Download presentation
Published byChester White Modified over 9 years ago
1
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc.
September 21, 2015
2
Cybersecurity Recent Events
State of Affairs: The health care industry accounted for 42.5% of all data breaches over the last three years, considerably more than any other sector of the economy, according to the Identity Theft Resource Center, and 91% of all health care organizations reported at least one data breach over the last two years according to usatoday.com. UCLA Health System – July 2015 million people Anthem Breach – February 2015 - 80 million social security numbers and other sensitive data Sony Entertainment – November 2014 - 10s of terabytes of confidential data Community Health Systems – August 2014 million patients
3
Cybersecurity Preparedness – Healthcare Source: HIMSS Cybersecurity Survey
4
Significant Threats: Top 10 – Healthcare Source: HIMSS Cybersecurity Survey
5
Most Common PHC Attacks
Ranked in Order Malicious Attachments in Corporate Malicious Web Links in Corporate Phishing and Spear Phishing s Public Facing Servers (DMZ) Personal Webmail
6
And When the Tools Fail? Incident Response Lifecycle
Stage I: Discovery & Reporting Stage II: Incident Response Team Investigation Stage III: Responding to the Incident Stage IV: Containment, Restoration, Recovery Stage V: Post Incident Review and Follow Up
7
Protect Against Attacks
Cyber Security Tools Firewall Rule Management Intrusion Prevention and Detection systems (IPS/IDS) Content Filtering and Encryption Internet Content Filtering Anti-virus Programs Server Operating System Patch Monitoring and Deployment Secure (Data) File Transfer Protocols (SFTP)
8
Closing the Gaps 3rd Party Help
24/7 log monitoring and incident escalation More Information Security Staff Evaluate Current Security Tools Security Tool Configuration Assessment Implement a Vulnerability Management Program
9
Strategic Cyber Security Initiatives
Trend Deep Discovery Specialized threat detection technology and proactive process of real-time threat management through the monitoring of network traffic Detects and Protects Against • APTs and targeted attacks • Zero-day malware and document exploits • Attacker network activity • Web threats (exploits, drive-by-downloads) • threats (phishing, spear phishing) • Data exfiltration • Bots, trojans, worms, keyloggers • Disruptive applications
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.