric of how we communicate and collaborate as a society Why? Shared experience of social media has changed the Web from informational to collaborative Enables faster information sharing and quicker feedback cycles across a much broader audience Drives value with new approaches to many critical enterprise functions: Identifying, communicating, and gathering feedback with customers Locating expertise Quick communications Collaborating with a community, small or large (e.g., wikis)

Real Social Impact Social Media Accounts for 18% of All Time Spent Online (Comscore, The State of Social Media, February 2012)

Negative Impact is Real Too History of Terminations & Firings Because of Employee Social Media

Security Risks from Social Media

Risk #1: Unauthorized Users Speaking on the Organization's Behalf Who speaks for your organization? OR

Risk #2: Inappropriate Posting of Sensitive Information

Risk #2: Inappropriate Posting of Sensitive Information and HIPAA The Obvious http://www.strategiesfornursemanagers.com/ ce_detail/272966.cfm The Not So Obvious I checked and John Travolta got his pilot license renewed today! 9 Celebrities You Didn t Know Were Pilots Shift Change Updates http://www.dmlp.org/threats/doe-vgreen#description Patient 1 Patient 2 http://www.aao.org/yo/newsletter/ 201201/article02.cfm

Risk #3: Enabling Social Engineering Our client list is confidential! Flickr Hampton Inn Atlanta- Georgia Tech- Downtown strategy for a major beverage company Robin Sage (or Thomas Ryan )

Risk #4: Malicious Code/Exploit Distribution Popular vector for malicious code distribution Leverages trust inherent in social model Password reuse makes accounts vulnerable URL shorteners make it even easier NSFW? http://bit.ly/oif3vf http://igiveyoumalware.com? Fraud? Phishing?

Mitigating Risks in Social Media

Unless You Are In One Of These Scifglobal.com Blocking Social Media Is Not Realistic

Why Blocking Social Media Is Not Realistic > http://www.flickr.com/photos/johanbrook/4292682794/ http://www.flickr.com/photos/kongharald/240840269/ 63% of US Smartphone Owners Access Social Networking at Least Once a Month From the Device (Comscore, The State of Social Media, February 2012)

Blocking Can Have Negative Consequences... Digital Natives NNSA staff are required to work in secure areas that prohibit the use of personal cell phones, e-mail, and social media, which is a disadvantage in attracting younger skilled candidates.

This Doesn t Mean Mitigation is Hopeless

You Don t Need a Social Media Policy... but your employee code of conduct should cover social media! Update computer-use policy to indicate whether it is acceptable to use social networking only for work or for work and personal activities Broader policy covering what activities an employee (or contractor) can do on behalf of the organization

Training!!! Your users will likely never be computer security experts, but you may be able to make them more advanced Opportunity to turn your users into sensors for your security program

Create Official Profiles for your leadership and brand on the major social media sites EVEN IF YOU AREN T GOING TO USE THEM!

Protect Official Accounts AP and The Onion compromises show vulnerability of accounts Many organizations use a social media management platform, which presents an addition to the attack surface Generally comes down to authentication and passwords Some social networks supporting Two Factor Authentication However, very few support a method to extend your internal authentication solutions And monitoring!

Monitor, Monitor, Monitor (and Train!) AMA Guidelines on use of Social Media and CIO Council Guidelines for Secure Use of Social Media by Federal Departments and Agencies a good start for designing a monitoring program Can be done in-house or paid for services understand the limitations of each Free: Google Alerts, social media management tools Paid: Open Source / Social Media Monitoring Use to adjust the content of training programs and training timing

Technical Solutions Just because complete blocking isn t likely acceptable, doesn t mean that technology isn t useful Possible approaches: Outbound monitoring/filtering Web filter, DLP, next-gen firewalls, AV? Potential to monitor user, application, content, context Open source monitoring / intelligence Your marketing department may already be buying this! Red teaming / penetration testing Need to cover both social and technical attacks!

Some Positive Examples Mayo Clinic s stated mission: "lead the social media revolution in healthcare, contributing to health and well being for people everywhere." https://www.facebook.com/mayoclinic http://youtube.com/mayoclinic https://twitter.com/mayoclinic #SocialAtMayo (including social media guidelines) Live tweeting of procedures/care WITH PATIENT PERMISSION Philanthropy / fundraising Doctors seeing pictures in social media and recommending seeing a doctor based on symptoms

THANK YOU! Contact Info: David Etue @djetue profile.david.etue.net