SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Case Studies from the Field
_____
Putting Cyber Security Strategies into Action
● Blaine Hebert, Information Security Officer, Rady Children’s Hospital-San Diego ●
BitCoin-A Hospital Case Study
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Blaine Hebert, Information Security Officer, Rady Childrens Hospital
• What is BitCoin? Virtual or digital Currency
• How does it work? Computers validate bitcoin transactions by
processing mathematical algorithms. This takes severe
processing power to make it beneficial to the miner.
Blaine Hebert, Information Security Officer, Rady Childrens Hospital
Blaine Hebert, Information Security Officer, Rady Childrens Hospital
Blaine Hebert, Information Security Officer, Rady Childrens Hospital
Blaine Hebert, Information Security Officer, Rady Childrens Hospital
Internet
Filter
Computer
Anomalies
Computer
Software
Google
Searches
Blaine Hebert, Information Security Officer, Rady Childrens Hospital
Blaine Hebert, Information Security Officer, Rady Childrens Hospital
Blaine Hebert, Information Security Officer, Rady Childrens Hospital
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Case Studies from the Field
_____
Putting Cyber Security Strategies into Action
● Patrick Wilson, CISO and Director of Clinical Applications, Contra Costa County
Health Services ●
#LEAD15
A CHIME Leadership Education and Development Forum in collaboration with iHT2
A Best Defense isn’t
Always a Fence
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Everyone Trusts Someone
Wearing a Coat
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Found this in on a filing cabinet.
Don’t be a Target
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Case Studies from the Field
_____
Putting Cyber Security Strategies into Action
● Keith Graat, CISSP, CEH, Chief Information Security Officer, Eisenhower Medical Center
#LEAD15
EMC’s Environment
• 476 Bed Hospital
• ~2600 Employees
• ~3700 Workstations
• ~700 Servers
• 200+ Applications
Problem
• Ensure any email leaving the organization
containing PHI is encrypted per policy.
• Protect PHI from leaving the organization
through email in unauthorized and insecure
manner.
• Ability to audit and log all email activity where
PHI is involved.
Data Loss Prevention (DLP)
• DLP finds PHI via email and other channels
and takes action if it doesn’t meet our policies.
• Selected a DLP solution that did exact data
matching.
• We knew what data we wanted to protect
(PHI).
How We Did It
• Setup the DLP solution to catalog our databases that
contain PHI. Specifically last name and any of the
following:
– MRN, HNE, Account # and SSN
• Put the product in logging mode for a few months and
tweaked as needed.
• Communicated to the organization and leadership
team of the upcoming change.
How We Did It
• Setup violation notifications to email the source
sender and their manager.
• Worked with Compliance and had a “soft go live”
where we gave the organization 1 month before
taking corrective action with employees.
• Regular review of DLP reports to ensure the
system is functioning appropriately.
Results
• Prior to DLP on a monthly average we identified 300
unencrypted emails with PHI and 1200 that were
encrypted.
• Eight months since email DLP has been in place and
we have seen a monthly average of 43 blocked
unencrypted emails with PHI and 1800 that were
encrypted.
• Violation false positive rate is less than 1%.
Lessons Learned
• Great tool to identify trends and opportunities for
training and improvement.
• Users will email files to their personal email addresses
so they can work from home.
• Violations included:
– Emails to business partners.
– Acquisitions that haven’t been fully integrated.
– IS Employees – Log files, applications dumps.
Conclusion
• DLP has been a very effective solution for us.
• Choose a solution that can scale to other areas, for
example web traffic, endpoints, reporting.
• DLP can be a great solution to finding where your
PHI lives in your environment.
• Has the potential to consume a lot of resources.

Más contenido relacionado

Más de Health IT Conference – iHT2

Más de Health IT Conference – iHT2 (20)

2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit2016 iHT2 Miami Health IT Summit
2016 iHT2 Miami Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit 2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 

Último

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 

Último (20)

Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 

CHIME LEAD San Francisco 2015 "Case Studies from the Field: Putting Cyber Security Strategies into Action"

  • 1. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Case Studies from the Field _____ Putting Cyber Security Strategies into Action ● Blaine Hebert, Information Security Officer, Rady Children’s Hospital-San Diego ●
  • 2. BitCoin-A Hospital Case Study A CHIME Leadership Education and Development Forum in collaboration with iHT2
  • 3. Blaine Hebert, Information Security Officer, Rady Childrens Hospital • What is BitCoin? Virtual or digital Currency • How does it work? Computers validate bitcoin transactions by processing mathematical algorithms. This takes severe processing power to make it beneficial to the miner.
  • 4. Blaine Hebert, Information Security Officer, Rady Childrens Hospital
  • 5. Blaine Hebert, Information Security Officer, Rady Childrens Hospital
  • 6. Blaine Hebert, Information Security Officer, Rady Childrens Hospital
  • 7. Blaine Hebert, Information Security Officer, Rady Childrens Hospital Internet Filter Computer Anomalies Computer Software Google Searches
  • 8. Blaine Hebert, Information Security Officer, Rady Childrens Hospital
  • 9. Blaine Hebert, Information Security Officer, Rady Childrens Hospital
  • 10. Blaine Hebert, Information Security Officer, Rady Childrens Hospital
  • 11. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Case Studies from the Field _____ Putting Cyber Security Strategies into Action ● Patrick Wilson, CISO and Director of Clinical Applications, Contra Costa County Health Services ● #LEAD15
  • 12. A CHIME Leadership Education and Development Forum in collaboration with iHT2 A Best Defense isn’t Always a Fence
  • 13. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Everyone Trusts Someone Wearing a Coat
  • 14. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Found this in on a filing cabinet. Don’t be a Target
  • 15. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Case Studies from the Field _____ Putting Cyber Security Strategies into Action ● Keith Graat, CISSP, CEH, Chief Information Security Officer, Eisenhower Medical Center #LEAD15
  • 16. EMC’s Environment • 476 Bed Hospital • ~2600 Employees • ~3700 Workstations • ~700 Servers • 200+ Applications
  • 17. Problem • Ensure any email leaving the organization containing PHI is encrypted per policy. • Protect PHI from leaving the organization through email in unauthorized and insecure manner. • Ability to audit and log all email activity where PHI is involved.
  • 18. Data Loss Prevention (DLP) • DLP finds PHI via email and other channels and takes action if it doesn’t meet our policies. • Selected a DLP solution that did exact data matching. • We knew what data we wanted to protect (PHI).
  • 19. How We Did It • Setup the DLP solution to catalog our databases that contain PHI. Specifically last name and any of the following: – MRN, HNE, Account # and SSN • Put the product in logging mode for a few months and tweaked as needed. • Communicated to the organization and leadership team of the upcoming change.
  • 20. How We Did It • Setup violation notifications to email the source sender and their manager. • Worked with Compliance and had a “soft go live” where we gave the organization 1 month before taking corrective action with employees. • Regular review of DLP reports to ensure the system is functioning appropriately.
  • 21. Results • Prior to DLP on a monthly average we identified 300 unencrypted emails with PHI and 1200 that were encrypted. • Eight months since email DLP has been in place and we have seen a monthly average of 43 blocked unencrypted emails with PHI and 1800 that were encrypted. • Violation false positive rate is less than 1%.
  • 22. Lessons Learned • Great tool to identify trends and opportunities for training and improvement. • Users will email files to their personal email addresses so they can work from home. • Violations included: – Emails to business partners. – Acquisitions that haven’t been fully integrated. – IS Employees – Log files, applications dumps.
  • 23. Conclusion • DLP has been a very effective solution for us. • Choose a solution that can scale to other areas, for example web traffic, endpoints, reporting. • DLP can be a great solution to finding where your PHI lives in your environment. • Has the potential to consume a lot of resources.