Auditing Security: Lessons Learned From Healthcare Security Breaches



Similar documents
OCR UPDATE Breach Notification Rule & Business Associates (BA)

Am I a Business Associate? Do I want to be a Business Associate? What are my obligations?

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Logging and Auditing in a Healthcare Environment

Interpreting the HIPAA Audit Protocol for Health Lawyers

OCR Reports on the Enforcement. Learning Objectives 4/1/2013. HIPAA Compliance/Enforcement (As of December 31, 2012) HCCA Compliance Institute

OCR Reports on the Enforcement. Learning Objectives

What s New with HIPAA? Policy and Enforcement Update

Disclaimer 8/8/2014. Current Developments in Privacy and Security Rule Enforcement

The Challenges of Applying HIPAA to the Cloud. Adam Greene, Partner Davis Wright Tremaine LLP

Overview of the HIPAA Security Rule

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Cyber Security An Exercise in Predicting the Future

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Security Controls What Works. Southside Virginia Community College: Security Awareness

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

Privacy & Security. Risk Management Strategies for Healthcare Data. Ohio Hospital Association Centennial Annual Meeting.

HIPAA and HITECH Compliance for Cloud Applications

Nine Network Considerations in the New HIPAA Landscape

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

HIPAA Security Alert

HIPAA Security & Compliance

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

The HIPAA Audit Program

CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

HIPAA Compliance Evaluation Report

CA Technologies Healthcare security solutions:

HIPAA Compliance Review Analysis and Summary of Results

How To Find Out What People Think About Hipaa Compliance

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

FACT SHEET: Ransomware and HIPAA

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Security Compliance, Vendor Questions, a Word on Encryption

6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013

Security Considerations for the Cloud

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

HIPAA Requirements and Mobile Apps

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

AHLA. B. HIPAA Compliance Audits. Marti Arvin Chief Compliance Officer UCLA Health System and David Geffen School of Medicine Los Angeles, CA

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

Managing data security and privacy risk of third-party vendors

Analysis One Code Desc. Transaction Amount. Fiscal Period

Security Is Everyone s Concern:

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Preemptive security solutions for healthcare

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

10 Smart Ideas for. Keeping Data Safe. From Hackers

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Business Continuity in Healthcare

Law Firm Cyber Security & Compliance Risks

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

Transcription:

Auditing Security: Lessons Learned From Healthcare Security Breaches Adam H. Greene, J.D., M.P.H. Davis Wright Tremaine LLP Washington, D.C. Michael Mac McMillan CynergisTek, Inc. Austin, Texas DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of HIMSS.

Conflict of Interest Disclosure Adam H. Greene, JD, MPH & Michael Mac McMillan Have no real or apparent conflicts of interest to report. 2012 HIMSS 2

Learning Objectives Discuss the most prevalent data security risks facing healthcare today Identify lessons learned from 2010 security breaches Identify best practices and practical strategies for privacy and security management 3

Threats to Healthcare Data Healthcare entities have data of considerable value Increased automation and sharing have increased and introduced new risks Healthcare now has a place at Hacker conferences like DefCon and Black Hat Patient Safety, not privacy, is the new driver in healthcare data security 4

Threats by Industry 2011 Symantec 2011 Annual Threat Report 5

Outlook for 2012 Data breaches rose by 32% in 2011 Widespread use of mobile devices adds risk Despite regulations to the contrary, unauthorized access to patient information is still not a priority Negative productivity effects and financial consequences increase directly with an increase in number of incidents Number of cases of medical identity theft increased as number of incidents increased Ponemon Institute 2011 6

Overview of Breach Reports 380 large breaches reported between Sept. 2009 and Oct. 2011 Over 30,000 plus small breaches reported in same period Over 18 million individuals affected 7

Lesson 1: You should be less concerned with: And more concerned with:

Unknown 6 2% Improper Disposal, 20, 5% Hacking/IT Incident 26 7% Other 1 0% Cause of Breach (Count) Sept. 2009 to Dec. 2011 Theft, 196, 52% Loss, 55, 14% Unauthorized Access/Disclosure, 75, 20% 9

Cause of Breach (Affected Individuals ) Sept. 2009 to Dec. 2011 Improper Disposal 149,398 1% Other 344,579 2% Hacking/IT Incident 750,195 4% Unauthorized Access/Disclosure, 857,939, 5% Unknown, 1,911,160, 11% Loss, 7,291,355, 40% Theft, 6,755,205, 37% 10

Lesson 2: The highest number of breaches involve: a) Desktops b) Laptops c) Other portable devices d) Paper 11

Electronic Medical Record 7 2% Backup Tapes 2 1% CDs Hard 2 Drives 0% 3 1% E-mail 7 2% Other 21 6% Location of Breach (Count) Sept. 2009 to Dec. 2011 Paper, 100, 26% Network Server 39 10% Computer, 55, 14% Laptop, 84, 22% Other Portable Electronic Device 59 16% 12

E-mail, 9,318, 0% Backup Tapes, 12,562, 0% Paper, 601,993, 3% Other Portable Electronic Device, 962,505, 5 % Electronic Medical Record, 1,145,285, 6% CDs, 7,172, 0% Hard Drives, 1,200,654, 7% Computer, 1,310,6 81, 7% Network Server, 1,525,025, 9% Location of Breach (Individuals Affected) Sept. 2009 to Dec. 2011 Other, 9,523,110, 53% Laptop, 1,761,526, 10% 13

Lesson 3: It isn t me, it s you Many large breaches are caused by business associates, not covered entities 14

Involvement of Business Associates in Breaches (Count) Sept. 2009 to Dec. 2011 Business Associates, 83, 22% Covered Entities, 298, 78% 15

Involvement of Business Associates in Breaches (Affected Individuals) Sept. 2009 to Dec. 2011 Covered Entities, 6,843,35 2, 38% Business Associates, 11,21 6,479, 62% 16

Lesson 4: The number of breach reports remains relatively steady 17

30 Number of Breach Reports Sept. 2009 to Sept. 2011 25 20 15 10 5 0 Sept 09 Oct 09 Nov 09 Dec 09 Jan 10 Feb 10 Mar 10 Apr 10 May 10 June 10 July 10 Aug 10 Sept 10 Oct 10 Nov 10 Dec 10 Jan 11 Feb 11 Mar 11 Apr 11 May 11 June 11 July 11 Aug 11 Sept 11 18

Lesson 5: Breaches have consequences 19

Boston Globe, www.boston.com 20

The Mercury News, www.mercurynews.com 21

HC Pro HIPAA Update, blogs.hcpro.com 22

So began a nightmare that cost Mr. Tripathi s small nonprofit health consultancy nearly $300,000 in legal, private investigation, credit monitoring and media consultancy fees. Not to mention 600 hours dealing with the fallout and the intangible cost of repairing the reputational damage that followed. Nicole Perlroth, Digital Data on Patients Raises Risk of Breaches, N.Y. Times, Dec. 18, 2011 (relating to a stolen laptop containing unencrypted records of about 13,687 patients). 23

2010 Annual Study: U.S. Cost of a Data Breach (Ponemon Institute) For the fifth year in a row, data breach costs continued to rise The average organizational cost of a data breach increased to $7.2 million Data breaches in 2010 cost their companies an average of $214 per compromised record 24

Five priorities For Improving Readiness Conduct thorough risk assessment/use third party for objectivity/due diligence Adopt industry recognized information security model for measurement Resource and train IT security personnel/organization for success Implement robust system and user activity monitoring Implement appropriate vender security 25

Risk Analysis Implement regular risk analysis of the IT environment Assess against all reasonable threats/regulatory requirements Use third party support to ensure objectivity and due diligence Follow a doctrinal approach to risk analysis Develop detailed remediation roadmap/project plan to guide decisions 26

Everyone Wants To Be Headliner! Since 2009 we have had nearly 350+ major breaches, almost one a day in October 2011, an average of 18 major breaches a month, nearly 50K of all sizes in total, more than 18 Million individual records put at risk 60% Encrypt mobile devices 50% encrypt back up tapes 45% encrypt media 39% encrypt desktops 35% encrypt servers/databases HealthcareInfoSecurity.com 2011 27

Information Security Models Privacy and security requirements in healthcare are complex and evolving HIPAA/HITECH/Meaningful Use are not information security frameworks Models such as NIST, ISO, HITRUST, COBIT etc. provide an IT security governance framework for multiple requirements Ensures recognized framework to measure assurance against and demonstrate compliance Reduces the risk of breach by reducing the chance of gaps 28

What Are We Waiting For? HIPAA was passed in 2003, with an effective date of April 2005, roughly seven (7) years ago. Asked how respondents would grade their organization s ability to comply with HIPAA/HITECH today? Roughly 40% said their organization was doing a good job 30% said they viewed their organization s effort as adequate 30% said their organization was failing or needed improvement HealthcareInfoSecurity.com 2011 29

Resource & Train Resource means: budget, tools and people Understand what is reasonable, inhouse versus external support Overwhelming majority of breaches involve mistakes by people Provide tailored training to all workforce members, periodic reminders for everyone 30

Resourcing Still lags For three years straight (2008-2010) the HIMSS Analytics annual security survey reported that healthcare spending on security lagged behind industry averages The average spend on security for regulated industries is generally accepted as greater than 6% of the IT budget This survey unfortunately told a similar story for the fourth straight year: Nearly 70% reported allocating 3% or less of the IT budget on security HealthcareInfoSecurity.com 2011 31

Monitoring Activity Recognize different levels of criticality for monitoring: user, system, network, elevated privilege, etc. Recognize scope of the problem and requirements to do effectively Consider factors for decisions: staff capability, separation of duties, systems/data requirements, regulatory requirements Move from being reactive to being proactive 32

What We REALLY Don t Know! Managing and tracking access to sensitive data is fundamental to every information security standard. The average healthcare entity has thousands of systems, applications and users all creating millions of audit logs More than 70% are still relying on manual audits and the audit functions within applications to accomplish this critical task Those using audit tools report seeing a 90% drop in work effort, an exponential increase in awareness, and a equal decrease in events HealthcareInfoSecurity.com 201133

Vendor Security Start with both legal and security review during selection processes Incorporate appropriate level of security requirements in contracts Request/conduct third party review of all venders having direct access/retaining ephi Detail your expectations for data security and privacy to vendors Have well defined incident response plans and agreements with vendors 34

Don t Assume! A large % of breach activity has been attributed to Business Associates. When asked about Business Associates two glaring facts told the whole story. 82% ranked respondents confidence in their Business Associates and their subcontractors security controls at a 3 or below on a scale of 1 5, 5 being most confident Yet 77% relied on their Business Associate Agreement alone to compel appropriate performance with no due diligence HealthcareInfoSecurity.com 201135

For more information Adam H. Greene, JD, MPH adamgreene@dwt.com 202.973.4213 Michael Mac McMillan mac.mcmillan@cynergistek.com 512.402.8555 36

Questions 37