Recent IT Security Breaches & How Organizations Prepare Evan McGrath Spohn Consulting May 23, 2015.

Slides:



Advertisements
Similar presentations
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
Advertisements

The Department has declared itself to be a single covered entity. Thus, each and every one of our divisions is a covered entity and must comply with.
HIPAA: An Overview of Transaction, Privacy and Security Regulations Training for Providers and Staff.
HITECH ACT Privacy & Security Requirements Cathleen Casagrande Privacy Officer July 23, 2009.
HIPAA Basics Brian Fleetham Dickinson Wright PLLC.
HIPAA: Privacy, Security, and HITECH, Oh My! Presented by Stephanie L. Ganucheau, Special Assistant Attorney General.
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA Privacy Rule Training
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
1 Navigating the Privacy and Security Issues: HITECH Overview Rebecca L. Williams, RN, JD Partner Co-chair of HIT/HIPAA Practice Davis Wright Tremaine.
Key Changes to HIPAA from the Stimulus Bill (ARRA) Children’s Health System Department Leadership Meeting October 28, 2009 Kathleen Street Privacy Officer/Risk.
Managing Access to Student Health Information per Federal HIPAA Guidelines Joan M. Kiel, Ph.D., CHPS Duquesne University Pittsburgh, Penna
HIPAA CHANGES: HITECH ACT AND BREACH NOTIFICATION RULES February 3, 2010 Kristen L. Gentry, Esq. Catherine M. Stowers, Esq.
NAU HIPAA Awareness Training
Topics Rule Changes Skagit County, WA HIPAA Magic Bullet HIPAA Culture of Compliance Foundation to HIPAA Privacy and Security Compliance Security Officer.
HIPAA Regulations What do you need to know?.
COMPLYING WITH HIPAA PRIVACY RULES Presented by: Larry Grudzien, Attorney at Law.
Jill Moore April 2013 HIPAA Update: New Rules, New Challenges.
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
HIPAA HIPAA Health Insurance Portability and Accountability Act of 1996.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Health Insurance Portability & Accountability Act (HIPAA)
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
Responding to a Data Security Breach
March 19, 2009 Changes to HIPAA Privacy and Security Requirements Joel T. Kopperud Scott A. Sinder Rhonda M. Bolton.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Data Classification & Privacy Inventory Workshop
Version 6.0 Approved by HIPAA Implementation Team April 14, HIPAA Learning Module The following is an educational Powerpoint presentation on the.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
HIPAA – Health Insurance Portability & Accountability Act and the Privacy Act MSgt Nechele M. Chambers Senior Enlisted Liaison TRICARE Area Office-Europe.
COMPLYING WITH HIPAA BUSINESS ASSOCIATE REQUIREMENTS Quick, Cost Effective Solutions for HIPAA Compliance: Business Associate Agreements.
1 HIPAA Security Overview Centers for Medicare & Medicaid Services (CMS)
CUI Statistical: Collaborative Efforts of Federal Statistical Agencies Eve Powell-Griner National Center for Health Statistics.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
Payment Card PCI DSS Compliance SAQ-A Training Accounts Receivable Services, Controller’s Office 7/1/2012.
HIPAA PRIVACY AND SECURITY AWARENESS.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Confidentiality, Consents and Disclosure Recent Legal Changes and Current Issues Presented by Pam Beach, Attorney at Law.
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Dealing with Business Associates Business Associates Business Associates are persons or organizations that on behalf of a covered entity: –Perform any.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
LAW SEMINARS INTERNATIONAL CLOUD COMPUTING: LAW, RISKS AND OPPORTUNITIES Developing Effective Strategies for Compliance With the HITECH Act and HIPAA’s.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Health Insurance Portability and Accountability Act (HIPAA) CCAC.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Payment Card PCI DSS Compliance SAQ-B Training Accounts Receivable Services, Controller’s Office 7/1/2012.
Configuring Electronic Health Records Privacy and Security in the US Lecture c This material (Comp11_Unit7c) was developed by Oregon Health & Science University.
HITECH and HIPAA Presented by Rhonda Anderson, RHIA Anderson Health Information Systems, Inc
Top 10 Series Changes to HIPAA Devon Bernard AOPA Reimbursement Services Coordinator.
Configuring Electronic Health Records Privacy and Security in the US Lecture b This material (Comp11_Unit7b) was developed by Oregon Health & Science University.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
HIPAA TRIVIA Do you know HIPAA?. HIPAA was created by?  The Affordable Care Act  Health Insurance companies  United States Congress  United States.
HIPAA Privacy Rule Training
Nassau Association of School Technologists
Regulatory Compliance
HIPPA/HITECH Act Requirements Under the Business Associate Agreement Between CNI and Military Health Services.
Red Flags Rule An Introduction County College of Morris
HIPAA PRIVACY AWARENESS, COMPLIANCE and ENFORCEMENT
Disability Services Agencies Briefing On HIPAA
National HIPAA Audioconferences
Colorado “Protections For Consumer Data Privacy” Law
The Health Insurance Portability and Accountability Act
Presentation transcript:

Recent IT Security Breaches & How Organizations Prepare Evan McGrath Spohn Consulting May 23, 2015

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 2 Agenda  Recent Breaches  Cost of a Security Breach  What Hackers Target  Regulatory Compliances & State Codes  Cyber-Terrorism  Things You can do

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 3 Recent Security Breaches

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 4 Recent Security Breaches

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 5 Cost of a Security Breach

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 6 High value data for hackers  Protected Health Information (PHI) –First responders, Ambulatory services  Personal Identifiable Information (PII) –Citizen records, Utility & water records –Criminal records, sheriff departments  Credit card numbers –Property tax payments –Traffic & court fees –Utility bills, water, power –Vehicle registration  Bank account / payroll information

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 7 Regulatory compliance & state codes  Texas Business & Commerce Code  FISMA –NIST SP 800 – 122 –FIPS 200  HIPAA / HITECH Act  Payment Card Industry (PCI)

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 8 Texas Business and Commerce Code T ITLE 11, P ERSONAL I DENTITY I NFORMATION, S UBTITLE B. I DENTITY T HEFT, C HAPTER 521. U NAUTHORIZED U SE OF I DENTIFYING I NFORMATION Sec BUSINESS DUTY TO PROTECT SENSITIVE PERSONAL INFORMATION. (a) A business shall implement and maintain reasonable procedures, including taking any appropriate corrective action, to protect from unlawful use or disclosure any sensitive personal information collected or maintained by the business in the regular course of business. Sec NOTIFICATION REQUIRED FOLLOWING BREACH OF SECURITY OF COMPUTERIZED “…shall disclose any breach of system security, after discovering or receiving notification of the breach, to any resident of this state whose sensitive personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The disclosure shall be made as quickly as possible,…”

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 9 FIPS 200, Minimum Security Requirements for Federal Information and Information Systems, is a mandatory, non- waiverable standard developed in response to the Federal Information Security Management Act of To comply with the federal standard, agencies must first determine the security category of their information system in accordance with the provisions of FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, and then apply the appropriate set of baseline security controls in NIST Special Publication The combination of FIPS 200 and NIST Special Publication requires a foundational level of security for all federal information and information systems. The agency's Risk Assessment validates the security control set and determines if any additional controls are needed to protect agency operations (including mission, functions, image, or reputation), agency assets, individuals, other organizations, or the Nation. The resulting set of security controls establishes a level of “security due diligence” for the federal agency and its contractors. In addition to the security requirements established by FISMA, there may also be specific security requirements in different business areas within agencies that are governed by other laws, Executive Orders, directives, policies, regulations, or associated governing documents, (e.g., the Health Insurance Portability and Accountability Act of 1996) It is important that agency officials (including authorizing officials, chief information officers, senior agency information security officers, information system owners, information system security officers, and acquisition authorities) take steps to ensure that: (i) all appropriate security requirements are addressed in agency acquisitions of information systems and information system services; and (ii) all required security controls are implemented in agency information systems. See for additional information on FISMA compliance. Federal Information Security Management Act (FISMA)

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 10 S ECTION OF THE H EALTH I NFORMATION T ECHNOLOGY FOR E CONOMIC AND C LINICAL H EALTH (HITECH) A CT by requiring HIPAA covered entities and their business associates to provide notification following a breach of unsecured protected health information. I NDIVIDUAL N OTICE : Covered entities must provide this individual notice in written form by first-class mail, or alternatively, by if the affected individual has agreed to receive such notices electronically. If the covered entity has insufficient or out-of-date contact information for 10 or more individuals, the covered entity must provide substitute individual notice by either posting the notice on the home page of its web site or by providing the notice in major print or broadcast media where the affected individuals likely reside. M EDIA N OTICE : Covered entities that experience a breach affecting more than 500 residents of a State or jurisdiction are required to provide notice to prominent media outlets serving the State or jurisdiction. Notice to the (HHS) Secretary: Covered entities must notify the Secretary of breaches of unsecured protected health information. A maximum penalty amount of $1.5 million for all violations of an identical provision. E NFORCEMENT : HIPAA covered entities were required to comply with the Security Rule beginning on April 20, OCR became responsible for enforcing the Security Rule on July 27, (Summary: While HIPAA was established in 1996, it was not until 2009 that we saw widespread enforcement ) HITECH Notification of Breach Laws Issued August 2009

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 11 Payment Card Industry (PCI)  Anyone who stores, process, or transmits credit card data must be PCI compliant  Common PCI validation requirements  Report on Compliance (ROC)  Self-Assessment Questionnaire (SAQ)  Letter of Attestation  Quarterly PCI scans  Sample PCI Data Security Standards Requirements  Annual Penetration Testing (DSS 11.3)  Security Awareness Training (DSS 12.6)  Quarterly PCI scans (DSS 11.2)

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 12 Does PCI DSS apply to merchants who use payment gateways to process transactions on their behalf, and thus never store, process or transmit cardholder data? PCI DSS requirements are applicable if a Primary Account Number (PAN) is stored, processed, or transmitted. If PAN is not stored, processed, or transmitted, PCI DSS requirements do not apply. However, under PCI DSS requirement 12.8, if the merchant shares cardholder data with a third party processor or service provider, the merchant must ensure that there is an agreement with that third party processor/service provider that includes their acknowledgement that the third party processor/service provider is responsible for the security of the cardholder data it possesses. I’m a small merchant who has limited payment card transaction volume. Do I need to be compliant with PCI DSS? If so, what is the deadline? All merchants, whether small or large, need to be PCI compliant. The payment brands have collectively adopted PCI DSS as the requirement for organizations that process, store or transmit payment cardholder data. PCI SSC is responsible for managing the security standards while each individual payment brand is responsible for managing and enforcing compliance to these standards. Myth – Outsourcing card processing makes us compliant Outsourcing simplifies payment card processing but does not provide automatic compliance. Don’t forget to address policies and procedures for cardholder transactions and data processing. Your business must protect cardholder data when you receive it, and process charge backs and refunds. You must also ensure that providers’ applications and card payment terminals comply with respective PCI standards and do not store sensitive cardholder data. You should request a certificate of compliance annually from providers. PCI – Frequently Asked Questions

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 13 Cyber-Crime vs Drug Trafficking?

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 14 Possible cyber-threats …

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 15 Things you can do…  Implement Security Policies & Incident Response Plans  Education: Security Awareness Training  Vulnerability Assessments – Internal & External  Penetration Testing – Internal & External  Wireless Penetration Testing  Social Engineering Exercises  Enterprise Security Assessments –Administrative Safeguards –Technical Safeguards –Physical Safeguards

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 16 Questions & Answers Q&A

Expertise for Navigating Business Challenges © 2011 Spohn Consulting 17 Thank you! Evan McGrath Spohn Consulting Phone: