SlideShare a Scribd company logo
1 of 33
Healing
Healthcare
Security
Barry Caplin, VP & CISO, Fairview Health
Services
bc@bjb.org
bcaplin1@fairview.org
@bcaplin
https://securityandcoffee.blogspot.com/
Secure360 May 16, 2017
Healthcare Breach Stats
2009
18 breaches
135K records
2010
198 breaches
5.5M records
2011
196 breaches
13.2M records
2012
209 breaches
2.8M records
2013
274 breaches
7M records
2014
307 breaches
12.7M records
2015
270 breaches
113.3M records
2016
329 breaches
16.5M records
Total
1801 breaches
171M+ records
Tweet along: #Sec360
WTF!
• What’s the problem
Healthcare?
• Is Healthcare fundamentally
bad at security?
• The opinions herein, yadda, yadda…
• Mine, not my employer’s, yadda, yadda…
Tweet along: #Sec360
@bcaplin
http://about.me/barrycaplin
securityandcoffee.blogspot.com
Tweet along: #Sec360
o Not-for-profit established in 1906
o Academic Health System since
1997
partnership with University of
Minnesota
o >22K employees
o >2500 aligned physicians
o Employed, faculty, independent
o 7 hospitals/medical centers
(>2,500 licensed beds)
o 40-plus primary care clinics
o 55-plus specialty clinics
o 54 senior housing locations
o 30-plus retail pharmacies
2015 volumes
o 6.6M outpatient encounters
o 1.55M clinic visits
o 67,682 inpatient admissions
o 78,157 surgeries
o 9,060 births
o 290 blood and marrow
transplants
o 45 organ transplants
o >$4 billion total revenue
2015 At-a-Glance
Tweet along: #Sec360
Who is Fairview?
A partnership of North Memorial and Fairview
Tweet along: #Sec360
Healthcare
Pressures
• Healthcare delivery is expensive
• Reimbursements, therefore
margins, are low
• Not-for-profit – nearly 2/3s of
hospitals
• Healthcare workers need
instantaneous, unfettered
access…
• And must spew data everywhere,
now…
• Or someone could die!
• Med Devices
• M & A
Tweet along: #Sec360
Regulatory
• HIPAA – Health Insurance Portability and
Accountability Act
• Focused on portability – mandated use of
EHR
• Privacy and Security were add-on’s
• Security Rule finalized in 2003 (Privacy in
2002)
• Focus on confidentiality of PHI
(Protected Health Information)
• Fines for data breaches, violations
• Fines were initially small
• HITECH Act changed that (2009)
• Health Information Technology for
Economic and Clinical Health
Tweet along: #Sec360
Regulatory
Small revenue margins + high fines
= not much extra for IT or
security
= focus on PHI data breach only
Tweet along: #Sec360
User Population
• Clinicians – Nurses, Doctors, Specialists, “-
ologists”, Researchers, Professors
• All are:
• Very smart
• Very busy
• Will find a way
• We need them to use their brain-cycles to heal,
not to work around security controls
• Must provide controls that complement workflows
• “wasted” time could be a patient safety issue
The Value of Your Data
Tweet along: #Sec360
Adversaries
• Then and Now
• It’s about… speed to market, low
cost/high return
• So Healthcare is the obvious target!
• Or is it?????
Tweet along: #Sec360
Financial/Retail
Data
• PII – Personally Identifiable
Information
• Often includes SSN,
mother’s maiden name
• 1-to-many
• You have many credit
cards
• Easy to monetize
• Asymmetric theft model
• The victim often doesn’t
bear the cost
• (I’m not minimizing ID
Fraud which is a very
real and very bad thing.
But the vast majority
here are simple account
hijacking.)
Tweet along: #Sec360
Healthcare
Data
• “Rich”, complete information
• Basically 1-to-1
• You have many credit
cards
• You have 1 healthcare
record (yes, it might be
fragmented)
• >112M records breached in
2015; >171M through 2016
(via OCR Wall of Shame)
• Over 171M healthcare records
breached actually means…
Healthcare data on over
>171M Americans breached!
• US population is >300M
• So can we be done
now???
Tweet along: #Sec360
Effects of a
Healthcare data
breach
• Your healthcare data is
breached and
• You have surgery scheduled
tomorrow… What happens?
• You have your surgery
• OTOH, if the hospital is hit by
major ransomware?
• What if you’re actually on
the OR table???
Tweet along: #Sec360
Effects of a Healthcare
data breach
• But… very hard to monetize
• Data can be used to commit financial
crime
• But it’s easier to just steal credit card
numbers
• Medical Service fraud
• Yes, but you have to show up
• This can be a very nasty problem –
the fraudster pollutes the victim’s
medical record
• And no one needs to steal your
medical data to do this
• Drugs!
• Real, but you have to show up
• Data theft is too complex for most of
the drug-seekers; volume is too low
for the big players
• And no one needs to steal your
medical data to do this
Let’s Review
• Healthcare data is the most
valuable data
• Healthcare has limited funds
for security
• Focus on PHI data breach
• Professional thieves
• It’s about… speed to market,
low cost/high return
• So Healthcare is the obvious
target!
• Or is it?????Tweet along: #Sec360
What’s Worse?
• Credit card theft is annoying
• It’s like retail “shrinkage”
• Yes, it does cost us all
• Real ID Fraud is very bad for the victim but rates
are low
• Medical ID Fraud can be committed without theft of
your medical record
• Remember the OPM breach???
• Is this the most significant breach of PII ever?
• Intellectual Property
• IP theft may have even greater negative impact
to our economy
• And what about theft of military secrets?
Reality
• If healthcare data is the most valuable, and…
• Healthcare orgs have weak security, and…
• Financial orgs have great security, then…
• Why did the bad people hit the financial/retail
industry first?
• Footprint? Opportunity?
• Ease of Monetization?
• Volume?
Tweet along: #Sec360
Reality
• Why are they hitting healthcare now?
• Financial/Retail hardened their defenses?
• Financial/Retail no longer interesting?
• Monetization? – still hard
• Volume? – fewer total records to get
Tweet along: #Sec360
Sidebar Rant
– The Real
Problem
• Is the problem that PII
gets breached?
• Or…
• That it’s too easy to
commit ID fraud or other
crimes with the data?
• Can we make it harder to:
• Get services
• Open accounts
• Masquerade
… with other’s
information???Tweet along: #Sec360
Did HIPAA Help?
• Initially… Yes!
• Woke healthcare up
• But the focus on
Confidentiality is the
problem
• (yes, I know there’s more
to it, but look at the CMS
Wall of Shame)
• The fines are material, but
healthcare still has no excess
funds!
• Kick ‘em when they’re
down?
• So, no, HIPAA doesn’t helpTweet along: #Sec360
Gimme a “C”
• Do Regulations help?
• Initially… Yes! – but they
must keep up with the
times
• Security can’t be
• A point solution
• About one data type – PHI,
CC data, FTI, etc.
• Just about Confidentiality
• Winter is coming!
• Well, really it’s spring!
• We’re already thinking
about Availibility
• Can you spell DDoS?
• Can you spell
Brickerbot?
http://www.healthcareinfosecurity.com/blogs/hipaa-enforcement-look-ahead-p-2463
Tweet along: #Sec360
What about data
Integrity?
• What if rather than decrypting
our data for some bitcoin…
• It was fix our slightly altered
data for a “small consulting
fee”?
• Now that’s scary!
Tweet along: #Sec360
Solution #1
• Play in the same sandbox
• The alphabet soup of regulations has got to go
• We need a single security framework and standard that will
work across all areas of critical infrastructure?
• Sound familiar…?
• NIST CSF – CyberSecurity Framework
• History
• Yes, I realize that this is very US-centric
• Think globally, act locally – I can’t be responsible for all the world’s
problems!Tweet along: #Sec360
Solution #1 – NIST CSF
• It maps to everything
• Already directed at every critical
infrastructure industry vertical
• Can easily apply a maturity
model
• 800-53 provides the detailed
standard
Tweet along: #Sec360
Solution #2
• Many organizations still need an
“incentive”
• Are fines useful?
• Potentially
• How about rather than fine organizations,
force them instead to put an equivalent
amount of funding into an enterprise
security program!
• Perhaps some fine members of the
vendor community can offer holistic
security services?
• Maybe not
Tweet along: #Sec360
Regulations
• Are they necessary?
• Why can’t we solve these things ourselves?
Tweet along: #Sec360
What about 3rd party solutions and med
devices?
• Can’t live with ‘em, can’t live without ‘em.
• The same principles stand for these providers
• They must be held to the same high standard
• Vulnerabilities or other issues that can weaken their customers’ security
posture must be fixed
• All software must be patchable
• Even better – use solid, secure software engineering principles!
Tweet along: #Sec360
The Bottom Line
Point solutions and regulatory compliance will never
replace a holistic enterprise security program based upon
a solid framework
Tweet along: #Sec360
Barry Caplin
Fairview Health Services
bcaplin1@fairview.org
bc@bjb.org
@bcaplin
securityandcoffee.blogspot.com

More Related Content

Similar to Healing healthcare security

Emma cartmell sxsw presentation 2014
Emma cartmell sxsw presentation 2014Emma cartmell sxsw presentation 2014
Emma cartmell sxsw presentation 2014
exsede
 

Similar to Healing healthcare security (20)

Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Do I really need cyber liability insurance?
Do I really need cyber liability insurance?Do I really need cyber liability insurance?
Do I really need cyber liability insurance?
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Data Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a PositiveData Protection – How Not to Panic and Make it a Positive
Data Protection – How Not to Panic and Make it a Positive
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
How To Entrepreneur
How To Entrepreneur How To Entrepreneur
How To Entrepreneur
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
 
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the BoardSeattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
Seattle Biz-Tech Summit 10-2015 CyberSecurity and the Board
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
How to pitch your biotech idea
How to pitch your biotech ideaHow to pitch your biotech idea
How to pitch your biotech idea
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Security beyond compliance
Security beyond complianceSecurity beyond compliance
Security beyond compliance
 
BeHealth.Today | IDA
BeHealth.Today | IDABeHealth.Today | IDA
BeHealth.Today | IDA
 
Enemy at the Gates - Silicon Halton Meetup 53
Enemy at the Gates - Silicon Halton Meetup 53Enemy at the Gates - Silicon Halton Meetup 53
Enemy at the Gates - Silicon Halton Meetup 53
 
Elder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial ExploitationElder Investment Fraud & Financial Exploitation
Elder Investment Fraud & Financial Exploitation
 
Emma cartmell sxsw presentation 2014
Emma cartmell sxsw presentation 2014Emma cartmell sxsw presentation 2014
Emma cartmell sxsw presentation 2014
 

More from Barry Caplin

Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
Barry Caplin
 

More from Barry Caplin (20)

It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart Parent
 

Recently uploaded

raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
mriyagarg453
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Call Girls in Udaipur Girija Udaipur Call Girl ✔ VQRWTO ❤️ 100% offer with...
Call Girls in Udaipur  Girija  Udaipur Call Girl  ✔ VQRWTO ❤️ 100% offer with...Call Girls in Udaipur  Girija  Udaipur Call Girl  ✔ VQRWTO ❤️ 100% offer with...
Call Girls in Udaipur Girija Udaipur Call Girl ✔ VQRWTO ❤️ 100% offer with...
mahaiklolahd
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Mathura Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mathura Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMathura Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mathura Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetPatna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
russian goa call girl and escorts service
 
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 

Recently uploaded (20)

raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
 
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetneemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
neemuch Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls in Udaipur Girija Udaipur Call Girl ✔ VQRWTO ❤️ 100% offer with...
Call Girls in Udaipur  Girija  Udaipur Call Girl  ✔ VQRWTO ❤️ 100% offer with...Call Girls in Udaipur  Girija  Udaipur Call Girl  ✔ VQRWTO ❤️ 100% offer with...
Call Girls in Udaipur Girija Udaipur Call Girl ✔ VQRWTO ❤️ 100% offer with...
 
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real MeetVip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
Vip Call Girls Makarba 👙 6367187148 👙 Genuine WhatsApp Number for Real Meet
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Mathura Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mathura Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMathura Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mathura Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetnagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
nagpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun  UttrakhandDehradun Call Girls 8854095900 Call Girl in Dehradun  Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
 
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetPatna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Patna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
 
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
(Deeksha) 💓 9920725232 💓High Profile Call Girls Navi Mumbai You Can Get The S...
 
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetThrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Thrissur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
 

Healing healthcare security

  • 1. Healing Healthcare Security Barry Caplin, VP & CISO, Fairview Health Services bc@bjb.org bcaplin1@fairview.org @bcaplin https://securityandcoffee.blogspot.com/ Secure360 May 16, 2017
  • 2.
  • 3. Healthcare Breach Stats 2009 18 breaches 135K records 2010 198 breaches 5.5M records 2011 196 breaches 13.2M records 2012 209 breaches 2.8M records 2013 274 breaches 7M records 2014 307 breaches 12.7M records 2015 270 breaches 113.3M records 2016 329 breaches 16.5M records Total 1801 breaches 171M+ records Tweet along: #Sec360
  • 4. WTF! • What’s the problem Healthcare? • Is Healthcare fundamentally bad at security? • The opinions herein, yadda, yadda… • Mine, not my employer’s, yadda, yadda… Tweet along: #Sec360
  • 6. o Not-for-profit established in 1906 o Academic Health System since 1997 partnership with University of Minnesota o >22K employees o >2500 aligned physicians o Employed, faculty, independent o 7 hospitals/medical centers (>2,500 licensed beds) o 40-plus primary care clinics o 55-plus specialty clinics o 54 senior housing locations o 30-plus retail pharmacies 2015 volumes o 6.6M outpatient encounters o 1.55M clinic visits o 67,682 inpatient admissions o 78,157 surgeries o 9,060 births o 290 blood and marrow transplants o 45 organ transplants o >$4 billion total revenue 2015 At-a-Glance Tweet along: #Sec360
  • 7. Who is Fairview? A partnership of North Memorial and Fairview Tweet along: #Sec360
  • 8. Healthcare Pressures • Healthcare delivery is expensive • Reimbursements, therefore margins, are low • Not-for-profit – nearly 2/3s of hospitals • Healthcare workers need instantaneous, unfettered access… • And must spew data everywhere, now… • Or someone could die! • Med Devices • M & A Tweet along: #Sec360
  • 9. Regulatory • HIPAA – Health Insurance Portability and Accountability Act • Focused on portability – mandated use of EHR • Privacy and Security were add-on’s • Security Rule finalized in 2003 (Privacy in 2002) • Focus on confidentiality of PHI (Protected Health Information) • Fines for data breaches, violations • Fines were initially small • HITECH Act changed that (2009) • Health Information Technology for Economic and Clinical Health Tweet along: #Sec360
  • 10. Regulatory Small revenue margins + high fines = not much extra for IT or security = focus on PHI data breach only Tweet along: #Sec360
  • 11. User Population • Clinicians – Nurses, Doctors, Specialists, “- ologists”, Researchers, Professors • All are: • Very smart • Very busy • Will find a way • We need them to use their brain-cycles to heal, not to work around security controls • Must provide controls that complement workflows • “wasted” time could be a patient safety issue
  • 12. The Value of Your Data Tweet along: #Sec360
  • 13. Adversaries • Then and Now • It’s about… speed to market, low cost/high return • So Healthcare is the obvious target! • Or is it????? Tweet along: #Sec360
  • 14. Financial/Retail Data • PII – Personally Identifiable Information • Often includes SSN, mother’s maiden name • 1-to-many • You have many credit cards • Easy to monetize • Asymmetric theft model • The victim often doesn’t bear the cost • (I’m not minimizing ID Fraud which is a very real and very bad thing. But the vast majority here are simple account hijacking.) Tweet along: #Sec360
  • 15. Healthcare Data • “Rich”, complete information • Basically 1-to-1 • You have many credit cards • You have 1 healthcare record (yes, it might be fragmented) • >112M records breached in 2015; >171M through 2016 (via OCR Wall of Shame) • Over 171M healthcare records breached actually means… Healthcare data on over >171M Americans breached! • US population is >300M • So can we be done now??? Tweet along: #Sec360
  • 16. Effects of a Healthcare data breach • Your healthcare data is breached and • You have surgery scheduled tomorrow… What happens? • You have your surgery • OTOH, if the hospital is hit by major ransomware? • What if you’re actually on the OR table??? Tweet along: #Sec360
  • 17. Effects of a Healthcare data breach • But… very hard to monetize • Data can be used to commit financial crime • But it’s easier to just steal credit card numbers • Medical Service fraud • Yes, but you have to show up • This can be a very nasty problem – the fraudster pollutes the victim’s medical record • And no one needs to steal your medical data to do this • Drugs! • Real, but you have to show up • Data theft is too complex for most of the drug-seekers; volume is too low for the big players • And no one needs to steal your medical data to do this
  • 18. Let’s Review • Healthcare data is the most valuable data • Healthcare has limited funds for security • Focus on PHI data breach • Professional thieves • It’s about… speed to market, low cost/high return • So Healthcare is the obvious target! • Or is it?????Tweet along: #Sec360
  • 19. What’s Worse? • Credit card theft is annoying • It’s like retail “shrinkage” • Yes, it does cost us all • Real ID Fraud is very bad for the victim but rates are low • Medical ID Fraud can be committed without theft of your medical record • Remember the OPM breach??? • Is this the most significant breach of PII ever? • Intellectual Property • IP theft may have even greater negative impact to our economy • And what about theft of military secrets?
  • 20. Reality • If healthcare data is the most valuable, and… • Healthcare orgs have weak security, and… • Financial orgs have great security, then… • Why did the bad people hit the financial/retail industry first? • Footprint? Opportunity? • Ease of Monetization? • Volume? Tweet along: #Sec360
  • 21. Reality • Why are they hitting healthcare now? • Financial/Retail hardened their defenses? • Financial/Retail no longer interesting? • Monetization? – still hard • Volume? – fewer total records to get Tweet along: #Sec360
  • 22. Sidebar Rant – The Real Problem • Is the problem that PII gets breached? • Or… • That it’s too easy to commit ID fraud or other crimes with the data? • Can we make it harder to: • Get services • Open accounts • Masquerade … with other’s information???Tweet along: #Sec360
  • 23. Did HIPAA Help? • Initially… Yes! • Woke healthcare up • But the focus on Confidentiality is the problem • (yes, I know there’s more to it, but look at the CMS Wall of Shame) • The fines are material, but healthcare still has no excess funds! • Kick ‘em when they’re down? • So, no, HIPAA doesn’t helpTweet along: #Sec360
  • 24.
  • 25. Gimme a “C” • Do Regulations help? • Initially… Yes! – but they must keep up with the times • Security can’t be • A point solution • About one data type – PHI, CC data, FTI, etc. • Just about Confidentiality • Winter is coming! • Well, really it’s spring! • We’re already thinking about Availibility • Can you spell DDoS? • Can you spell Brickerbot? http://www.healthcareinfosecurity.com/blogs/hipaa-enforcement-look-ahead-p-2463 Tweet along: #Sec360
  • 26. What about data Integrity? • What if rather than decrypting our data for some bitcoin… • It was fix our slightly altered data for a “small consulting fee”? • Now that’s scary! Tweet along: #Sec360
  • 27. Solution #1 • Play in the same sandbox • The alphabet soup of regulations has got to go • We need a single security framework and standard that will work across all areas of critical infrastructure? • Sound familiar…? • NIST CSF – CyberSecurity Framework • History • Yes, I realize that this is very US-centric • Think globally, act locally – I can’t be responsible for all the world’s problems!Tweet along: #Sec360
  • 28. Solution #1 – NIST CSF • It maps to everything • Already directed at every critical infrastructure industry vertical • Can easily apply a maturity model • 800-53 provides the detailed standard Tweet along: #Sec360
  • 29. Solution #2 • Many organizations still need an “incentive” • Are fines useful? • Potentially • How about rather than fine organizations, force them instead to put an equivalent amount of funding into an enterprise security program! • Perhaps some fine members of the vendor community can offer holistic security services? • Maybe not Tweet along: #Sec360
  • 30. Regulations • Are they necessary? • Why can’t we solve these things ourselves? Tweet along: #Sec360
  • 31. What about 3rd party solutions and med devices? • Can’t live with ‘em, can’t live without ‘em. • The same principles stand for these providers • They must be held to the same high standard • Vulnerabilities or other issues that can weaken their customers’ security posture must be fixed • All software must be patchable • Even better – use solid, secure software engineering principles! Tweet along: #Sec360
  • 32. The Bottom Line Point solutions and regulatory compliance will never replace a holistic enterprise security program based upon a solid framework Tweet along: #Sec360
  • 33. Barry Caplin Fairview Health Services bcaplin1@fairview.org bc@bjb.org @bcaplin securityandcoffee.blogspot.com

Editor's Notes

  1. http://healthitsecurity.com/news/healthcare-data-security-incidents-second-highest-in-2016
  2. Anthem 79M; Premera 11M; Excellus 10M = 100M
  3. If your healthcare data is breached, the only thing you may die of is embarrassment!
  4. Schneier has said that regulations are the result of not solving these issues ourselves