Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HIPAA Security Regulations Jean C. Hemphill Ballard Spahr Andrews & Ingersoll, LLP November 30, 2004.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
David A. Brown Chief Information Security Officer State of Ohio
Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.
Security, Privacy, and the Protection of Personally Identifiable Information Rodney J. Petersen Policy Analyst, EDUCAUSE EDUCAUSE/Internet2 Security.
Security Controls – What Works
Information Security Policies and Standards
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Information Security Information Technology and Computing Services Information Technology and Computing Services
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
A First Course in Information Security
Information Security Technological Security Implementation and Privacy Protection.
Information Security Update CTC 18 March 2015 Julianne Tolson.
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
C8- Securing Information Systems
Working with Health IT Systems Protecting Privacy, Security, and Confidentiality in HIT Systems Lecture a This material (Comp7_Unit7a) was developed by.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
HIPAA Michigan Cancer Registrars Association 2005 Annual Educational Conference Sandy Routhier.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
TIF-Security Update Robert Ono, IT Security Coordinator October 2010.
Working with HIT Systems
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
U.S. Small Business Administration Answers | Resources | Support For Your Small Business Cybersecurity Awareness Cybersecurity Awareness Signs You’ve Been.
New A.M. Best Cyber Questionnaire
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
The Art of Information Security: A Strategy Brief Uday Ali Pabrai, CISSP, CHSS.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Securing Information Systems
Law Firm Data Security: What In-house Counsel Need to Know
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Information Security Program
New A.M. Best Cyber Questionnaire
Cybersecurity - What’s Next? June 2017
Healthcare Cybersecurity: State of Industry
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
CMIT100 Chapter 15 - Information.
Understanding HIPAA Dr. Jennifer Lu.
Securing Information Systems
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
I have many checklists: how do I get started with cyber security?
Take Cyber Security “TO HEART”
Cybersecurity compliance for attorneys
Considerations for Cybersecurity and Data Security in Today’s World
Security week 1 Introductions Class website Syllabus review
Introduction to the PACS Security
Texas Assisted Living Association 2019 Conference
Security Policies and Implementation Issues
Presentation transcript:

Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH

Today’s Presentation  Introduction  Governance  Cyber Risk  Remediation Strategies –Passwords –Phishing –Security Updates  Incident Response  Challenge  Summary

Definitions  Information Security –The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.  Cybersecurity –The ability to protect or defend the use of cyberspace from cyber attacks

Terms  Phishing  Threat Actor  Malware  OCR

Governance  Leadership –Executive Leadership –Board Accountability –Incident Response Team Confidentiality & Security Team (CST) Computer Emergency Response Team (CERT)  Frameworks –NIST Cybersecurity Framework –NIST 800-Series Guidance –SANS 20 Critical Security Controls

Compliance Secure

Next Steps Cyber Risk Risk Remediation Response

Cyber Risk  Criminal Attacks Up 125%  Medical Identity Theft Doubled –1.4M to more than 2.3M  Average of $13,500 to Restore Credit

Cyber Risk  The Numbers... –Medical record: $10 - $50 –Mother’s Maiden Name: $6 –Social Security Number: $3 –Date of Birth: $3 –Credit Card: $1.00  Risks –Patient safety (medical record) –Coverage (routine physical to major surgery) –Fraudulent claims –Credit accounts

Cyber Risk Phishing Phishing (TBD) Phishing

Cyber Risk OCR Breach Portal: October, Breaches (Hacking), >115M Patients

Cyber Risk  Verizon Data Breach Report –23% of recipients open phishing messages –11% click on attachments –97% of exploits target 10 CVEs –Mobile malware not a primary threat –Threat Actors 80% of breaches reviewed (external) 17% of breaches reviewed (internal) 3% of breaches reviewed (partners)

Cyber Risk  Risk Assessment –NIST Rev. 1 Conducting Risk Assessments –NIST Managing Information Security Risk –Vulnerability Assessments –Stored and Transmitted

Cyber Risk  Stored –Databases –Thumbdrives –Workstations –File Servers –Medical Devices  Transmitted – –VPN (clients) –Site-to-Site VPN Tunnel –Secure Web Front-End  Know your data!  Don’t overlook non-sensitive systems

Cyber Risk  Tools –Security Risk Assessment (SRA Tool) professionals/security-risk-assessment-tool Additional resources oTop 10 Tips for Cybersecurity in Health Care –HIPAA Security Rule Toolkit

Next Steps Remediation Strategies Risk Remediation Response

Remediation Strategies  Accept –Within organizational risk tolerance  Avoid –Risk exceeds organizational risk tolerance  Mitigate –NIST –20 Critical Security Controls  Share or Transfer –Outsourcing –Cyber Insurance

Remediation Strategies  Cyber Insurance –Breach Costs (forensics, notification, identity protection) –Privacy Protection (regulatory) –Multimedia Protection –Cyber Extortion  Analysis –Incident History –Ponemon Study: $204 per record –Verizon Data Breach Report

Remediation Strategies  Verizon Data Breach Report –Cost Per Record

Remediation Strategies  Example Safeguards –Encryption –Malware Protection –Microsoft & Third Party Updates –Physical Access Controls –Intrusion Detection & Prevention –Policies & Procedures –Disaster Recovery & Business Continuity –Incident Response –Two-Factor Authentication –Strong Password Enforcement

Next Steps Video Passwords

 Which one is more secure? take the survey Xq!5#7pK 8 characters 3 days to crack 15 characters 49 million years to crack

Passwords  Passwords –Minimum of 8 characters (10-52 seconds) –Upper & lower case ( minutes) –Numbers (3-15 hours) –Special characters (3-5 days)  Passphrases –Minimum of 15 characters (13,000 years) –Upper & lower case (435 million years) –Numbers (6 billon years) –Special characters (157 billion years)

Passwords  Two-Factor Authentication –Password, Pin –Hard Token, Soft Token, Certificate

Phishing  Security awareness and training

Phishing  Phishing tests –Social Engineering Toolkit (SET) –Simple Phishing Toolkit –SpearPhisher

Phishing Test

Security Updates  Windows Updates –120 Windows Updates, Per Server, Per Year –12,000 Windows Updates Per Year (per 100 Servers)  Microsoft Updates –Office –SQL  Third Party Updates –Adobe –Oracle (Java)

Next Steps Incident Response Risk Remediation Response

Incident Response  Incident Response Team  Reporting & Tracking  Breach Assessment –Notification Requirements  Law Enforcement & NCCIC  Disaster and Contingency Planning

Incident Response  National Cybersecurity and Communications Integration Center (NCCIC) –US-CERT (United States Computer Emergency Readiness Team) –ICS-CERT (Industrial Control Systems Cyber Emergency Response Team) –NCC (National Coordinating Center) –COC (NCCIC Cyber Operations Center) –DTA (Discovery and Technical Analysis) –MM (Mission Management)

Challenge #1  Vulnerability Assessment Report –US-CERT: Top 30 Targeted High Risk Vulnerabilities –

Challenge #2  Malware Report –Virus definitions –Detection history –Rogue system detection

Challenge #3  Security Update Status Report –Microsoft updates –Third party software

Challenge #4  Security Awareness and Training –Training certifications/verification –Review/update content –Phishing test  Free Resources –CyberAwareness Challenge (Federal Version) –Identifying and Safeguarding PII –Privacy and Security Training Games

Summary  Risk  Remediation  Response

Additional Information  Verizon Data Breach Report (2015) –  National Institute of Standards and Technology (NIST) – –800-Series Guidance:  OCR Breach Portal –  NCCIC – integration-center  US-CERT – –Incident Reporting:

Additional Information  Cybercrime and the Healthcare Industry (EMC & RSA) – healthcare-industry-rsa-wp.pdf  Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data (Ponemon Institute) – privacy-security-incidents-of-healthcare-data  Cyber-Risk Oversight Handbook – 8

Contact Information Have a question, comment, or suggestion? Contact Nathan Gibson at: ext. 2236