pelican hill. steve rhorer western region president konica minolta business solutions steve rhorer...

34
Pelican Hill Welcome

Upload: reynard-gilmore

Post on 15-Jan-2016

228 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Pelican H

ill

Welcome

Page 2: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Pelican H

ill

WelcomeSteve Rhorer

Western Region President Konica Minolta Business

Solutions

#kmpelicanhillhttps://www.linkedin.com/company/km-healthare

Page 3: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Cyber Risk = Business RiskHIPAA, HITECH & More

Pelican H

ill

Page 4: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

About Your Presenter

Information Security & Compliance Expert• Consults extensively with technology firms, government

agencies and business associates• Created bizSHIELDtm – a Signature Methodology - to

address compliance & information security priorities• Featured speaker at InfoSec conferences worldwide• Presented at Microsoft, Kaiser, Intuit, E&Y, Federal &

State Government agencies & many others• Established the HIPAA Academy & CSCS Programs –

gold standard for cyber security & compliance solutions• Interim CISO for large health system with 30+ locations

across the USA• Member InfraGard (FBI)• www.facebook.com/ecfirst & www.facebook.com/Pabrai.

Ali Pabrai MSEE, CISSP (ISSAP, ISSMP)

Page 5: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Agenda

● Cyber Risk = Business Risko Breaches: banks, retailers, healthcare

o Cyber attack lifecycle

● Compliance Mandateso HIPAA Privacy, Security

o HITECH Breach, Meaningful Use

o ISO 27000, PCI DSS, NIST & More

● Security Controlso Firewalls to Encryption

o Importance of Technical Vulnerability Assessments

● Your Enterprise Security Programo A Checklist

● December 31, 2015

Page 6: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

April 20, 2015

# Required ActivitiesSTATUS

Your Response?Yes No

1. 20% of IT professionals state that insufficient vetting of vendors (business associates) was a leading cause of breach of their company in 2014. ☐ ☐

 

2. 44% stated that malware was involved in a breach. ☐ ☐  

3. 24% stated that compromised passwords were involved in a breach. ☐ ☐  

4. 33% stated a breach of their company took more than a year to discover. ☐ ☐  

5. 37% stated that insufficient funding for security was a leading cause of a breach. ☐ ☐  

6. 54% of companies require third parties to comply with their privacy policies. ☐ ☐  

7. 55% of firms encrypt email messages. ☐ ☐  

8. 51% conduct security awareness training. ☐ ☐  

9. 55% use tools to detect unauthorized use or access to their systems. ☐ ☐  

10 55% stated their firm was unable to determine where a breach had occurred. ☐ ☐  

Page 7: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Risk to Business

$800,000Medical records left unattended and vulnerable

$1,215,000Previously leased copier with unencrypted Medical information

$1,725,000Unencrypted laptop computer stolen

$2,250,000PHI discovered in public dumpsters

$4,800,000EPHI accessible on internet search engines

Page 8: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Healthcare Cyber Attacks

IMPACTED

CHSBreach

4.5 M

Premera Breach

11 M

Anthem Breach

78.8 M

Page 9: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Other Cyber Attacks

IMPACTED

TargetBreach

40 M

Home DepotBreach

56 M

Chase Breach

83 M

Page 10: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Anthem’s Massive Data BreachAbout 80 M Customers & Employees Impacted

Bottom-line Facts:

● Attackers gained unauthorized access to Anthem’s database systems & obtained PII

● Suspicious activity was first noticed on Jan 27, 2015 and seemed to show unauthorized activity to the vast database since Dec 10, 2014

● Discovery of information includes IP addresses & email addresses believed to be associated with the threat actors

● Information compromised included PII on former & current employees (names, birthdays, medical IDs, SS #’s, street addresses, email addresses, employment data, including income data); not known if healthcare or financial data was stolen; records as far back as 2004 may have been compromised

● The database was not encrypted

● 9 days after breach reported, Anthem offered victims 2 years of free credit monitoring, ID theft insurance, & identity repair monitoring

● The good news, if there is one, is that Anthem discovered the breach itself & was quick in incident response

Page 11: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Anthem’s Massive Data Breach● How was the breach discovered? An Anthem IT System Administrator

noticed that a database query was being run using his identifier code although he had not initiated it

● The Anthem attack seems to have relied on malware & tools used by Chinese hackers

● The hackers used a stolen employee password to access the database

● What now? Passwords have been reset for all employees with privileged access to database systems

● Also, access has been blocked to any access that requires only one password to such sensitive systems

● Note: in 2013, Wellpoint (now called Anthem) settled with OCR for $1.7 M due to improper EPHI safeguards; unauthorized access was allowed through its online health insurance portal (testing was inadequate & not checked to see modifications performed as intended)

Page 12: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Learning from Cyber AttacksIran Cyber Attacks

● Used common SQL injection, spear phishing & other attacks to gain initial access

● Next, used privilege escalation exploits to compromise additional systems & move deeper inside the compromised firm

Sony

● Used highly sophisticated malware to carry out the attack

● Malware has commonalities with previous attacks in Saudi Arabia & South Korea

Chase

● Hackers compromised flaw in bank web-site

● Hackers reached deep into enterprise infrastructure

● Gigabytes of customer account & other data siphoned slowly

● Attack routed through several countries, including Brazil, & then re-directed to Russia

Page 13: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Learning from CHS BreachBottom-line Facts:

● On August 18, 2014 announced breach impacting 4.5 million patients

● Attacks occurred from April 2014 to June 2014

● Breach detected July 2014

● Attacker used HeartBleed to retrieve content of Juniper device memory

● Juniper device HeartBleed vulnerability exploited by attackers to gain access to valid user credentials

● User credentials used to login to CHS internal network via a VPN

How robust is your patch management?

Page 14: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Breach Costs$10 M Settlement, $10K Each Person

● The 2013 Target breach compromised credit/debit card information for 40 M customers

● Target estimated the data breach costs exceeded $252 M (The New York Times)

● Target may face additional fines and penalties from the FTC, SEC, and state attorney generals.

$10MSettlement

$10K eachPerson=

$25MSettlement

280K Impactedx

Page 15: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Cyber Attack Lifecycle

Page 16: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Compliance Mandates

Page 17: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Compliance Mandates

ISO 27000

PCI DSS NIST

CO

NFID

EN

TIA

LIT

Y

INTEG

RIT

Y

AV

AIL

AB

ILIT

Y

Page 18: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

ISO 27000 UpdatesISO 27002: 2005 ISO 27002: 2013

Security Policy Information Security Policies

Organizing Information Security Organization of Information Security

Asset Management Human Resource Security

Human Resources Security Asset Management

Physical & Environmental Security Access Control

Communications & Operations Management Cryptography

Access Control Physical & Environmental Security

Information Systems Acquisition, Development & Maintenance Operations Security

Information Security Incident Management Communications Security

Business Continuity Management System Acquisition, Development & Maintenance

Compliance Supplier Relationships

Information Security Incident Management

Information Security Aspects of Business Continuity Management

Compliance

Page 19: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Security Controls

“Cyber threat to our nation is one of the most serious economic and national security challenge we face.”President Obama

Page 20: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Compliance Meter

Page 21: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Security Controls TableKey Security Controls

Implemented Missing Firewall (Sonic Firewall TZ210) Two-factor authentication

IDS (Dell SecureWorks) DLP

Antivirus protection (Webroot) Secure text messaging

Data transfer (SFTP, HTTPS) USB & portable device encryption

Remote access (VPN, Citrix) MDM

Asset management (Dell KACE)  

Laptop encryption (TrueCrypt at the Bios Level; Windows OS & File Vault on Mac OS)

 

Email encryption (Voltage)  

Page 22: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Enterprise Security Program

Page 23: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

An Annual Checklist

Page 24: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Encryption!AREA

STATUS

YES NO

Database Servers ☐ ☐

PII/PHI on Cloud Systems ☐ ☐

Backup Media ☐ ☐

Desktops ☐ ☐

Laptops ☐ ☐

Tablets ☐ ☐

Smart Phones ☐ ☐

USB Devices ☐ ☐

Email ☐ ☐

Text Messages ☐ ☐

Remote Access ☐ ☐

Wireless ☐ ☐

Transmission ☐ ☐

Page 25: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Enterprise Security PlanSample Topics

Key Facts● Compliance Mandates to Meet

Priorities● Security Priorities in 2015● Compliance Priorities in 2015● Current Security Controls● Security Control Deficiencies● Security Control Priorities in 2015

Risk Analysis – Scope & Timeline● Vulnerability Assessment – Scope

& Timeline● Penetration Testing

Documentation● Security Policies – Summary● Privacy Policies – Summary● Security Procedures – Summary

Contingency Plan● Business Impact Analysis (BIA) in

2015● Disaster Recovery Plan (DRP)

Incident Response Plan● Breach Discovery & Reporting

Tools

Audit Controls● Log Automation & Consolidation

Tools

Page 26: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

December 31, 2015?

State of your enterprise security & compliance?

Cyber Risk = Business Risk

Page 27: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Questions?Are we excited?

Page 28: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

The HIPAA Portalwww.HIPAAAcademy.net/portal/

Page 29: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Cyber Security Portalwww.ecfirst.com/cyber

Page 30: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

ecfirstCompliance & Security

Over 2,100 clients served including Microsoft, Cerner, HP, State of Utah, PNC Bank, Kaiser & hundreds of hospitals, government agencies, business associates

Page 31: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

PhiladelphiaJune 2-3, 2015

San JoseAug 18-19, 2015

Las VegasDec 8-9, 2015

Page 32: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

PhiladelphiaJune 2-3, 2015

San JoseAug 18-19, 2015

Las VegasDec 8-9, 2015

Page 33: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Thank You!

[email protected] Cell: +1.949.528.5224

Page 34: Pelican Hill. Steve Rhorer Western Region President Konica Minolta Business Solutions Steve Rhorer Western Region President Konica Minolta Business Solutions

Lunch

#kmpelicanhillhttps://www.linkedin.com/company/km-healthare