SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
A CHIME Leadership Education and Development Forum in collaboration with iHT2
What is Cyber Security and Why is it
Crucial to Your Organization?
_______
Key Attributes for Success, Challenges and
Critical Success Factors
● Mac McMillan | FHIMSS/CISM | CEO | CynergisTek, Inc. ●
#LEAD14
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Sun Tzu & Cybercrime
“If you know the enemy, and know yourself,
then you may not fear the results of a
hundred battles. If you know yourself but
not the enemy, for every victory gained you
will suffer a defeat.”
HIMSS Cyber Security Survey
Limited Disruption to Operations
Loss of Data/Information
Significant Impact on IT Systems
Damage to IT Systems
Other Impact
62%
21%
8%
8%
7%
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Threat Actors & Their Motivation
• Organized Crime
• Hacktivists
• Cyber Thieves
• Malicious Insiders
• Careless Insiders
• Busy Insiders
• State Actors
• Financial Gain
• Intellectual Property
• Extortion
• ID/Med ID Theft
• Espionage
• Embarrassment
• Good Intentions
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Accidents, Mistakes & Deliberate Acts
• Phishing/hacking nets nearly $3M from six healthcare entities
• Vendor sells hospital’s X-rays (films) to third party
• Resident loses track of USB with over 500 orthopedic patients information
• Portable electronic device with patient data stolen from hospital
• Physician has laptop stolen from vacation home
• 2,200 physicians victims of ID theft/tax fraud
• Printers returned to leasing company compromise thousands of patient records
• Health System reports third stolen laptop with 13,000 patient records
• 400 hospitals billings delayed as clearinghouse hit with ransomware
• Children’s hospital hacked with successful DOS for three days in protest for treatment and
holding of girl by Anonymous
• Physician robbed at gun point, phone and computer taken, thief demands passwords
• International hacking group uses phishing, then steals information on almost 80M people
• Medical devices hacked to compromise hospital networks using MedJack attack
• Seven health systems hit by phishing resulting in major breaches
• New York hospital hacked by pro-ISIS supporters, website defaced with ISIS propoganda
• And, on and on it goes…
A CHIME Leadership Education and Development Forum in collaboration with iHT2
The Emergent Threat
DefCon/BlackHat 2015 Syllabus
• Medical Devices: Pawnage and Honey Pots
• Shall We Play a Game?
• USB Attack to Decrypt WiFi
• WhyMI so Sexy? WMI Attacks & Defense
• I Will Kill You
• Scared Poopless – LTE and “your” Laptop
• Confessions of a Professional Cyber Stalker
• From 0 to Pwnd – Social Engineering
• Jailbreaking & Rooting Devices
• Advanced Infrastructure Hacking
• Advanced Windows Exploitation
• Advanced Web Attacks
Significant Threats of the Future
34%
39%
49%
50%
53%
53%
59%
63%
65%
69%
Brute Force Attacks
Denial of Services (DoS)
Social Engineering Attacks
Malicious Insiders
Exploit Known Software Vulnerabilities
Zero Day Attacks
Cyber Attacks
APT Attacks
Negligent Insiders
Phishing Attacks
Challenges To Data Security
CISOComplexity
Insiders
Vendors
Mobile
Devices
mHealth
Fraud
ID Theft
Physical
Loss/Theft
Cyber
Attacks
Regulations
Staffing
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Increased Reliance
• More than 98% of all processes
are automated, more than 98%
of all devices are networkable,
more than 95% of all patient
information is digitized
• Hyper connectivity dominates
what we do
• IT systems and applications
are critical to care delivery,
business operations
• Moving to a patient centric
model will only further
complicate the enterprise
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Insider Abuse: Trust, But Verify
• It is estimated that more than half of
all security incidents involve staff.
• 51% of respondents in a SANS study
believe the negligent insider is the
chief threat.
• 37% believe that security awareness
training is ineffective.
• Traditional audit methods & manual
auditing is completely inadequate.
• Behavior modeling, pattern analysis
and anomaly detection is what is
needed.
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Questionable Supply Chains
• Better inventories of vendors w/ PHI
• Risk based approach to managing third
parties
• Greater due diligence in vetting vendors
• Security requirements in contracting
should be SLA based
• Particular attention to cloud, SaaS,
infrastructure support, critical service
providers
• Life cycle approach to data protection
• Detailed breach and termination
provisions
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Devices Threaten Safety & Information
• 2010/2011 successful hacks of an
insulin pump and ICD
• In June 2013 the DHS tested 300
devices from 40 vendors, ALL failed
• 2014 multiple variants of a popular
blood pump hacked
• 2015 MedJack hacks demonstrates
vulnerability of the network from
medical devices
• We are no closer….
“Yes, Terrorists could have
hacked Dick Cheney’s heart.”
-The Washington Post
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Malware & Persistent Threats
• 3.4 million BotNets active
• 20-40% of recipients in phishing exercises fall for
scam
• 26% of malware delivered via HTML, one in less than
300 emails infected
• Malware analyzed was found undetectable by nearly
50% of all anti-virus engines tested
• As of April 2014 Microsoft no longer provides patches
for WN XP, WN 2003 and WN 2000, NT, etc.
• EOL systems still prevalent in healthcare networks
• Hardening, patching, configuration, change
management…all critical
• Objective testing and assessment
“FBI alert warns healthcare
not prepared”
2006
200K 2008
17M
2013
73M
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Mobility & Data
• Medical staff are turning to their mobile devices to
communicate because its easier, faster, more efficient…
• Sharing lab or test results, locating another physician
for a consult, sharing images of wounds and radiology
images, updating attending staff on patient condition,
getting direction for treatment, locating a specialist
and collaborating with them, transmitting trauma
information or images to EDs, prescribing or placing
orders
• Priority placed on the data first and the device second
• Restrict physical access where possible, encrypt the
rest
A CHIME Leadership Education and Development Forum in collaboration with iHT2
ID Theft & Fraud
• Medical identity theft and fraud costs billions
each year, affecting everyone
• US CERT estimates 47% of cybercrime aimed at
healthcare
• Healthcare directed attacks have increased more
than 20% per year for the last three years
• Identity theft comes in all forms and is costly
– Insiders selling information to others
– Hackers exploiting systems
– Malware with directed payloads
– Phishing for the “big” ones
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Theft & Losses Thriving
• 68% of healthcare data breaches due to
loss or theft of assets
• 1 in 4 houses is burglarized, a B&E
happens every 9 minutes, more than
20,000 laptops are left in airports each
year…
• First rule of security: no one is immune
• 138%: the % increase in records exposed in
2013
• 6 – 10%: the average shrinkage rate for
mobile devices
• Typical assets inventories are off by 60%
“Unencrypted laptops and mobile devices
pose significant risk to the security of
patient information.” -Sue McAndrew,
OCR
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Hacking & Other Cyber Criminals
• Defenses are not keeping pace
• Three most common attacks: spear
phishing, Trojans & Malvertising
• APTs, phishing, water cooler attacks, fraud,
etc.
• Most organizations can’t detect or address
these threats effectively
• An advanced incident response capability is
required
• Results in losses of time, dollars, downtime,
reputation, litigation, etc.
• Conduct independent risk assessments
regularly
0 50 100
Organizations suffering a
targeted attack
Sophistication of attack
hardest element to defeat
No increase in budget for
defenses
Targeted Attacks
“I feel like I am a targeted class, and I
want to know what this institution is
doing about it!” -Anonymous Doctor
A CHIME Leadership Education and Development Forum in collaboration with iHT2
More Government Oversight
• OIG shifts focus to OCR, MU & Medical
Devices
• OCRs permanent audit program will resume in
FY 2015 with new capabilities
• Improvements and automation in reporting
and handling complaints
• Meaningful Use takes a step backwards with
Stage 3
• The FTC, FDA, FCC, HHS and DoJ take a more
active role in healthcare privacy and security
• States continue to create new laws
– Florida Information Protection Act
– New Jersey Health Insurers Encryption Law
When organizations tell consumers
they will protect their personal
information, the FTC can and will
take enforcement action to ensure
they live up to these promises.
A CHIME Leadership Education and Development Forum in collaboration with iHT2
CISO Needed…
• HIMSS Cyber Security survey found 52%
had a full time security person
• In a 2014 study HC CISOs gave themselves
an average maturity rating of 4.35 on a scale
of 1-7
• Many report missing critical technologies
to fight today’s threats, improving in 2015
• More than half of healthcare entities spend
less than 3% of their IT budget on data
protection, no improvement
• Focus, alignment, and staffing challenges
• Many healthcare security managers are first
timers
Healthcare finds itself in a contest for
security professionals when everyone,
both government and private sector,
need them – and the outlook is not
positive.
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Board Involvement
• 70% of Board Members feel they
understand cyber risks
• 43% of CIO/CISOs think Boards are
informed about threats to IT
• Board members do admit their knowledge
about cybersecurity is limited
• Board members and IT security need to
communicate more often
• It took major breaches like Target, Anthem
and Community Health to get the Board’s
attention
• Boards are still in the dark concerning
security risks and incidents
Barriers to Successful
Implementation of Data Security
Percent
Lack of Personnel 64%
Lack of Financial Resources 60%
Too Many Emerging/New Threats 42%
Too Many Endpoints 32%
Not Enough Cyber Threat Intelligence 28%
Too Many Applications 25%
Lack of Tools to Use/Deploy Cyber Threat Intel 20%
A CHIME Leadership Education and Development Forum in collaboration with iHT2
Healthcare’s Culture Must Change
“We are who we are, and companies are what
they are, because we want to be. If we wanted to
be different we would be about change.”
“We need CISO’s who are not afraid to be a
change agent in their institution.”
A CHIME Leadership Education and Development Forum in collaboration with iHT2
What We Can Do Together
• Actively participate in AEHIS
• Create a body of knowledge
for all
• Open and maintain a useful
dialogue
• Work on changing the
perception
Q & A
Mac McMillan
mac.mcmillan@cynergistek.com
(512) 402-8555
A CHIME Leadership Education and Development Forum in collaboration with iHT2
@mmcmillan07

Weitere ähnliche Inhalte

Was ist angesagt?

Revenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data delugeRevenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data delugeShahid Shah
 
Challenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataChallenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataCitiusTech
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front doorRyan Coleman
 
Accure ai healthcare offering v4
Accure ai healthcare offering v4Accure ai healthcare offering v4
Accure ai healthcare offering v4Accureinc
 
Big Data and Smart Healthcare
Big Data and Smart Healthcare Big Data and Smart Healthcare
Big Data and Smart Healthcare Sujan Perera
 
Big Data in Healthcare: Hype and Hope on the Path to Personalized Medicine
Big Data in Healthcare: Hype and Hope on the Path to Personalized MedicineBig Data in Healthcare: Hype and Hope on the Path to Personalized Medicine
Big Data in Healthcare: Hype and Hope on the Path to Personalized MedicineNew York eHealth Collaborative
 
Guaranteeing successful EHR implementations
Guaranteeing successful EHR implementationsGuaranteeing successful EHR implementations
Guaranteeing successful EHR implementationsShahid Shah
 
Our Journey to Release a Patient-Centric AI App to Reduce Public Health Costs
Our Journey to Release a Patient-Centric AI App to Reduce Public Health CostsOur Journey to Release a Patient-Centric AI App to Reduce Public Health Costs
Our Journey to Release a Patient-Centric AI App to Reduce Public Health CostsDatabricks
 
Cloud Computing in Health Care A game changer by Uk Anantapadmanabhan
Cloud Computing in Health Care A game changer by Uk AnantapadmanabhanCloud Computing in Health Care A game changer by Uk Anantapadmanabhan
Cloud Computing in Health Care A game changer by Uk AnantapadmanabhanApollo Hospitals Group and ATNF
 
HXR 2016: Data Insights: Mining, Modeling, and Visualizations- Niraj Katwala
HXR 2016: Data Insights: Mining, Modeling, and Visualizations- Niraj KatwalaHXR 2016: Data Insights: Mining, Modeling, and Visualizations- Niraj Katwala
HXR 2016: Data Insights: Mining, Modeling, and Visualizations- Niraj KatwalaHxRefactored
 
United States Diagnostics Market Size, Share, Trend and Forecast 2026 | TechS...
United States Diagnostics Market Size, Share, Trend and Forecast 2026 | TechS...United States Diagnostics Market Size, Share, Trend and Forecast 2026 | TechS...
United States Diagnostics Market Size, Share, Trend and Forecast 2026 | TechS...TechSci Research
 
Big implications of Big Data in healthcare
Big implications of Big Data in healthcareBig implications of Big Data in healthcare
Big implications of Big Data in healthcareGuires
 
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...Shahid Shah
 
Ai startups in healthcare By Dr.Mahboob Khan
Ai startups in healthcare By Dr.Mahboob Khan Ai startups in healthcare By Dr.Mahboob Khan
Ai startups in healthcare By Dr.Mahboob Khan Healthcare consultant
 
The biggest opportunities in digital health for Turkey's Medical Sector
The biggest opportunities in digital health  for Turkey's Medical Sector The biggest opportunities in digital health  for Turkey's Medical Sector
The biggest opportunities in digital health for Turkey's Medical Sector Shahid Shah
 
The Barriers to Military Healthcare Technology Innovation and What We Can Do ...
The Barriers to Military Healthcare Technology Innovation and What We Can Do ...The Barriers to Military Healthcare Technology Innovation and What We Can Do ...
The Barriers to Military Healthcare Technology Innovation and What We Can Do ...Shahid Shah
 

Was ist angesagt? (20)

Revenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data delugeRevenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data deluge
 
Challenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials DataChallenges and Opportunities Around Integration of Clinical Trials Data
Challenges and Opportunities Around Integration of Clinical Trials Data
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
Accure ai healthcare offering v4
Accure ai healthcare offering v4Accure ai healthcare offering v4
Accure ai healthcare offering v4
 
Big Data and Smart Healthcare
Big Data and Smart Healthcare Big Data and Smart Healthcare
Big Data and Smart Healthcare
 
Big Data in Healthcare: Hype and Hope on the Path to Personalized Medicine
Big Data in Healthcare: Hype and Hope on the Path to Personalized MedicineBig Data in Healthcare: Hype and Hope on the Path to Personalized Medicine
Big Data in Healthcare: Hype and Hope on the Path to Personalized Medicine
 
1505 lazarevi shareable
1505 lazarevi shareable1505 lazarevi shareable
1505 lazarevi shareable
 
Guaranteeing successful EHR implementations
Guaranteeing successful EHR implementationsGuaranteeing successful EHR implementations
Guaranteeing successful EHR implementations
 
Our Journey to Release a Patient-Centric AI App to Reduce Public Health Costs
Our Journey to Release a Patient-Centric AI App to Reduce Public Health CostsOur Journey to Release a Patient-Centric AI App to Reduce Public Health Costs
Our Journey to Release a Patient-Centric AI App to Reduce Public Health Costs
 
Cloud Computing in Health Care A game changer by Uk Anantapadmanabhan
Cloud Computing in Health Care A game changer by Uk AnantapadmanabhanCloud Computing in Health Care A game changer by Uk Anantapadmanabhan
Cloud Computing in Health Care A game changer by Uk Anantapadmanabhan
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
Healthcare tomorrow
Healthcare tomorrowHealthcare tomorrow
Healthcare tomorrow
 
HXR 2016: Data Insights: Mining, Modeling, and Visualizations- Niraj Katwala
HXR 2016: Data Insights: Mining, Modeling, and Visualizations- Niraj KatwalaHXR 2016: Data Insights: Mining, Modeling, and Visualizations- Niraj Katwala
HXR 2016: Data Insights: Mining, Modeling, and Visualizations- Niraj Katwala
 
United States Diagnostics Market Size, Share, Trend and Forecast 2026 | TechS...
United States Diagnostics Market Size, Share, Trend and Forecast 2026 | TechS...United States Diagnostics Market Size, Share, Trend and Forecast 2026 | TechS...
United States Diagnostics Market Size, Share, Trend and Forecast 2026 | TechS...
 
Big implications of Big Data in healthcare
Big implications of Big Data in healthcareBig implications of Big Data in healthcare
Big implications of Big Data in healthcare
 
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
Med Device Vendors Have Big Opportunities in Health IT Software, Services, an...
 
Ai startups in healthcare By Dr.Mahboob Khan
Ai startups in healthcare By Dr.Mahboob Khan Ai startups in healthcare By Dr.Mahboob Khan
Ai startups in healthcare By Dr.Mahboob Khan
 
The biggest opportunities in digital health for Turkey's Medical Sector
The biggest opportunities in digital health  for Turkey's Medical Sector The biggest opportunities in digital health  for Turkey's Medical Sector
The biggest opportunities in digital health for Turkey's Medical Sector
 
The Barriers to Military Healthcare Technology Innovation and What We Can Do ...
The Barriers to Military Healthcare Technology Innovation and What We Can Do ...The Barriers to Military Healthcare Technology Innovation and What We Can Do ...
The Barriers to Military Healthcare Technology Innovation and What We Can Do ...
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 

Andere mochten auch

CV Eren Duru
CV Eren DuruCV Eren Duru
CV Eren DuruEren Duru
 
Tema 9 Cono
Tema 9 ConoTema 9 Cono
Tema 9 Cono3sanagus
 
29 anos de cumplicidade
29 anos de cumplicidade29 anos de cumplicidade
29 anos de cumplicidadeCláudia Nunes
 
Employer brand not_optional-upload
Employer brand not_optional-uploadEmployer brand not_optional-upload
Employer brand not_optional-uploadMot Juste
 
Директива 2014/32/EU: «Измерительные приборы»
Директива 2014/32/EU: «Измерительные приборы»Директива 2014/32/EU: «Измерительные приборы»
Директива 2014/32/EU: «Измерительные приборы»Volodymyr Holomb
 
Formas de dominio en el México Prehispánico
Formas de dominio en el México PrehispánicoFormas de dominio en el México Prehispánico
Formas de dominio en el México PrehispánicoTania Lomeli
 
Fall_2016_Sweater-Knit_Linesheets_part2
Fall_2016_Sweater-Knit_Linesheets_part2Fall_2016_Sweater-Knit_Linesheets_part2
Fall_2016_Sweater-Knit_Linesheets_part2Mehtab Badwal
 

Andere mochten auch (10)

CV Eren Duru
CV Eren DuruCV Eren Duru
CV Eren Duru
 
Invitation
InvitationInvitation
Invitation
 
Netiqueta
NetiquetaNetiqueta
Netiqueta
 
Tema 9 Cono
Tema 9 ConoTema 9 Cono
Tema 9 Cono
 
29 anos de cumplicidade
29 anos de cumplicidade29 anos de cumplicidade
29 anos de cumplicidade
 
Śniadanie Daje Moc
Śniadanie Daje MocŚniadanie Daje Moc
Śniadanie Daje Moc
 
Employer brand not_optional-upload
Employer brand not_optional-uploadEmployer brand not_optional-upload
Employer brand not_optional-upload
 
Директива 2014/32/EU: «Измерительные приборы»
Директива 2014/32/EU: «Измерительные приборы»Директива 2014/32/EU: «Измерительные приборы»
Директива 2014/32/EU: «Измерительные приборы»
 
Formas de dominio en el México Prehispánico
Formas de dominio en el México PrehispánicoFormas de dominio en el México Prehispánico
Formas de dominio en el México Prehispánico
 
Fall_2016_Sweater-Knit_Linesheets_part2
Fall_2016_Sweater-Knit_Linesheets_part2Fall_2016_Sweater-Knit_Linesheets_part2
Fall_2016_Sweater-Knit_Linesheets_part2
 

Ähnlich wie 2015 Atlanta CHIME Lead Forum

CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...Health IT Conference – iHT2
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...Health IT Conference – iHT2
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...Health IT Conference – iHT2
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...Health IT Conference – iHT2
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...Levi Shapiro
 
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?Diaspark
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdframsetl
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityStephen Cobb
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and SecurityPYA, P.C.
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trendsDImension Data
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...Health IT Conference – iHT2
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 

Ähnlich wie 2015 Atlanta CHIME Lead Forum (20)

CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
CHIME LEAD San Francisco 2015 - Opening Keynote "What is Cyber Security and W...
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
 
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Using Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 

Mehr von Health IT Conference – iHT2

Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly HillsWelcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly HillsHealth IT Conference – iHT2
 

Mehr von Health IT Conference – iHT2 (19)

2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum2015 Houston CHIME Lead Forum
2015 Houston CHIME Lead Forum
 
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015iHT2 Health IT Beverly Hills Summit - 2015
iHT2 Health IT Beverly Hills Summit - 2015
 
Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly HillsWelcome and Opening Remarks - 2015 iHT2 Beverly Hills
Welcome and Opening Remarks - 2015 iHT2 Beverly Hills
 
iHT2 Health IT Chicago Summit
iHT2 Health IT Chicago SummitiHT2 Health IT Chicago Summit
iHT2 Health IT Chicago Summit
 
iHT2 Health IT Chicago Summit
iHT2 Health IT Chicago SummitiHT2 Health IT Chicago Summit
iHT2 Health IT Chicago Summit
 
iHT2 Health IT Chicago Summit
iHT2 Health IT Chicago SummitiHT2 Health IT Chicago Summit
iHT2 Health IT Chicago Summit
 
iHT2 Health IT Chicago Summit
iHT2 Health IT Chicago SummitiHT2 Health IT Chicago Summit
iHT2 Health IT Chicago Summit
 
CHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYCCHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYC
 
CHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYCCHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYC
 
CHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYCCHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYC
 
CHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYCCHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYC
 
CHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYCCHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYC
 
CHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYCCHIME Lead Forum 2015 - NYC
CHIME Lead Forum 2015 - NYC
 

Kürzlich hochgeladen

Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...High Profile Call Girls Chandigarh Aarushi
 
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service GoaRussian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goanarwatsonia7
 
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service HyderabadVIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...High Profile Call Girls Chandigarh Aarushi
 
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service HyderabadCall Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Russian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availableRussian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availablesandeepkumar69420
 
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...delhimodelshub1
 
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts ServiceCall Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Servicenarwatsonia7
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbaisonalikaur4
 
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...narwatsonia7
 
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsBook Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsCall Girls Noida
 
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door ModelCall Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door ModelCall Girls Lucknow
 
Call Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any TimeCall Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any Timedelhimodelshub1
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsHelenBevan4
 

Kürzlich hochgeladen (20)

Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
 
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service GoaRussian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
Russian Call Girls in Goa Samaira 7001305949 Independent Escort Service Goa
 
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service HyderabadVIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
 
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Saloni 9907093804 Independent Escort Service Hyd...
 
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
 
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service HyderabadCall Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
Call Girl Hyderabad Madhuri 9907093804 Independent Escort Service Hyderabad
 
Russian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service availableRussian Escorts Delhi | 9711199171 | all area service available
Russian Escorts Delhi | 9711199171 | all area service available
 
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
hyderabad call girl.pdfRussian Call Girls in Hyderabad Amrita 9907093804 Inde...
 
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
 
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts ServiceCall Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
Call Girl Service ITPL - [ Cash on Delivery ] Contact 7001305949 Escorts Service
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
 
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service MumbaiCollege Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
College Call Girls Mumbai Alia 9910780858 Independent Escort Service Mumbai
 
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
 
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service DehradunCall Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
 
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsBook Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
 
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door ModelCall Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
Call Girls in Adil Nagar 7001305949 Free Delivery at Your Door Model
 
Call Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any TimeCall Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any Time
 
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
 
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
 
Leading transformational change: inner and outer skills
Leading transformational change: inner and outer skillsLeading transformational change: inner and outer skills
Leading transformational change: inner and outer skills
 

2015 Atlanta CHIME Lead Forum

  • 1. A CHIME Leadership Education and Development Forum in collaboration with iHT2 What is Cyber Security and Why is it Crucial to Your Organization? _______ Key Attributes for Success, Challenges and Critical Success Factors ● Mac McMillan | FHIMSS/CISM | CEO | CynergisTek, Inc. ● #LEAD14
  • 2. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Sun Tzu & Cybercrime “If you know the enemy, and know yourself, then you may not fear the results of a hundred battles. If you know yourself but not the enemy, for every victory gained you will suffer a defeat.”
  • 3. HIMSS Cyber Security Survey Limited Disruption to Operations Loss of Data/Information Significant Impact on IT Systems Damage to IT Systems Other Impact 62% 21% 8% 8% 7%
  • 4. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Threat Actors & Their Motivation • Organized Crime • Hacktivists • Cyber Thieves • Malicious Insiders • Careless Insiders • Busy Insiders • State Actors • Financial Gain • Intellectual Property • Extortion • ID/Med ID Theft • Espionage • Embarrassment • Good Intentions
  • 5. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Accidents, Mistakes & Deliberate Acts • Phishing/hacking nets nearly $3M from six healthcare entities • Vendor sells hospital’s X-rays (films) to third party • Resident loses track of USB with over 500 orthopedic patients information • Portable electronic device with patient data stolen from hospital • Physician has laptop stolen from vacation home • 2,200 physicians victims of ID theft/tax fraud • Printers returned to leasing company compromise thousands of patient records • Health System reports third stolen laptop with 13,000 patient records • 400 hospitals billings delayed as clearinghouse hit with ransomware • Children’s hospital hacked with successful DOS for three days in protest for treatment and holding of girl by Anonymous • Physician robbed at gun point, phone and computer taken, thief demands passwords • International hacking group uses phishing, then steals information on almost 80M people • Medical devices hacked to compromise hospital networks using MedJack attack • Seven health systems hit by phishing resulting in major breaches • New York hospital hacked by pro-ISIS supporters, website defaced with ISIS propoganda • And, on and on it goes…
  • 6. A CHIME Leadership Education and Development Forum in collaboration with iHT2 The Emergent Threat DefCon/BlackHat 2015 Syllabus • Medical Devices: Pawnage and Honey Pots • Shall We Play a Game? • USB Attack to Decrypt WiFi • WhyMI so Sexy? WMI Attacks & Defense • I Will Kill You • Scared Poopless – LTE and “your” Laptop • Confessions of a Professional Cyber Stalker • From 0 to Pwnd – Social Engineering • Jailbreaking & Rooting Devices • Advanced Infrastructure Hacking • Advanced Windows Exploitation • Advanced Web Attacks
  • 7. Significant Threats of the Future 34% 39% 49% 50% 53% 53% 59% 63% 65% 69% Brute Force Attacks Denial of Services (DoS) Social Engineering Attacks Malicious Insiders Exploit Known Software Vulnerabilities Zero Day Attacks Cyber Attacks APT Attacks Negligent Insiders Phishing Attacks
  • 8. Challenges To Data Security CISOComplexity Insiders Vendors Mobile Devices mHealth Fraud ID Theft Physical Loss/Theft Cyber Attacks Regulations Staffing
  • 9. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Increased Reliance • More than 98% of all processes are automated, more than 98% of all devices are networkable, more than 95% of all patient information is digitized • Hyper connectivity dominates what we do • IT systems and applications are critical to care delivery, business operations • Moving to a patient centric model will only further complicate the enterprise
  • 10. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Insider Abuse: Trust, But Verify • It is estimated that more than half of all security incidents involve staff. • 51% of respondents in a SANS study believe the negligent insider is the chief threat. • 37% believe that security awareness training is ineffective. • Traditional audit methods & manual auditing is completely inadequate. • Behavior modeling, pattern analysis and anomaly detection is what is needed.
  • 11. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Questionable Supply Chains • Better inventories of vendors w/ PHI • Risk based approach to managing third parties • Greater due diligence in vetting vendors • Security requirements in contracting should be SLA based • Particular attention to cloud, SaaS, infrastructure support, critical service providers • Life cycle approach to data protection • Detailed breach and termination provisions
  • 12. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Devices Threaten Safety & Information • 2010/2011 successful hacks of an insulin pump and ICD • In June 2013 the DHS tested 300 devices from 40 vendors, ALL failed • 2014 multiple variants of a popular blood pump hacked • 2015 MedJack hacks demonstrates vulnerability of the network from medical devices • We are no closer…. “Yes, Terrorists could have hacked Dick Cheney’s heart.” -The Washington Post
  • 13. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Malware & Persistent Threats • 3.4 million BotNets active • 20-40% of recipients in phishing exercises fall for scam • 26% of malware delivered via HTML, one in less than 300 emails infected • Malware analyzed was found undetectable by nearly 50% of all anti-virus engines tested • As of April 2014 Microsoft no longer provides patches for WN XP, WN 2003 and WN 2000, NT, etc. • EOL systems still prevalent in healthcare networks • Hardening, patching, configuration, change management…all critical • Objective testing and assessment “FBI alert warns healthcare not prepared” 2006 200K 2008 17M 2013 73M
  • 14. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Mobility & Data • Medical staff are turning to their mobile devices to communicate because its easier, faster, more efficient… • Sharing lab or test results, locating another physician for a consult, sharing images of wounds and radiology images, updating attending staff on patient condition, getting direction for treatment, locating a specialist and collaborating with them, transmitting trauma information or images to EDs, prescribing or placing orders • Priority placed on the data first and the device second • Restrict physical access where possible, encrypt the rest
  • 15. A CHIME Leadership Education and Development Forum in collaboration with iHT2 ID Theft & Fraud • Medical identity theft and fraud costs billions each year, affecting everyone • US CERT estimates 47% of cybercrime aimed at healthcare • Healthcare directed attacks have increased more than 20% per year for the last three years • Identity theft comes in all forms and is costly – Insiders selling information to others – Hackers exploiting systems – Malware with directed payloads – Phishing for the “big” ones
  • 16. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Theft & Losses Thriving • 68% of healthcare data breaches due to loss or theft of assets • 1 in 4 houses is burglarized, a B&E happens every 9 minutes, more than 20,000 laptops are left in airports each year… • First rule of security: no one is immune • 138%: the % increase in records exposed in 2013 • 6 – 10%: the average shrinkage rate for mobile devices • Typical assets inventories are off by 60% “Unencrypted laptops and mobile devices pose significant risk to the security of patient information.” -Sue McAndrew, OCR
  • 17. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Hacking & Other Cyber Criminals • Defenses are not keeping pace • Three most common attacks: spear phishing, Trojans & Malvertising • APTs, phishing, water cooler attacks, fraud, etc. • Most organizations can’t detect or address these threats effectively • An advanced incident response capability is required • Results in losses of time, dollars, downtime, reputation, litigation, etc. • Conduct independent risk assessments regularly 0 50 100 Organizations suffering a targeted attack Sophistication of attack hardest element to defeat No increase in budget for defenses Targeted Attacks “I feel like I am a targeted class, and I want to know what this institution is doing about it!” -Anonymous Doctor
  • 18. A CHIME Leadership Education and Development Forum in collaboration with iHT2 More Government Oversight • OIG shifts focus to OCR, MU & Medical Devices • OCRs permanent audit program will resume in FY 2015 with new capabilities • Improvements and automation in reporting and handling complaints • Meaningful Use takes a step backwards with Stage 3 • The FTC, FDA, FCC, HHS and DoJ take a more active role in healthcare privacy and security • States continue to create new laws – Florida Information Protection Act – New Jersey Health Insurers Encryption Law When organizations tell consumers they will protect their personal information, the FTC can and will take enforcement action to ensure they live up to these promises.
  • 19. A CHIME Leadership Education and Development Forum in collaboration with iHT2 CISO Needed… • HIMSS Cyber Security survey found 52% had a full time security person • In a 2014 study HC CISOs gave themselves an average maturity rating of 4.35 on a scale of 1-7 • Many report missing critical technologies to fight today’s threats, improving in 2015 • More than half of healthcare entities spend less than 3% of their IT budget on data protection, no improvement • Focus, alignment, and staffing challenges • Many healthcare security managers are first timers Healthcare finds itself in a contest for security professionals when everyone, both government and private sector, need them – and the outlook is not positive.
  • 20. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Board Involvement • 70% of Board Members feel they understand cyber risks • 43% of CIO/CISOs think Boards are informed about threats to IT • Board members do admit their knowledge about cybersecurity is limited • Board members and IT security need to communicate more often • It took major breaches like Target, Anthem and Community Health to get the Board’s attention • Boards are still in the dark concerning security risks and incidents
  • 21. Barriers to Successful Implementation of Data Security Percent Lack of Personnel 64% Lack of Financial Resources 60% Too Many Emerging/New Threats 42% Too Many Endpoints 32% Not Enough Cyber Threat Intelligence 28% Too Many Applications 25% Lack of Tools to Use/Deploy Cyber Threat Intel 20%
  • 22. A CHIME Leadership Education and Development Forum in collaboration with iHT2 Healthcare’s Culture Must Change “We are who we are, and companies are what they are, because we want to be. If we wanted to be different we would be about change.” “We need CISO’s who are not afraid to be a change agent in their institution.”
  • 23. A CHIME Leadership Education and Development Forum in collaboration with iHT2 What We Can Do Together • Actively participate in AEHIS • Create a body of knowledge for all • Open and maintain a useful dialogue • Work on changing the perception
  • 24. Q & A Mac McMillan mac.mcmillan@cynergistek.com (512) 402-8555 A CHIME Leadership Education and Development Forum in collaboration with iHT2 @mmcmillan07