Cyber Security for your Connected Health Device



Similar documents
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cybersecurity. Are you prepared?


Information Security and Risk Management

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Cybersecurity Awareness. Part 1

Overview TECHIS Carry out risk assessment and management activities

ISO27032 Guidelines for Cyber Security

GETTING STARTED WITH THE ISCAN ONLINE DATA BREACH PREVENTION LIFECYCLE

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Cybersecurity: What CFO s Need to Know

Cyber-Security. FAS Annual Conference September 12, 2014

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Stop advanced targeted attacks, identify high risk users and control Insider Threats

October 24, Mitigating Legal and Business Risks of Cyber Breaches

KEY STEPS FOLLOWING A DATA BREACH

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

Payment Card Industry Data Security Standard

Cyber Security. John Leek Chief Strategist

ALERT LOGIC FOR HIPAA COMPLIANCE

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Application Security in the Software Development Lifecycle

Network Security & Privacy Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Internet threats: steps to security for your small business

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

7 VITAL FACTS ABOUT HEALTHCARE BREACHES.

MEDICAL DEVICE Cybersecurity.

Cyber Security Management

Top Fraud Trends Facing Financial Institutions

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

Cisco Advanced Services for Network Security

Don t Fall Victim to Cybercrime:

Who s Doing the Hacking?

Create Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Into the cybersecurity breach

How To Secure Your Store Data With Fortinet

Cyber Security An Exercise in Predicting the Future

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

I N T E L L I G E N C E A S S E S S M E N T

White Paper: Are there Payment Threats Lurking in Your Hospital?

How To Protect Your Online Banking From Fraud

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

IBM Security Strategy

Prevent Malware attacks with F5 WebSafe and MobileSafe. Alfredo Vistola Security Solution Architect, EMEA

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Global Corporate IT Security Risks: 2013

Cyber Security Auditing for Credit Unions. ACUIA Fall Meeting October 7-9, 2015

Security Controls Implementation Plan

Countering Insider Threats Jeremy Ho

State of Security Survey GLOBAL FINDINGS

Nine Steps to Smart Security for Small Businesses

Cybersecurity Awareness for Executives

2015 TRUSTWAVE GLOBAL SECURITY REPORT

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Securing Cloud-Based

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Cyberprivacy and Cybersecurity for Health Data

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.

CGI Cyber Risk Advisory and Management Services for Insurers

Perspectives on Cybersecurity in Healthcare June 2015

Cyber attack on Twitter, 250,000 accounts hacked

Think STRENGTH. Think Chubb. Cyber Insurance. Andrew Taylor. Asia Pacific Zone Product Manager Chubb Pro PI, Media, Cyber

Collateral Effects of Cyberwar

Cyber Risks and Insurance Solutions Malaysia, November 2013

Extreme Networks Security Analytics G2 Vulnerability Manager

Transcription:

Cyber Security for your Connected Health Device

Agenda Cyber Security Emerging Threats Implications to Healthcare Healthcare Response

OpenSky s timeline Service Evolution Launch IT Optimization 2014 Geographic Expansion Merge with TUV Rheinland Launch Enterprise Mobility 2013 Launch Application Security 2012 Launch West Region Launch Vulnerability Assmt 2011 Launch South Central Region Launch Governance, Risk & Compliance 2010 Launch Southwest Region 2009 Launch Mid- Atlantic Region Formal Launch 1/2008 2008

GLOBAL ORIGINS & BACKGROUND 140 YRS OF INNOVATION

Key Drivers for Cyber Security in Healthcare... FDA issued cyber security warning in June 2013 to address the risks FDA published draft guideline on Cyber security for medical devices (June 2013) Device manufacturers have confirmed the FDA is asking for documentation related to cybersecurity (FDA guidelines) during the approval process (510k, PMA) Most hospitals now require device manufacturers to provide evidence that the devices they are buying are secure and not succeptable to cyber security risks Increasing publicity surrounding cyber security of medical devices Actual related risks and hazards exist... http://www.wired.com/2014/04/hospital-equipment-vulnerable/ 5

Cyber Security Emerging Threats

The Cyber Security Landscape Source: www.mandiant.com

Cyber Security by the numbers Source: Symantec Source: Symantec Twelve-Month Timeline of Data Breaches Source: Symantec Source: Symantec

Cyber Security Top Industry Targets $$$ is the Biggest motivator; Targets are changing; Medical PII is becoming more valuable than PCI data ($20 vs $2). Source: Mandiant M-Trends Beyond the Breach

Cybersecurity Attack Scenario Retail 1. Cybercriminals leveraged minor misconfigurations in the infrastructure to identify systems with direct access to the POS systems. 2. A domain controller, which provided authentication for corporate offices and retail stores, provided the vulnerable pivot point. 3. The card-harvesting malware deployed on each register searched the process memory of the POS application for magnetic stripe data stored in POS system Source: Mandiant M-Trends Beyond the Breach

Cybersecurity Attack Scenario Hospital 1. Cybercriminals create phishing email to lure unsuspecting user to click on link that points to malware. 2. Unsuspecting user receives phishing email and clicks on link. Medical Information Server Administration User Nurses Internet Lab Equipment 3. Infected Administration PC searches for other unpatched or vulnerable devices. Finding vulnerable application on lab equipment, attacks that equipment to gain access to the Medical Devices. Medical Devices Impatients

Cyber Security Implications to Healthcare

Internet of Things is here.

Top four medical device threats The security leaders interviewed listed among their top perceived threats to networked medical devices: Hacktivists wishing to cause service interruption. Thieves desiring to sell or monetize personal health information (PHI), Malicious groups or individuals seeking to cause harm to patients (possibly targeting VIP patients) Malware that evades existing antivirus engines and rules but is not specifically targeted at medical devices. Networked medical device cybersecurity and patient safety Source: Deloitte SANS Healthcare Cyber Security Report

Cyber Security Spending/ Costs

Cyber Security Malware by Vertical

Highest medical fraud by compromised organizations Legend: Dark states show highest population Orange circle shows the number of organizations compromised Locations and Types of Compromised Organizations Source: SANS Healthcare Cyber Security Report Note: states with most stringiest privacy laws were also the same states most affected.

Type of devices emitting malicious traffic Source: SANS Healthcare Cyber Security Report

Healthcare s response Cyber Security threats

Cyber Security Mitigation lifecycle Governance Risk Management Risk Identification

Risk Assessment Methodology Threat Agents Exposures Attacker Objectives Attacker Methods Controls Identify All possible threats, objectives, and methods Filter & Prioritize Highest risk threats, objectives, and methods Scan for Vulnerabilities Identify which vulnerabilities have controls. Those without controls are likely exposures

TÜV Rheinland helps reduce these cost MEDICAL Provide regulatory budget for global markets Device Scope OpenSky Risk Assessments and Secure Coding Product Market Annual Cost Design Product Development lifecycle TÜV Rheinland Core Business Market Certification Validation Provide data testing based on regulatory requirements

Thank-you! Jesus Laz Montano CSO & VP of Security Services OpenSky Corporation a TÜV Rheinland Company jmontano@openskycorp.com Rayshon L. Payne Medical Account Manager TÜV Rheinland rpayne@us.tuv.com