Healthcare Information Security: What Healthcare

Healthcare Information Security: What Healthcare Executives Need to Know Russell Branzell, CHCIO, FCHIME, FACHE President and CEO College of Healthca...
Author: Amice Beasley
8 downloads 3 Views 3MB Size
Healthcare Information Security: What Healthcare Executives Need to Know

Russell Branzell, CHCIO, FCHIME, FACHE President and CEO College of Healthcare Information Management Executives AHA/Health Forum Leadership Summit, July 18, 2016

AEHIA, AEHIS and AEHIT were formed in 2014 with the goal of spreading professional development and best practices across the health IT landscape. Each association focuses on the unique needs of these roles while emphasizing the common skill of leadership that unites them.

Senior leaders in healthcare IT APPLICATIONS

Senior leaders in healthcare IT SECURITY

Senior leaders in healthcare IT TECHNOLOGY

threatmap.fortiguard.com

More than 98% of all processes are automated, more than 98% of all devices are networkable, more than 95% of patient information is digitized and accountable care/patient engagement rely on it.

Any outage, corruption of data, loss of information risks patient safety and care. Physician Alignment

BYOD

MU

Research Telemedicine

BAs

Patient Engage-ment HIPAA/HITEC H

HIEs ACOs

ICD-10 FISMA

&

Black markets will help attackers outpace defenders • Darknets will be more active, participants will be vetted, cryptocurrencies will be used, greater anonymity in malware, more encryption in communications and transactions • Hyperconnectivity will create greater opportunity for incidents • Exploitation of social networks and mobile devices will grow • More hacking for hire, as-a-service, and brokering RAND Corporation 2014

• 12 year old learning computers in middle school

• 28 year old in Oregon who believes in hacktivism

• 14 year old home schooled girl tired of social events

• 30 year old white hat who has a black hat background

• 15 year old in New Zealand just joined a defacement group • 32 year old researcher who finds vulnerabilities in systems • 16 year old in Tokyo learning programming in high school

• 35 year old employee who sees a target of opportunity

• 19 year old in college putting course work to work

• 37 year old rogue intelligence officer

• 20 year old fast food employee that is bored

• 39 year old disgruntled admin passed over

• 22 year old in Mali working in a carding ring

• 41 year old private investigator

• 24 year old black hat trying to hack whoever he can

• 44 year old malware author paid per compromised host

• 25 year old soldier in East European country

• 49 year old pharmacist in midlife crisis

• 26 year old contractor deployed over seas

• 55 year old nurse with a drug problem

• Theft - fraud & loss: nearly half of all breaches involve some form of theft or loss of a device not properly protected • Insider abuse: Nearly 15% of breaches in healthcare are carried out by knowledgeable insiders for identity theft or some form of fraud • Unintentional action: Almost 12% of breaches are caused by mistakes or unintentional actions such as improper mailings, errant emails, or facsimiles • Cyber attacks: There was almost a doubling of these types of attacks in 2014 • And, there are many, many others ….. Verizon 2014 Data Breach Investigations Report

& • Medical identity theft and fraud costs billions each year, affecting everyone • Healthcare directed attacks have increased more than 20% per year for the last three years • Identity theft comes in all forms and is costly – – – –

Insiders selling information to others Hackers exploiting systems Malware with directed payloads Phishing for the “big” ones

& • 68% of healthcare data breaches due to loss or theft of assets • 1 in 4 houses is burglarized, a B&E happens every 9 minutes, more than 20,000 laptops are left in airports each year….… • First rule of security: no one is immune • 138%: The % increase in records exposed in 2013 • 6 – 10%: The average shrinkage rate for mobile devices • Typical assets inventories are off by 60% “Unencrypted laptops and mobile devices pose significant risk to the security of patient information.” -Sue McAndrew, OCR

: , • It is estimated that more than half of all security incidents involve staff • 51% of respondents in a SANS study believe the negligent insider is the chief threat • 37% believe that security awareness training is ineffective. • Traditional audit methods & manual auditing is completely inadequate • Behavior modeling, pattern analysis and anomaly detection is what is needed

? • Most cybersecurity insurance only covers a fraction of large breach costs

• Insurance providers are looking to increase premiums and enhance underwriting provisions to avoid losses associated with large incidents • Additional exclusionary language • Right to investigate independently • Columbia Casualty vs. Cottage Health System

Discovery, Notification & Response

Civil Penalties

Criminal Penalties

VBP Payments Impacts

Business Disruption

Federal CAP/RA

Insurance

HCAPPS Score Impacts

ID Theft Monitoring

State Actions

Degradation of Brand/Image

Patient Confidence/Loyalty

Investigation/Review

Law Suit Defense

Distraction of Staff

Physician Alignment/Nurses and Staff Agreement

Lack of qualified personnel Lack of financial resources Volume and expanding types of threats Not enough cyber threat intelligence Too many software applications, devices, network touch points • Lack of effective tools • • • • •

• HC CISOs gave themselves an average maturity rating of 4.35 on a scale of 1-7 • Missing critical technologies to fight today’s threats • More than half spend less than 3% of their IT budget on protecting data • Almost half have a full time CISO or information security manager

• Implement continuous program of risk assessment and management

• Increase knowledge of threat actors • Maintain current environment • Improve detection and reaction capabilities • Implement data exfiltration controls • Enhance user education and accountability • Implement active vendor security management • Address long term challenges around medical devices • Plan for incidents

70% of Board Members feel they understand cyber risks 43% of CIO/CISOs think Boards are informed about threats to IT Board members do admit limited knowledge about cybersecurity Board members and IT security need to communicate more often It took major breaches like Target, Anthem and Community Health to get the Board’s attention • Boards are still in the dark concerning security risks and incidents • • • • •

… Be a leader Possess business acumen Be comfortable managing risk Be a team player Plan ahead Be an effective communication Understand and apply psychology/sociology • Be politically savvy • • • • • • •

Know privacy and security – its everyone’s job.

• Actively participate in the industry • Open and maintain a useful dialogue • Work on expanding awareness and education • Change perception

/ • Forester Research

• Symantec

• Fortinet

• Verizon 2014 Data Breach Investigations Report • Mac McMillan, CISM, CEO, CynergisTek, Inc.

• IBM • Ponemon Institute • RAND Corporation 2014 • Solutionary Annual Threat Reports

Healthcare Information Security: What Healthcare Executives Need to Know

Russell Branzell, CHCIO, FCHIME, FACHE President and CEO College of Healthcare Information Management Executives AHA/Health Forum Leadership Summit, July 18, 2016

Suggest Documents