tcs cybersecurity for healthcare
DESCRIPTION
Nearly one in five healthcare CIOs have had a security breach within the past 12 months. Learn how TCS can help you keep sensitive patient data secure and protected.TRANSCRIPT
TCS Cybersecurity for H lthHealthcare
Securing and Protecting Patient Data
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
State of Cybersecurity and Healthcare
» Nearly one in five healthcare yCIOs have had a security breach within the past 12 months -McKesson
» The number of health data breaches is growing with the push to electronic records, and increasingly thieves areand increasingly thieves are targeting their attacks
» 94% of health care i i h h dorganizations have had at
least one breach in the previous two years
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
2
State of Cybersecurity and Healthcare
» Health data is targeted for the value it holds and the ease with which hackers can gain access to it.
» While there are still plenty of breaches occurring due to lost or stolen laptops, many instances of data loss or exposure are no accident – they are a result of malicious attacks.
94% of health care organizations have had at least one breach in the previous two years
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
3
previous two years
State of Cybersecurity and Healthcare
» Hackers often are more interested in financial information they can use in identity theft and other fraud schemes.
» Healthcare data generally goes for $50 per record on the black market and thieves increasingly will sit on stolen data for some length of time before trying to sell or access it. That, he added, means that organizations need
l l hto implement response plans that include long-term diligence and monitoring.
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
4
State of Cybersecurity and Healthcare
» Too many organizations rely too heavily on technology to y g y y gyprotect their data rather than focusing on how they can use the technology correctly and training employees to be better stewards of the data.
» They also need to be vigilant in training business associates, who will be subject to the same HIPPA , jregulations as providers starting in September 2013.
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
5
State of Cybersecurity and Healthcare
» Of the 131 data breaches reported to the CA Attorney General’s» Of the 131 data breaches reported to the CA Attorney General s office in 2012, 55% were intentional intrusions by outsiders or by unauthorized insiders. The other 45% were mostly the result of failures to adopt or carry out appropriate security measures. o a u es o adop o ca y ou app op a e secu y easu es
» The health care industry had the third most-reported incidents at 15%at 15%.
Breach report by California Attorney General Kamala Harris
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
6
State of Cybersecurity and Healthcare
Another new potential source of breaches are the statewide» Another new potential source of breaches are the statewide health information exchanges that were funded under the Health Information Technology for Economic and Clinical Health Act, because many are short on cash and might not have the meansbecause many are short on cash and might not have the means to protect their data from all targets.
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
7
TCS Cyber Solutions
TCS is at the forefront of developing and deploying leading technologies, and on the frontlines of protecting against advanced persistent threats.
We operate in mission critical environments where success is measured in lives saved, and operational excellence is achieved by reducing downtime to
minutes per year. Our cyber solutions group leverages these capabilities to p y y g p g pprovide elite cyber protection for your
most critical assets.
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
8
TCS Cyber Solutions: ESP
TCS created Enterprise Security and ProtectionTCS created Enterprise Security and Protection (ESP) as an integrated, end-to-end suite of scalable security applications and services to safeguard corporate networks from risk.co po a e e o s o sOur approach is based on:» 10 years supporting DoD» 25 years experience supporting industry» 25 years experience supporting industry» The 20 Critical Security Controls
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
9
TCS Cyber Solutions: ESP
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
10
ESP Assessment
Tailored security analysis based on corporate presenceTailored security analysis based on corporate presence, posture and risk:
» Information Security» Physical Security» Network Security» Wireless SecurityWireless Security» Regulatory Compliance» User Policy» Map of Vulnerabilities» Map of Vulnerabilities
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
11
ESP Validation
Examines the ability of a system to endure deliberate malicious attemptsto compromise security
Assessment DescriptionOpen Source Gather all publicly available information on the customerGather all publicly available information on the customer
Organization structureOrganization structure SubsidiariesSubsidiaries
» Open Source Evaluation» Network Discovery» Penetration Tests
Clients/partnersClients/partners Network blocksNetwork blocks PersonnelPersonnel Social networkingSocial networking BlogsBlogs
Network Discovery Identify publicly available hosts (Internet Protocols [IPs])Identify publicly available hosts (Internet Protocols [IPs])» Penetration Tests» “White Box” Testing
et o sco e y y p y ( [ ])y p y ( [ ]) Identify available ports on identified hostsIdentify available ports on identified hosts Identify application versions on portsIdentify application versions on ports Identify security mechanisms and locationsIdentify security mechanisms and locations
Penetration Testing Identify vulnerabilities in identified applicationsIdentify vulnerabilities in identified applications Attempt exploitation of vulnerabilitiesAttempt exploitation of vulnerabilities
Social engineeringSocial engineering Targeted phishingTargeted phishing Structured Query Language (SQL) injectionStructured Query Language (SQL) injection CrossCross‐‐Site Scripting (XSS)Site Scripting (XSS)
Upon successful exploitation, establish covert presence on Upon successful exploitation, establish covert presence on vulnerable hostvulnerable host
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
12
vulnerable hostvulnerable host
ESP Validation
DeliverablesDeliverables» Open Source Report» Network Reconnaissance
R tReport» Exploitation Report» Impact Report» Recommendations Deliverable
Deliverable Contents
Open Source Report (Appendix A)
Open source view of corporation; preliminary network map.
Network Reconnaissance
Discovered IPs, operating systems, installed applications, security devices.Reconnaissance
Report (Appendix B)installed applications, security devices.
Exploitation Report (Appendix C)
Captured IPs; established presence in network; significant accesses acquired.
Impact Report (Appendix D)
Information retrieved through access.
Final Assessment All previous information as well as
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
13
Final Assessment Report
All previous information as well as recommended actions to further secure network.
ESP Training
Cyber security training suite for IT security personnel» Offensive mindset to security training» Hands-on, practical application focused» Training where and when you need it» Training where and when you need it» Modular in design
Subjects includeS it A T i i» Security Awareness Training
» Penetration Testing» Intrusion Detection» Reverse Engineering » Information Assurance» Forensics
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2
14
» Forensics » Custom Client Courses
Thank you!
Christina Wiegand410-280-4931
www.telecomsys.com
275 West StreetAnnapolis, MD 21401
©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2©2013, TeleCommunication Systems, Inc. (TCS). Proprietary Level 2