250 likes | 402 Views
Real Threats, Real Solutions: Data Loss Prevention. Conflict of Interest Disclosure Sadik Al-Abdulla Has no real or apparent conflicts of interest to report. Brian Comp Has no real or apparent conflicts of interest to report. Presentation Objectives.
E N D
Real Threats, Real Solutions: Data Loss Prevention
Conflict of Interest Disclosure Sadik Al-Abdulla Has no real or apparent conflicts of interest to report. Brian Comp Has no real or apparent conflicts of interest to report.
Presentation Objectives Identify real, viable solutions and steps needed to invest in data loss prevention technologies Outline recent advances in data loss prevention technologies Identify key techniques for securing buy-in from senior leadership Define theReturn on Investment needed to implement data loss prevention parameters within technology infrastructures
Every Day In Your Organization… Just Like This – A Nurse Manager has a big presentation and takes a series of screenshot images and puts them into PPT. Unfortunately, the images inserted into the presentation contain PHI The “thumb-drive nightmare” – A disgruntled employee decides to copy a census report to a thumb drive and shows just how easy it is to take PHI out of the system The Enemy is Us – An IS support person is having some technical problems with a system and needs to send sample data to the vendor for support. The file is too big for e-mail so they upload a census file to FTP and successfully send the (real life) sample data that way
So Far This Year… ID 3340: Breach of E-mail Hack Date: 1/13/11 Records Lost: 1,800 Location: Indianapolis, IN Organizations: Hospital ID 3331: Sensitive Information Posted to the Web Accident Date: 1/4/11 Records Lost: 1,086 Location: Lemoyne, PA Organizations: Health system, Medical Transcription Service ID 3330: Hacker Gains Access to File Server Hack Date: 1/4/11 Records Lost: 1,000 Location: Germantown, MD Organizations: Physician Practice Source: datalosscb.com
The Threat is Very, Very Real ID 1854: Portable Drive Exposes 280,000 Patients Lost Date: 10/20/10 Records Lost: 280k Location: Philadelphia, PA Data:Names, Addresses, Birth Dates, Social Security Numbers ID 1821: Employee Walks Out with 30 Patient Identities to Sell Fraud Date: 10/18/10 Records Lost: 30 Location: Milwaukee, WI Data:Names, Birth Dates, Social Security Numbers ID 1797: Document Posted to Web Contains 3000 Patient IDs Accident Date: 10/16/10 Records Lost: 3000 Location: Socorro, NM Data:Names, Birth Dates, Social Security Numbers ID 1789: Hacker Steals 100k+ Patient Records Hack Date: 10/15/10 Records Lost: 106k Location: Jacksonville, FL Data:Names, Birth Dates, Social Security Numbers Source: datalossdb.org
Regulatory Environment Now Has Teeth HIPAA – Policy layer and necessary standards HIPAA – Policy layer and necessary standards • Defines 18 identifiers for special treatment as Protected Health Information • Security standards rule issued February 2003 with compliance by April 2005/2006 • Enforcement rule sets civil monetary penalties for HIPAA violations – March 2006 • Defines 18 identifiers for special treatment as Protected Health Information • Defines 18 identifiers for special treatment as Protected Health Information ARRA – Incentives for organizations to ensure HIPAA standards • Section 3014 grants for improving the security of exchanged health information HITECH – Penalties for failing to meet HIPAA standards • Extension of civil and criminal penalties (Fines capped at $1.5 million) • Breach notification requirements (FTC and HHS rules August 2009) • State Attorneys General are enforcing (either via HITECH or state laws): • Connecticut AG sues insurance company, wins multi-million dollar settlement • Indiana AG sues insurer for $300k
Data Loss Vectors 2010 Ponemon Institute Study Broken Business Processes • 88% of breaches caused by insiders and partners: • Mistakes handling data • Broken business processes • 81% of organizations breached were NOT PCI Compliant: • … vs 92% who ‘were compliant’ prior to the breach • ….vs 19% who were! Regulated Patient Health Information External Threats Internal Threats Expanding Network Perimeter Average cost of a breach: $6.7M
Technology Tools – Data at Rest Records on Open Share • Technology Tools • Solution 1: Encrypted Storage • Solution 2: Encrypted Backups • Solution 3: Data Loss Prevention – Data At Rest • Solution 4: Digital Rights Management
Technology Tools – Data in Motion I’ll Just Reply-all….OOPS • Technology Tools • Solution 1: Encrypted E-mail Gateway • Solution 2: Web Security Filters • Solution 3: Data Loss Prevention – Data In Motion
Technology Tools – Endpoint Storage File -> Save As… • Technology Tools • Solution 1: Full Disk Encryption • Solution 2: Endpoint Security • Solution 3: Endpoint Data Loss Prevention
Technology Tools – Endpoint Storage File -> Save As… • Technology Tools • Solution 1: Full Disk Encryption • Solution 2: Endpoint Security • Solution 3: Endpoint Data Loss Prevention
Technology Tools – USB Ports Off With Their Thumbs • Technology Tools • Solution 1: Block / Remove USB ports via Security Software • Solution 2: … or Endpoint Data Loss Prevention
Technology Tools – Web-based Mail/Storage PHI Sent By Webmail • Technology Tools • Solution 1: Web Security Gateways • Solution 2: Data Loss Prevention – Data in Motion
Revenue Operating Expense Operational Risk Understanding Business Priorities $ Time 15
Making the Internal Sell Define the Business Problem Build Key Stakeholder Group Deliver No-cost Progress Demonstrate the Business Value Validate with Third-party Sources 16
A Model for Return on Investment Likelihood Cost Analyses Investment Scenarios 77% Scenario 1 Fines 21% Solution One Legal 64% Scenario 2 7% Brand Solution Two 56% Fixes Scenario 3 0% 17
Solving The Problem • Don’t underestimate your exposure– Get an objective security assessment to identify your vulnerabilities, “warts and all” • Make security an ongoing priority– Appoint an internal or external resource dedicated to monitoring and managing security issues to keep current (Make sure that the appointed resource reports to someone who needs the independent interpretation) • Collaboration is key– Security affects everyone; involve key stakeholders inside and outside of the IT department • Invest wisely– And consistently in security technologies based managing the actual risks you face 18
Solving the Problem – A System of Change Define Information and Policies Establish A Baseline 100% Remediate Open Issues 80% 60% 60% Notify Users 40% 40% 20% 20% 20% Prevention 19
Solving the Problem Step 1: Define • No brainers: CC#, SS#, PHI • What else? • HR records • Grant information • Study results • Other unstructured data • Messaging and communication systems • ... MUST discuss outside of IT
Solving the Problem Step 2: Baseline • Measure environment against definition using presence and awareness as the key metrics • Perform root cause analysis: • Identify broken processes • Identify where PHI or sensitive data resides • Identify major user education gaps • Identify missing protections
Solving the Problem Step 3: Remediate Begin by classifying data Establish the appropriate protections Organize your data appropriately Change identified processes
Solving the Problem Step 4: Educate Revisit data security policies Develop an education program 2nd tier education to most highly effected Automate real-time notifications
Solving the Problem Step 5: Prevent Leverage administrative controls Continuously educate users Audit user processes Establish technical controls to block breaches
Brian Comp Chief Technology Officer, Information Services Brian.Comp@orlandohealth.com Sadik Al-Abdulla Security Solutions Manager Sadik.al-abdulla@cdw.com