Cyber Security Trends in Healthcare: Threats, Regulations & Best Practices



Similar documents
FACT SHEET: Ransomware and HIPAA

UNDERSTANDING THE HIPAA/HITECH BREACH NOTIFICATION RULE 2/25/14

POLICY AND PROCEDURE MANUAL

Reducing Cyber Risk in Your Organization

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

RETHINKING CYBER SECURITY Changing the Business Conversation

Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

Cybersecurity: Protecting Your Business. March 11, 2015

I ve been breached! Now what?

Top Ten Technology Risks Facing Colleges and Universities

Information Security for the Rest of Us

Middle Class Economics: Cybersecurity Updated August 7, 2015

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Big Data, Big Risk, Big Rewards. Hussein Syed

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Defending Against Data Beaches: Internal Controls for Cybersecurity

Breach Notification Decision Process 1/1/2014

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Preemptive security solutions for healthcare

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Bridging the HIPAA/HITECH Compliance Gap

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

2016 OCR AUDIT E-BOOK

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Cyber Security Management

10 Smart Ideas for. Keeping Data Safe. From Hackers

Information Security Services

NATIONAL CYBER SECURITY AWARENESS MONTH

Data Breach and Cybersecurity: What Happens If You or Your Vendor Is Hacked

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Perspectives on Cybersecurity in Healthcare June 2015

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Nine Network Considerations in the New HIPAA Landscape

University of Pittsburgh Security Assessment Questionnaire (v1.5)

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Data Breach Response Planning: Laying the Right Foundation

COMPLIANCE ALERT 10-12

An Independent Member of Baker Tilly International

NCHICA HITECH Act Breach Notification Risk Assessment Tool. Prepared by the NCHICA Privacy, Security & Legal Officials Workgroup

CYBERSECURITY INVESTIGATIONS

Iowa Health Information Network (IHIN) Security Incident Response Plan

Sophistication of attacks will keep improving, especially APT and zero-day exploits

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

State of Security Survey GLOBAL FINDINGS

Overview. Figure 1 - Penetration testing screenshot examples showing (i) PACS image and (ii) breached Electronic Health Record system

Incident Response. Six Best Practices for Managing Cyber Breaches.

The Protection Mission a constant endeavor

OCIE Technology Controls Program

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Connected Threat Defense Strategy. Eva Chen, Co-Founder and CEO

Attachment A. Identification of Risks/Cybersecurity Governance

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Healthcare in the Crosshairs for Data Breaches. April 22, Deborah Hiser (512)

Cybersecurity: What CFO s Need to Know

Adopting a Cybersecurity Framework for Governance and Risk Management

Altius IT Policy Collection Compliance and Standards Matrix

Who s Doing the Hacking?

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Presented by Evan Sylvester, CISSP

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Logging and Auditing in a Healthcare Environment

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

OCIE CYBERSECURITY INITIATIVE

Transcription:

Cyber Security Trends in Healthcare: Threats, Regulations & Best Practices Sponsored by 1915 N. Fine Ave #104 Fresno CA 93720-1565 Phone: (559) 251-5038 Fax: (559) 251-5836 www.californiahia.org Program Handouts Tuesday, June 7 General Session 8:20 am - 9:10 am 2016 CHIA Convention & Exhibit Speaker Mac McMillan, FHIMSS, CISM California Health Information Association, AHIMA Affiliate

California Health Information Association California Health Information Association Cyber Security Trends in Healthcare: Threats, Regulations & Best Practices Mac McMillan CEO CynergisTek mac.mcmillan@cynergistek.com Objectives Identify the most pressing cybersecurity concerns and trends that healthcare provider organizations face today Describe strategies for mitigating risk associated with cyber threats Review proven strategies for creating cyber risk awareness and incorporating the proper protocol to ensure it is a part of an organization s culture California Health Information Association, AHIMA Affiliate 1

CynergisTek, Inc. Founded in 2004 CynergisTek has been providing services to our clients since 2004, but many of our clients have been with one or both of the founders since well before the company was founded. Consulting Services CynergisTek provides consulting services and solutions around information security, privacy, IT architecture, and audit with specific focus on regulatory compliance in healthcare. Synergistic The name CynergisTek came from the synergy realized by combining the expertise of the two co founders building scalable, mature information security programs and architecting enterprise technical solutions. Securing the Mission of Care CynergisTek Services are specifically geared to address the needs of the healthcare community including providers, payers, and their business associates who provide services into those entities. Today s Presenter Co founder & CEO CynergisTek, Inc. Chair, HIMSS P&S Policy Task Force CHIME, AEHIS Advisory Board Healthcare Most Wired Advisory Board HCPro Editorial Advisory Board HealthInfoSecurity.com Editorial Advisory Board Top 10 Influencers in Health IT 2013 Top 50 Leaders in Health IT 2015 Director of Security, DoD Excellence in Government Fellow Mac McMillan FHIMSS, CISM CEO, CynergisTek, Inc. US Marine Intelligence Officer, Retired California Health Information Association, AHIMA Affiliate 2

Today s Topic Agenda The Changing Nature of Threat How To Respond Questions California Health Information Association, AHIMA Affiliate 3

Why Information Security is Challenging in Healthcare The prime directive. First priority is taking care of patients, and we need quick and easy access to information to do that. Innovation. A never ending stream of new IT products and services are promising to improve the delivery of care. Complexity. Hundreds to thousands of applications must work together seamlessly, but also must be secured. Costs. Healthcare organizations are under pressure to reduce costs, making more spending to address security a tough sell. Convergence. Healthcare aggregates all forms of sensitive information; PHI, PII, PCI, etc. Why Healthcare Workers Should Care About Information Security Protecting the personal data that we are entrusted with is the right thing to do, and in fact it s even part of the Hippocratic Oath! I will respect the privacy of my patients, for their problems are not disclosed to me that the world may know. It s the law. In fact, there are multiple laws that affect healthcare organizations: HIPAA, HITECH, Meaningful Use, FISMA, FERPA, State Laws etc But Most Important: Information security risks are now undermining healthcare s intellectual property, brand, and mission, and threatening patient care and safety in the process. California Health Information Association, AHIMA Affiliate 4

Cybersecurity Risk Strategic Goals of the Organization Operational Processes that Achieve Goals Financial Safeguarding Assets Compliance Laws and Regulations Reputational Public Image The Threat Changes California Health Information Association, AHIMA Affiliate 5

Evolving Healthcare Threat Landscape From lost/stolen devices to hacking BCBS Tennessee 1.02M Stolen Hard Drives NYC Health & Hospitals 1.7M Stolen Backup Tapes TRICARE 4.9M Lost Backups Utah Dept. of Health 780K Advocate Medical 4.03M Computer Theft Community Health 4.5M Boston Children Hacktivism Anonymous Beacon Health 225K Premera BCBS 11M CareFirst 1.1M Haley VA 5 Days 2009 2011 2012 2013* 2014 2015* 2016* HPMC 10 Days AvMed 1.2M Stolen Laptops *Multiple Sources Health Net 1.9M Lost Hard Drives Nemours 1.6M Lost Backups Emory 315K Lost Backups Horizon BCBS 840K Laptop Theft Anthem BCBS 80M Montana Public Health 1.3M UCLA 4.5M Westchester Health Hacked Pro ISIS Group Titus Regional 6 Days Hurley 6 Days The Many Faces of Threat *Source: Understanding Cyber Attackers and their Motives. FireEye. California Health Information Association, AHIMA Affiliate 6

The Evolution of Attacks Source: Mandiant M Trends 2015: A View from the Front Lines. Cybercrime as a Business Trends in cybercrime all make cyber criminals more effective Cybercrime as a service model* gives less technicallysavvy criminals access Dark web marketplaces make monetizing stolen data as easy as buying on Amazon Cybercriminals are adopting tactics previously only used by nation state attackers *Source: Cybercrime 2015. An Inside Look at the Changing Threat Landscape. RSA, 2015. California Health Information Association, AHIMA Affiliate 7

Black Market Value of Stolen Data $60 $50 (Per record) $40 $30 $20 $10 $0 Credit Card SSN Email Account Medical Record Sources: http://histalkmobile.com/2014 a perfect storm for data breaches/ http://krebsonsecurity.com/2013/06/the value of a hacked email account/ Dark Web Marketplace A Bitcoin wallet, PGP for encrypted communication, and a TOR browser and you are in business California Health Information Association, AHIMA Affiliate 8

Cyber Extortion is Rampant First appeared around 2005 Two forms: Crypto ransomware (data) and Locker ransomware (system) Sophisticated attacks use: New asymmetric keys for each infection Industrial strength & private/public key encryption Privacy enabling services like TOR and bitcoins for payments Indifferent to target, everyone is a target (home/business) Malvertising, spam email, downloaders/botnets & social engineering The United States is the largest target worldwide by a huge margin. SOCs worldwide report as much as a 10X increase in ransomware attacks from December to January with no abatement. Cyber Espionage is Growing Cyber espionage is being carried out by nation state actors for political purposes Large breaches such as Anthem, Premera, Community Health Systems, UCLA are suspected cases of espionage A case example is the OPM intrusion presumed by a Chinese group that captured security clearance documents But they are also targeting industrial control systems that control and manage critical infrastructure California Health Information Association, AHIMA Affiliate 9

Hacktivism Attacking for a cause Anonymous hacked Boston Children s in 2014 over a child parental rights case GhostShell attacked several U.S. universities in 2015 leaking sensitive information Anonymous hacked Hurley Medical Center in 2016 over the Flint, Michigan, water issue Pro ISIS groups have hacked hospital websites Targeted (APT) Attacks Typically nation state attack groups APTs are known for being highly sophisticated, using multiple vectors to attack a target network, and having unrelenting tenacity Many attacks go undetected for considerable periods of time, estimated 280 days on average Phishing, zero day attacks, ransomware have increased dramatically in 2016 There is widespread agreement that advanced attacks are bypassing our traditional signature based security controls and persisting undetected on our systems for extended periods of time. The threat is real. You are compromised; you just don t know it. Gartner Inc., 2012 * Source: Understanding Cyber Attackers and their Motives. FireEye, 2015. California Health Information Association, AHIMA Affiliate 10

What Are Vendors Doing With PHI? May 2014 There you are, I was tracking you. The taxi hailing commuter platform Uber had two breaches in 2014 that weren t reported until 2015, gaining the ire of the New York SAG. What they did: First they allowed internal users access to riders PII and displayed it through a tracking system called God View. Second they had a breach of their riders database that permitted a third party access to 50,000 riders PII on GitHub. The settlement requires Uber to employ encryption, better access controls and multi factor authentication. Health Systems are partnering with Uber to help patients not miss appointments. How Secure Are Vendor Solutions? December 2015 Juniper admits Netscreen firewalls have been vulnerable for 8+ years. Juniper continued to use compromised Duel_EC encryption even after NIST and others recommended discontinuance. Juniper added Dual_EC to its firmware in 2008. Investigators are trying to determine if this was random, but do not believe it was. Regardless Juniper did not move to fix until outed by researcher. California Health Information Association, AHIMA Affiliate 11

The Insider Threat 93% feel vulnerable to insider threats 59% worry about privileged users most Contractors/service providers next biggest concern 2010 2015 20% increase in ID/Med ID theft 37% feel user awareness training is failing Traditional audit methods are failing right and left Closing the Gap Security is the ceiling. Leadership are the walls that bring security and compliance together. Compliance is the floor. California Health Information Association, AHIMA Affiliate 12

How to Respond Knowledge: Anatomy of a Cyber Attack California Health Information Association, AHIMA Affiliate 13

Frameworks: A Common Taxonomy For Describing an organization s current cybersecurity posture Describing its target state for cybersecurity Identifying and prioritize areas of improvement Employing a repeatable process for review Continuously assessing its cybersecurity posture Communicating cybersecurity risks to both internal and external stakeholders Conducting regular measurements of control effectiveness Demonstrating compliance A Holistic Approach to Data Security Identify Protect Detect Respond Recover Inventory information assets and analyze their risks Use technical, administrative, and physical controls to mitigate the identified risks Monitor the environment for signs of intrusion Mobilize resources to contain and eradicate an intrusion Remediation the effects of an intrusion and return to normal operations Governance Reference: NIST Cybersecurity Framework California Health Information Association, AHIMA Affiliate 14

Adopt an Offensive Posture Educate and inform, ensure users know how to identify and avoid common threats Remain current, refresh, harden, patch and manage system configurations with diligence Employ layers, protections at the endpoint, network, file layers, etc. can make it more difficult for hackers Deploy complimentary controls, use both signature or rule based solutions with heuristic solutions Enhance detection, deploy NGFWs, malware filters, A/V filters, IDS/IPS, etc. Prioritize contingency planning, back up everything, offline as well, practice incident response Be ready, establish relationships, acquire tools Be objective, use independent third parties to perform readiness audits, tests and assessments The United States is the largest target worldwide by a huge margin when it comes to advanced persistent threats. Where Do We Start? Risk Assessment California Health Information Association, AHIMA Affiliate 15

Expect a Smart Defense 38% have had more than 90% five incidents. of healthcare organizations have experienced at least one data breach in the past two years. Incidents in most cases can be prevented by following well known policies, procedures, standards and best practices. Make Preparedness A Priority Preparedness for Addressing Data Breaches Well Prepared Somewhat Not Well Poorly Not At All 0% 10% 20% 30% 40% Data Breach Mitigation Budget ID Third Party Help Law Enforcement Notification (External) Determination of Breach ID PII/PHI ID w/access Processes for Managing Incidents Data Collection Notification (In-House) Assignment Validation Manage Response 0% 10% 20% 30% 40% 50% 60% 70% Data Breach/Cyber Insurance No 69% Yes 31% Sales 55% Sales 45% California Health Information Association, AHIMA Affiliate 16

Organization & Practice Are Critical Preparation Detection & Analysis Containment Eradication Remediation Post Incident Reporting Remove or reduce access Change all credentials Freeze changes Control access to physical and virtual backups Need current inventory Collect current system state of all assets for comparison Move collected data to secure location Collect reference masters for configurations If not create known best practice state Compare the known good with current state Isolate/remove compromised systems Revise configs Redeploy Save copies of current state, log data Inform Life is about timing. Carl Lewis So is breach mitigation Mac McMillan Discipline Yields Better Results Incident Occurred No notification required under HIPAA rules Do any state notification laws apply? No No Yes Yes Assure that there is no further unauthorized use or disclosure of the PHI Yes Yes No Yes Yes Go to state breach determination process Does the incident involve an acquisition, access, use or disclosure of protected health information (USE)? Yes Is the USE permitted under the HIPAA Privacy/Security Rule? No If USE was by a workforce member and USE was unintentional, was the USE made in good faith, acting on behalf of the CE, and will not result in further USE? Yes Was the USE an inadvertent disclosure by a workforce member to another workforce member at the same CE and will not result in further USE? No Does the CE have a good faith belief that the unauthorized individual would not reasonably be able to retain the information? No Is the PHI unusable, unreadable or indecipherable to the unauthorized individual? Risk Assessment Risk assessments must be thorough, completed in good faith, and conclusions must be reasonable 1 Nature and extent of PHI involved (includes limited data set), including the types of identifiers and the likelihood of re identification How many of the 16 unique identifiers are included in the PHI? Does the PHI include PII, financial data, credit card information, or other information that will increase the risk of identity theft or financial fraud? Does the PHI include clinical details, diagnosis, or treatment/medication information? Does the PHI include sensitive information such as mental health status, substance abuse, sexually transmitted diseases, or pregnancy information? What is the likelihood that the PHI could be re identified? What is the probability that the PHI could be used by an unauthorized individual in a manner adverse to the individual whose PHI was involved in the USE, or otherwise used to further the unauthorized individual s own interests? 2 Unauthorized individual who impermissibly used the PHI or to who the impermissible disclosure was made. Does the unauthorized individual have obligation to protect the privacy or security of the PHI? Does the unauthorized individual who received the PHI have the ability to reidentify it? What is the likelihood that the unauthorized individual will know the value of the information and either use the information or sell it to others? What are the technical capabilities and profile of the unauthorized individual? 3 Was the PHI actually acquired or viewed? If you were able to recover the disclosed PHI, can you reasonable determine that the information was not actually copied, used, viewed, or otherwise compromised? 4 Extent to which the risk of the PHI has been mitigated. Do you have sufficient, credible, and reasonable assurance that the PHI will not have any further USE or was securely destroyed? Determination is the incident compromises the security and privacy of the PHI Does the risk assessment and evidence strongly demonstrate that there is a low probability that the PHI has been compromised? Yes Notification required under HIPAA rules Go to HIPAA notification process No California Health Information Association, AHIMA Affiliate 17

Enlist ALL of Your Security Team Training & awareness at all levels: Workforce IT Staff IRM Members Executives Board New approaches that focus on interaction. Governance and Support Are Crucial Majority of boards report that they do not understand cyber threats Many executives report that they just expect it s covered Boards/execs are becoming more involved and interested in security They still want to know how it ties into the business California Health Information Association, AHIMA Affiliate 18

It s Time for a Paradigm Shift Healthcare must think and act differently when it comes to data security and privacy. What Can We Expect Social engineering attacks targeting people will continue to increase (phishing, water cooler, social media) as hackers first option IoT will provide basis for attacks on attached devices of all kinds Ransomware will continue to be successful in targeting healthcare Medical device and wearable hacks will surface soon Growth in cybercrime as a service make attacks viable for less sophisticated actors California Health Information Association, AHIMA Affiliate 19

Resources for Getting Started HealthIT.gov Guide to Privacy and Security of Electronic Information (v2.0, April 2015) http://www.healthit.gov/sites/default/files/pdf/privacy/privacy and security guide.pdf FTC start with security program https://www.ftc.gov/tips advice/business center/guidance/start security guide business Critical security controls project https://www.sans.org/critical security controls/ NIST Cybersecurity Framework http://www.nist.gov/cyberframework/ Poster series http://www.ncsc.gov/publications/pii/index.html Protecting your personal information awareness videos http://www.dni.gov/index.php/resources/protecting personal information Questions Questions? Mac McMillan mac.mcmillan@cynergistek.com 512.405.8555 @mmcmillan07 California Health Information Association, AHIMA Affiliate 20