Adaptive Threat and Risk Framework for Securing IoT in Healthcare

Similar documents
How To Buy Nitro Security

IBM QRadar Security Intelligence April 2013

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

IoT & SCADA Cyber Security Services

I D C A N A L Y S T C O N N E C T I O N

Protect Your Connected Business Systems by Identifying and Analyzing Threats

Cisco Advanced Services for Network Security

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Update On Smart Grid Cyber Security

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Strategies for assessing cloud security

IBM Security IBM Corporation IBM Corporation

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Session 3: IT Infrastructure Security Track ThreatExchange Winning through collaboration. Tomas Sander HP Labs

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Managed Security Services The Power To Protect

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Breaking down silos of protection: An integrated approach to managing application security

Stay ahead of insiderthreats with predictive,intelligent security

Chief Security Strategist Symantec Public Sector

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Professional Services Overview

Extreme Networks Security Analytics G2 Vulnerability Manager

IBM Security QRadar Risk Manager

Strengthen security with intelligent identity and access management

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Evolution Of Cyber Threats & Defense Approaches

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Nine Network Considerations in the New HIPAA Landscape

Extreme Networks Security Analytics G2 Risk Manager

IBM Security X-Force Threat Intelligence

Cisco Security Intelligence Operations

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

1 Introduction Product Description Strengths and Challenges Copyright... 5

Enterprise Application Enablement for the Internet of Things

IBM Security QRadar Vulnerability Manager

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

IBM Security QRadar Risk Manager

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

A HELPING HAND TO PROTECT YOUR REPUTATION

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

The Importance of Cybersecurity Monitoring for Utilities

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

IBM Security Strategy

SANS Top 20 Critical Controls for Effective Cyber Defense

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

The State of Application Delivery in 2015

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Preemptive security solutions for healthcare

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

CyberArk Privileged Threat Analytics. Solution Brief

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

The Internet of Things (IoT) Opportunities and Risks

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

The Benefits of an Integrated Approach to Security in the Cloud

GoodData Corporation Security White Paper

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

QRadar SIEM 6.3 Datasheet

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Glasnost or Tyranny? You Can Have Secure and Open Networks!

How To Manage Security On A Networked Computer System

Introduction Jim Rowland, Senior System Architect and Project Manager Daly

Big Data, Big Risk, Big Rewards. Hussein Syed

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

THE BLUENOSE SECURITY FRAMEWORK

Managed Security Services for Data

2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist

Critical Controls for Cyber Security.

Bellevue University Cybersecurity Programs & Courses

Accenture and Oracle: Leading the IoT Revolution

Security Controls for the Autodesk 360 Managed Services

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

The Cyber Threat Profiler

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Protecting against cyber threats and security breaches

FIVE PRACTICAL STEPS

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

IBM Security Intrusion Prevention Solutions

Endpoint Threat Detection without the Pain

McAfee Security Architectures for the Public Sector

Transcription:

Adaptive Threat and Risk Framework for Securing IoT in Healthcare Building Elements for Next Generation Security Operations AT&T Security Solutions 2015 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo and other marks are trademarks of AT&T Intellectual Property.

Introductions Carisa Brockman Governance, Risk, and Compliance Practice Director; AT&T Security Consulting Over 16 years experience in information security Involved in HITRUST since inception Terry Hect Director and Chief Security Strategist, AT&T Security Solutions 2 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T

Agenda Growth of IoT Impact of IoT to the Healthcare Ecosystem Leading Practices for Securing IoT Healthcare Solutions 3 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T

People are mobile, workloads are moving to the cloud, and IoT is exploding AT&T Network Public Cloud Private Cloud 4 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change. Customer Premise Equipment/Data Center

Has IoT increased our exposure to cyber threats? IoT deployments are on the rise How many connected devices do you have in your organization? 50B Connected devices estimated to secure by 2020 1 458% Increase in IoT vulnerability scans on the internet 2 #1 Barrier to customer adoption of IoT is security concerns 3 90% Of businesses lack full confidence that their IoT devices are secure 4 14% Of companies have a formal audit process for connected devices 5 5 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T 1 Cisco, Inc. 2 AT&T Network Opera9ons Center 3 IDC, 2015 4 AT&T State of IoT Security Survey, 2015 5 AT&T State of IoT Security Survey, 2015

IoT Benefits and Threat Landscape in the Healthcare Ecosystem Benefits Allows physicians to efficiently monitor patient health Improves communication between physicians and patients Enables efficient and effective healthcare to patients Risks Lives are involved! IoT increases complexity in protecting ephi IoT-enabled devices were not built with Internet connectivity or the requisite security in mind Fundamentals of cybersecurity are not implemented and / or managed The IoT ecosystem has become a digital petri dish for hackers and other cybercriminals The IoT attack surface is magnified by scale, distribution, and the broad spectrum of IoT endpoints 6 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T

A strategic framework for securing the IoT in healthcare 7 AT&T Proprietary (Internal Use Only). Not for use or disclosure outside the AT&T companies except under written agreement.

Today s threat landscape requires a multi-layered approach to security Device layer Mobile, IoT, Office/Fixed Connectivity layer Securing the network Data & application layer Securing workloads/applications Threat management Detection & response 8 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T

IoT Security Control operational and service support costs with full management and support for your IoT environment Application Security Web Application Mobile Application Code Analysis Data Privacy Device Security End-point configuration Server configuration Gateway/Router configuration Penetration Testing IAM / Authentication & Access Control Network Security Segmentation / Isolation Architecture Analysis Defense in Depth Secure communications Cloud Security Service layer Data Residency & Protection WAN/Cloud Integration Segmentation Security Operations Threat / Anomaly Detection Incident Response Event Mon. / Tamper Detection Behavior Analysis 9

Fundamental practices and core security principles to keep potential risks in check IoT Healthcare Security: Critical Considerations 1. Adopt a risk-driven approach 2. Assess device security characteristics 3. Consider the entire healthcare ecosystem 4. Utilize existing security solutions 5. Automate security, where possible 10 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T

Adopt a Risk-Based Framework and Approach ü Consider your organization s legal and regulatory requirements and exposures ü Track your IoT solutions ü Assess the security vulnerabilities of each IoT element ü Map out worst-case scenarios ü Determine whether IoT devices and data can be isolated ü Gauge the value of the data from individual IoT devices 11 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T

Assess Device Security Characteristics ü Consider information security concerns and operational security threats ü Employ existing controls, such as data encryption, network monitors, firewalls, and other familiar tools ü Inventory medical devices ü Are they network enabled? ü Is security built in? Is an MDS2 form available? Basic requirements for secure connected devices ü Is security built in? ü Software/firmware update capability ü System reset ü No default password ü No ancillary services ü No backdoors ü Device support 12 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T

Consider the Entire Healthcare Ecosystem Cloud Security Analy1cs Connec1vity Devices Pla7orms Internet of Things 13 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T

Industry lines are blurring in IoT The future is integrated Connectivity Healthcare Transportation and Supply Chain Devices Vehicles Home Retail Analytics Energy Manufacturing Platforms 14 2015 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and other marks are trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change.

Combined Approach to IoT Sensors Devices Logistics Connectivity Wearables Global SIM Cargo and Containers Service Platforms Storage Tanks Vertical Solutions Horizontal Services M2X / Flow Meters Data Analytics Smart Grid Professional Services Equipment and Automation Probes Cloud Security 15 2015 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and other marks are trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change.

Transforming industries requires ecosystems and collaboration Industrial Internet Consortium To further development, adoption and widespread use of interconnected machines, intelligent analytics and people at work 2014 Founding Members AT&T Cisco IBM Now Intel 201 GE members More than 2X growth since 2014 IBM and AT&T collaborating on M2M solutions for cities, institutions and enterprises. GE and AT&T collaborating to build solutions to help maintain and remotely control industrial machines. 16 2015 AT&T Intellectual Property. All rights reserved. AT&T, Globe logo, Mobilizing Your World and other marks are trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks contained herein are the property of their respective owners. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change.

Use Existing Security Solutions AT&T security solutions help protect customer vulnerable points Customer Assets Prevent Detect & Respond Public Web Sites AT&T Cloud Web Security Service Customers Corporate Email Network Access Mobile Endpoints Cloud Applica5ons AT&T Secure Email Gateway AT&T VPN AT&T Premises- Based Firewall AT&T Network- Based Firewall Enterprise Mobility Management AT&T NetBond Response Consul5ng AT&T DDoS Defense AT&T DDoS Defense with Kona Site Defender Managed Trusted IP Services (MTIPS) AT&T Enhanced Cybersecurity Service All Assets Preven5on Consul5ng AT&T Security Event and Threat Analysis AT&T Threat Manager Advanced Log Management 17 2016 AT&T Intellectual Property. All rights reserved. AT&T, the Globe logo and all other AT&T marks are trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change.

Monitor & Automate Threat Detection & Analysis Threat Analysis Provides a broad view of the security in your network by efficiently correlating alerts from multiple devices and device types across the entire enterprise Leverages AT&T proprietary data and Insights and 3rd party feeds Distills billions of raw logs to a few cases Implementation support can be provided by AT&T consulting for asset identification and implementation verification 18 CARRIER NEUTRAL 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change.

Monitor & Automate Threat Analysis Network Discovery & Device analysis to identify applicable components 19 Output from multiple security devices normalized and correlated Device management agnostic; AT&T management or MSS services encouraged 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T Page 19 24x7x365 analyst support contact via telephone or email.

Monitor & Automate Threat Analysis Notification of prioritized events based on their risk to the company and the ability to mitigate them. 20 Recommended mitigation plan provided as part of AT&T determined critical and actionable alerts 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T Page 20 Custom weekly AT&T Threat Analysis Report identifying threats that may effect your business

Threat Analysis Innovative Approach to Alerting Actionable alerts are generated Suppression of duplicates and false positives Correlation of information from multiple sources Ongoing refinement of algorithms and thresholds Alerts are surrounded with contextual drilldown information English language alert names Linkage of alerts to Methods and Procedures Linkage of alerts to protocol and port information Automatic initiation of queries for supplemental details Flexible layered design for managing rule Engine performs short interval inspection and alarming Queries allow data mining over days, weeks and months 21 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T Page 21

22 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T