Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH Today’s Presentation Introduction Governance Cyber Risk Remediation Strategies – Passwords – Phishing – Security Updates Incident Response Challenge Summary Definitions Information Security – The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. Cybersecurity – The ability to protect or defend the use of cyberspace from cyber attacks Terms Phishing Threat Actor Malware OCR Governance Leadership – Executive Leadership – Board Accountability – Incident Response Team • Confidentiality & Security Team (CST) • Computer Emergency Response Team (CERT) Frameworks – NIST Cybersecurity Framework – NIST 800-Series Guidance – SANS 20 Critical Security Controls Compliance Secure Cyber Risk Next Steps Risk Remediation Response Cyber Risk Criminal Attacks Up 125% Medical Identity Theft Doubled – 1.4M to more than 2.3M Average of $13,500 to Restore Credit Cyber Risk The Numbers... – – – – – Medical record: $10 - $50 Mother’s Maiden Name: $6 Social Security Number: $3 Date of Birth: $3 Credit Card: $1.00 Risks – – – – Patient safety (medical record) Coverage (routine physical to major surgery) Fraudulent claims Credit accounts Cyber Risk Phishing Phishing Phishing (TBD) Cyber Risk OCR Breach Portal: October, 2015 139 Breaches (Hacking), >115M Patients Cyber Risk Verizon Data Breach Report – – – – – 23% of recipients open phishing messages 11% click on attachments 97% of exploits target 10 CVEs Mobile malware not a primary threat Threat Actors • 80% of breaches reviewed (external) • 17% of breaches reviewed (internal) • 3% of breaches reviewed (partners) Cyber Risk Risk Assessment – NIST 800-30 Rev. 1 • Conducting Risk Assessments – NIST 800-39 • Managing Information Security Risk – Vulnerability Assessments – Stored and Transmitted Cyber Risk Stored – – – – – Databases Thumbdrives Workstations File Servers Medical Devices Transmitted – – – – Email VPN (clients) Site-to-Site VPN Tunnel Secure Web Front-End Know your data! Don’t overlook non-sensitive systems Cyber Risk Tools – Security Risk Assessment (SRA Tool) • https://www.healthit.gov/providersprofessionals/security-risk-assessment-tool • Additional resources o Top 10 Tips for Cybersecurity in Health Care – HIPAA Security Rule Toolkit • http://scap.nist.gov/hipaa/ Remediation Next Steps Strategies Risk Remediation Response Remediation Strategies Accept – Within organizational risk tolerance Avoid – Risk exceeds organizational risk tolerance Mitigate – NIST 800-53 – 20 Critical Security Controls Share or Transfer – Outsourcing – Cyber Insurance Remediation Strategies Cyber Insurance – – – – Breach Costs (forensics, notification, identity protection) Privacy Protection (regulatory) Multimedia Protection Cyber Extortion Analysis – Incident History – Ponemon Study: $204 per record – Verizon Data Breach Report Remediation Strategies Verizon Data Breach Report – Cost Per Record Remediation Strategies Example Safeguards – – – – – – – – – – Encryption Malware Protection Microsoft & Third Party Updates Physical Access Controls Intrusion Detection & Prevention Policies & Procedures Disaster Recovery & Business Continuity Incident Response Two-Factor Authentication Strong Password Enforcement Video Next Steps Passwords Passwords Which one is more secure? take the survey Xq!5#7pK 15 characters 49 million years to crack 8 characters 3 days to crack Passwords Passwords – – – – Minimum of 8 characters (10-52 seconds) Upper & lower case (45-180 minutes) Numbers (3-15 hours) Special characters (3-5 days) Passphrases – – – – Minimum of 15 characters (13,000 years) Upper & lower case (435 million years) Numbers (6 billon years) Special characters (157 billion years) Passwords Two-Factor Authentication – Password, Pin – Hard Token, Soft Token, Certificate Phishing Security awareness and training Phishing Phishing tests – Social Engineering Toolkit (SET) – Simple Phishing Toolkit – SpearPhisher Phishing Test Security Updates Windows Updates – 120 Windows Updates, Per Server, Per Year – 12,000 Windows Updates Per Year (per 100 Servers) Microsoft Updates – Office – SQL Third Party Updates – Adobe – Oracle (Java) Incident Next Steps Response Risk Remediation Response Incident Response Incident Response Team Reporting & Tracking Breach Assessment – Notification Requirements Law Enforcement & NCCIC Disaster and Contingency Planning Incident Response National Cybersecurity and Communications Integration Center (NCCIC) – US-CERT (United States Computer Emergency Readiness Team) – ICS-CERT (Industrial Control Systems Cyber Emergency Response Team) – NCC (National Coordinating Center) – COC (NCCIC Cyber Operations Center) – DTA (Discovery and Technical Analysis) – MM (Mission Management) Challenge #1 Vulnerability Assessment Report – US-CERT: Top 30 Targeted High Risk Vulnerabilities – https://www.us-cert.gov/ncas/alerts/TA15-119A Challenge #2 Malware Report – Virus definitions – Detection history – Rogue system detection Challenge #3 Security Update Status Report – Microsoft updates – Third party software Challenge #4 Security Awareness and Training – Training certifications/verification – Review/update content – Phishing test Free Resources – CyberAwareness Challenge (Federal Version) • http://iatraining.disa.mil/eta/cyberchallenge/launchpage.htm – Identifying and Safeguarding PII • http://iatraining.disa.mil/eta/piiv2/launchPage.htm – Privacy and Security Training Games • https://www.healthit.gov/providers-professionals/privacy-security-training-games Summary Risk Remediation Response Additional Information Verizon Data Breach Report (2015) – http://www.verizonenterprise.com/DBIR/2015/ National Institute of Standards and Technology (NIST) – http://www.nist.gov – 800-Series Guidance: http://csrc.nist.gov/publications/PubsSPs.html OCR Breach Portal – https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf NCCIC – http://www.dhs.gov/about-national-cybersecurity-communicationsintegration-center US-CERT – https://www.us-cert.gov/ – Incident Reporting: https://www.us-cert.gov/forms/report Additional Information Cybercrime and the Healthcare Industry (EMC & RSA) – http://www.emc.com/collateral/white-papers/h12105-cybercrimehealthcare-industry-rsa-wp.pdf Fifth Annual Benchmark Study on Privacy and Security of Healthcare Data (Ponemon Institute) – https://www2.idexpertscorp.com/fifth-annual-ponemon-study-onprivacy-security-incidents-of-healthcare-data Cyber-Risk Oversight Handbook – https://www.nacdonline.org/Resources/Article.cfm?ItemNumber=1068 8 Contact Information Have a question, comment, or suggestion? Contact Nathan Gibson at: ngibson@wvmi.org 304-346-9864 ext. 2236