Presentation is loading. Please wait.

Presentation is loading. Please wait.

GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.

Similar presentations


Presentation on theme: "GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015."— Presentation transcript:

1 GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc.
September 21, 2015

2 Cybersecurity Recent Events
State of Affairs: The health care industry accounted for 42.5% of all data breaches over the last three years, considerably more than any other sector of the economy, according to the Identity Theft Resource Center, and 91% of all health care organizations reported at least one data breach over the last two years according to usatoday.com. UCLA Health System – July 2015 million people Anthem Breach – February 2015 - 80 million social security numbers and other sensitive data Sony Entertainment – November 2014 - 10s of terabytes of confidential data Community Health Systems – August 2014 million patients

3 Cybersecurity Preparedness – Healthcare Source: HIMSS Cybersecurity Survey

4 Significant Threats: Top 10 – Healthcare Source: HIMSS Cybersecurity Survey

5 Most Common PHC Attacks
Ranked in Order Malicious Attachments in Corporate Malicious Web Links in Corporate Phishing and Spear Phishing s Public Facing Servers (DMZ) Personal Webmail

6 And When the Tools Fail? Incident Response Lifecycle
Stage I: Discovery & Reporting Stage II: Incident Response Team Investigation Stage III: Responding to the Incident Stage IV: Containment, Restoration, Recovery Stage V: Post Incident Review and Follow Up

7 Protect Against Attacks
Cyber Security Tools Firewall Rule Management Intrusion Prevention and Detection systems (IPS/IDS) Content Filtering and Encryption Internet Content Filtering Anti-virus Programs Server Operating System Patch Monitoring and Deployment Secure (Data) File Transfer Protocols (SFTP)

8 Closing the Gaps 3rd Party Help
24/7 log monitoring and incident escalation More Information Security Staff Evaluate Current Security Tools Security Tool Configuration Assessment Implement a Vulnerability Management Program

9 Strategic Cyber Security Initiatives
Trend Deep Discovery Specialized threat detection technology and proactive process of real-time threat management through the monitoring of network traffic Detects and Protects Against • APTs and targeted attacks • Zero-day malware and document exploits • Attacker network activity • Web threats (exploits, drive-by-downloads) • threats (phishing, spear phishing) • Data exfiltration • Bots, trojans, worms, keyloggers • Disruptive applications


Download ppt "GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015."

Similar presentations


Ads by Google