CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Measuring Cybercrime Pieter Hartel. How? Victim reporting initiatives »FBI Internet Criminal Complaint Centre Population and business surveys »CBS (Statistics.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Cyber X-Force-SMS alert system for threats.
Acorn.gov.au The ACORN REPORT. PROTECT. PREVENT. acorn.gov.au What is cybercrime? REPORT. PROTECT. PREVENT In Australia, the term 'cybercrime' is used.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Combating cyber-crime: the context Justice Canada March 2005.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
BY: BRENT MILLER. What is Computer Crime? Crime involving a computer and a network. A computer may be used or targeted. Divided into two categories: Crimes.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
FRAUD, ONE OF THE FASTEST GROWING SEGMENTS OF OUR INDUSTRY Joseph Bajic, Chief Compliance Officer and Vice-President, Compliance.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
Cyber Security Nevada Businesses Overview June, 2014.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Hurdles in implementation of cyber security in India.
Training on “Albanian and Italian experience in investigation and prosecution of Cybercrime” General Prosecutor Office, Tirana 10 June 2014 VQA Ivano GABRIELLI.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
INTRODUCTION & QUESTIONS.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cybercrimes and the laws to suppress such crimes in Oman: Success and Challenges Dr. Muhammad Masum Billah College of Law, Sultan Qaboos University.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
Financial Times Matheson is ranked in the FT’s top 10 European law firms Matheson has also been commended by the FT for corporate law,
Friday 22nd April 2016 DS Chris Greatorex SEROCU
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Issues for Computer Users, Electronic Devices, Computer and Safety.
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
crimes-report
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
MODUS OPERANDI OF CYBER CRIME
Securing Information Systems
Partnering to Minimize the Impact of Data Compromises
“CYBER SPACE” - THE UNDERGROUND ECONOMY
Andy Hall – Cyber & Tech INSURANCE Specialist
Cyber Security Challenges
The Crime and Deviance Channel
Types of Cybercrime Cyber crime is any kind of unlawful behaviour that involves the use of computers, either as a tool for committing a crime (such as.
Cybersecurity Simplified: Phishing
How International Law Enforcement Is Addressing Cyber Threats
Presentation transcript:

CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett Jones LLP, Michele Beals, Interim Joint VP Finance & CFO, William Osler Health System, Headwaters Health Care Centre,

Cybercrime – What is it? Criminal offences involving a computer as the object of the crime (i.e. hacking, phishing, and spamming); and Criminal offences involving a computer as the tool used to commit a material component of the offence (i.e. identity theft, intellectual property infringements, money laundering, child sexual exploitation, and cyber bullying). See section 342 of the Criminal Code Cyber threats are both internal and external 2

Cybercrime Affecting the Healthcare Industry Healthcare records are particularly valuable to cybercriminals because the data has broad utility. It is exposed to various threats : Hacking Phishing Spoofing Zombie Computers Botnet Operations Malware 3

Two main types of threats 1)Attack requires no information from the victim 2)Victim's active involvement required Both types have their own unique risk management issues Highest risks are when victims are misled to believe that messages are from internal or trusted sources 4

Effective Management of a Cyber Attack Case Study 5

Case Study (Phishing targeting public sector) Phishing was sent to the executive office announcing electronic banking changes and requesting the completion of a system update. forwarded to accounting department requesting the matter be addressed. Finance staff acted on this direction and completed the update as requested. Routine review of banking files at the start of a work week highlighted the 3 questionable payroll files processed over the weekend. Working with the bank it was confirmed the account had been compromised approximately 1 month after the phishing had been acted on. 6

Case Study – lessons learned All it takes is a click of an Early involvement of HIROC provided expertise and guidance Cyber crimes are highly sophisticated Internal s create a sense of urgency and or comfort – education around generated phishing needs to be to directed to all staff on a frequent basis Understand your banking agreements Banks will never place a systems login request using an with a direct link. 2 stage banking authorization, by 2 individuals is best practice – external confirmation with a token is optimal. 7

Reporting Cybercrime HIROC Report early for best results Canadian Anti-Fraud Centre Partnership among the RCMP, the Ontario Provincial Police and the Competition Bureau Canada's central repository for data and fraud intelligence Local Police Banks Ensure that counsel review banking agreements to identify liabilities for any cybercrime that affect the organization’s bank accounts 8

CYBER RISKS IN THE HEALTHCARE INDUSTRY HIROC 's Annual Risk Management Conference, April 2015 Jim Patterson, Partner, Co-Head of Fraud Law, Toronto, Bennett Jones LLP, Michele Beals, Interim Joint VP Finance & CFO, William Osler Health System, Headwaters Health Care Centre,