Welcome. HITRUST 2014 Conference April 22, 2014 HITRUST. Health Information Trust Alliance



Similar documents
Defending Against Data Beaches: Internal Controls for Cybersecurity

Security and Privacy

Computer Security Incident Handling Detec6on and Analysis

Splunk and Big Data for Insider Threats

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Practical Steps To Securing Process Control Networks

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

Data Breach Response Planning: Laying the Right Foundation

Cyber Security Metrics Dashboards & Analytics

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Developing a robust cyber security governance framework 16 April 2015

Security Intelligence

IBM Security Strategy

Gregg Gerber. Strategic Engagement, Emerging Markets

10 Smart Ideas for. Keeping Data Safe. From Hackers

National Cyber Crime Unit

Security Analytics for Smart Grid

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Can We Become Resilient to Cyber Attacks?

The CERT Top 10 List for Winning the Battle Against Insider Threats

Advanced Persistent Threats

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

WRITTEN TESTIMONY OF

CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cyber Security. John Leek Chief Strategist

SECURITY 2.0 LUNCHEON

The FBI and the Internet

The Next Generation Security Operations Center

Hackers are here. Where are you?

2012 Data Breach Investigations Report

Advanced & Persistent Threat Analysis - I

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM Security Systems Trends and IBM Framework

Cybersecurity and internal audit. August 15, 2014

RSA Security Anatomy of an Attack Lessons learned

After the Attack. The Transformation of EMC Security Operations

APT Advanced Persistent Threat Time to rethink?

KEY STEPS FOLLOWING A DATA BREACH

SecurityMetrics Vision whitepaper

WCA WEBINAR SERIES: The Case for Cyber Security Training

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Into the cybersecurity breach

Agenda , Palo Alto Networks. Confidential and Proprietary.

Presented by Evan Sylvester, CISSP

Enterprise Cybersecurity: Building an Effective Defense

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

SPEAR PHISHING UNDERSTANDING THE THREAT

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Internet Safety and Security: Strategies for Building an Internet Safety Wall

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

integrating cutting-edge security technologies the case for SIEM & PAM

Supplier Vigilance: A Critical Layer of Defense

Certified Cyber Security Analyst VS-1160

The session is about to commence. Please switch your phone to silent!

Ed Ferrara, MSIA, CISSP Fox School of Business

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

North Texas ISSA CISO Roundtable

Cyber Risks and Insurance Solutions Malaysia, November 2013


LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Managed Security Services

CYBER SECURITY, A GROWING CIO PRIORITY

Developing Secure Software in the Age of Advanced Persistent Threats

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Breaking the Cyber Attack Lifecycle

September 20, 2013 Senior IT Examiner Gene Lilienthal

The Current State of Cyber Security

Cybersecurity and Privacy Hot Topics 2015

Perspectives on Cybersecurity in Healthcare June 2015

Transcription:

Welcome HITRUST 2014 Conference April 22, 2014 HITRUST Health Information Trust Alliance

The Evolving Information Security Organization Challenges and Successes Jason Taule, Chief Security and Privacy Officer, FEi Systems (Moderator) Robert Booker, Vice President and Chief Information Security Officer, UnitedHealth Group Erick Rudiak, Information Security Officer, Express Scripts Roy Mellinger, Vice President, IT Security and Chief Information Security Officer, WellPoint Omar Khawaja, Vice President and Chief Information Security Officer, Highmark HITRUST Health Information Trust Alliance

Chief Informa-on Security Office HITRUST 2014 Conference The Evolving Informa-on Security Organiza-on Challenges and Successes Tuesday April 22, 2014 Roy R. Mellinger, CISSP ISSAP, ISSMP, CIM Vice President, IT Security Chief Informa-on Security Officer

The Evolving Informa-on Security Organiza-on Operational Compliance Risk Enterprise Risk Management Security Viewed as a Business Enabler Preventing Fires Translating Business Needs into Security Requirements Translating Security Requirements into Technical Security Controls Operating Technical Security Controls Fighting Fires Security Threat Management IT Compliance IT Risk Enterprise Risk 17

The Evolving Informa-on Security Organiza-on CYBER THREAT MANAGEMENT v 24x7 Security Operations Center (SOC) v End to End DLP (Data Loss Prevention) Strategy v Tracking of Malware Threats and Coding Techniques v Effective Firewalls, IDS / IPS Strategy Implementations v Effective Security and Event Log Management & Monitoring v Robust Safeguarding Polices, Programs and Processes 18

The Evolving Informa-on Security Organiza-on Hacking Then Individual or Computer Clubs/ Groups Manual efforts with Social Engineering - Success = Badge Of Honor - Personal Monetary Gain or to pay for / fund hacking ac:vity War Protes:ng and Civil Disobedience An:- Establishment Rhetoric Social Rebels and Misfits Hacking Now Automated / Sophis:cated Malware Hac:vism Freedom of Speech, Statements to Influence Change, Sway Public Opinion and Publicize Views Criminal Drug Cartels, Domes:c and Foreign Organized Crime for Iden:ty TheM and Financial Fraud Espionage IP, Business Intelligence, Technology, Military / Poli:cal Secrets Terrorism Sabotage, Disrup:on and Destruc:on Na:on- State Intelligence Gathering, Disrup:ve Tac:cs, Clandes:ne Ops, Misinforma:on, Warfare Strategies, and Infrastructure Destruc:on FRINGE........... 30 YEARS....... MAINSTREAM 19

The Evolving Informa-on Security Organiza-on Ini-al compromise spear phishing via email, plan:ng malware on a target website or social engineering. Establish Foothold plant administra:ve somware and create back doors to allow for stealth access. Escalate Privileges use exploits and password cracking tools to gain privileges on vic:m computer and network. Internal Reconnaissance collect info on network and trust rela:onships. Move Laterally expand control to other worksta:ons and servers. Harvest data. Maintain Presence ensure con:nued control over access channels and creden:als acquired in previous steps. Complete Mission exfiltrate stolen data from vic:m's network. 20

The Evolving Informa-on Security Organiza-on Cyber Threat Management Conventional Approach Paradigm Shift: Cyber Threat Management Controls Coverage Protect ALL informa:on assets Protect your MOST IMPORTANT assets (Crown Jewels) based on risk assessments Controls Focus Preven:ve Controls (an:- virus, firewalls, intrusion preven:on, etc.) Detec:ve Controls (monitoring, behavioral logic, data analy:cs) Perspec-ve Perimeter Based Data Centric Goal of Logging Compliance Repor:ng Threat Detec:on Security Incident Management Piecemeal Find and neutralize malware or infected nodes BIG PICTURE Find and dissect aaack paaerns to understand threat Threat Management Collect informa:on on Malware Develop a deep understanding of aaackers targets and modus operandi related to YOUR org s network and informa:on assets Success Defined By: No aaackers get into the network Aaackers some:mes get in; BUT are detected as early as possible and impact is minimized 21

The Evolving Information Security Organization Challenges and Successes Omar Khawaja April 23, 2014

Who is Highmark? 23

Risk is increasing (Assets X Vulnerabilities X Threats) Our information is increasing in value More data (EMRs) More collaboration (ACOs) More regulation (FTC) Our weaknesses are increasing More suppliers (Cloud) More complexity (ACA) Opportunities to attack are increasing More access (consumer portals) More motivated attackers - Controls Becoming increasingly difficult to secure Multiple Compliance Requirements Evolving Compliance Requirements Unclear Compliance Requirements Less visibility Less control

Security org needs to evolve From Explaining the what To Explaining the "why" Growing the security org Growing security in the org Creating more security processes Making security part of more processes Telling them what to do Assisting them with their job Protecting everything equally Differentiated controls Measuring what matters to security org Reporting on what matters to audience

Questions?