why your firewall strategy isn t working better protect
play

Why Your Firewall Strategy Isnt Working: Better Protect Your - PowerPoint PPT Presentation

Why Your Firewall Strategy Isnt Working: Better Protect Your Organization Don Kopanoff Healthcare Business Development HEALTHCARE SECURITY CHALLENGES THREE HEALTHCARE ATTACK VECTORS HOSPITAL 44% OF ALL BREACH IN 2013 ARE HEALTHCARE


  1. Why Your Firewall Strategy Isn’t Working: Better Protect Your Organization Don Kopanoff – Healthcare Business Development

  2. HEALTHCARE SECURITY CHALLENGES

  3. THREE HEALTHCARE ATTACK VECTORS HOSPITAL 44% OF ALL BREACH IN 2013 ARE HEALTHCARE —Identity Theft Resource Center TRADITIONAL ATTACK IMPLANTABLE CARDIAC DEFIBRILLATORS DRUG INFUSION PUMPS WEARABLES X-RAYS VIRTUAL ELECTRONIC MOBILE CT SCANNERS REMOTE HEALTH CARE MEDICAL RECORDS REFRIGERATION UNITS APPLICATIONS MONITORING MEDICAL INFORMATION CENTER TRANSFORMED CARE

  4. HIGH VALUE OF PHI 10 X A medical record is worth ten times more than a credit card number

  5. MEDICAL INFORMATION VULNERABILITY IMPLANTABLE DRUG INFUSION PUMPS CARDIAC DEFIBRILLATORS X-RAYS ELECTRONIC REFRIGERATION UNITS CT SCANNERS MEDICAL RECORDS

  6. TRANSFORMED HC IS A HOTBED FOR CYBER SECURITY ACTIVITY  Digitizing patient record Academic Home Health Long Term Medical Centers Care  Sharing patient information HIE Pharma Hospitals across HLS ecosystem ACOs  Data-based collaborative care Government  Analytics to enhance care Telehealth Diagnostic  Electronic registries for Imaging Centers population health Secure Industry Patient Data Payers  Personal medicine EHR Data Explosion = Too many ways in Physician Lab Facilities Offices and unprecedented security risk Medical Suppliers Ambulatory Private Pharmacies Insurance Registries

  7. US HEALTHCARE - ANATOMY OF A BREACH REGIONAL HEALTH SYSTEM LARGE HEALTH SYSTEM TEACHING HEALTH SYSTEM Cyberattack Heartbleed Most attacks affecting bug was are based on 4 laptops 4.5M patient records Paid the OCR $4.8 million after 6800 4.5 million part of missing the stolen (no encryption) patient records were exposed individuals strategy basic checklist 2015 - 50% of healthcare organizations experienced 1 – 5 cyber attacks (IDC) 1 in 3 deemed successful 2020 2015 By 2020- 42% of all healthcare data created in the Digital Universe will be unprotected .

  8. DEFENSE STRATEGY FOR ADVANCED THREATS Spam Spam Anti-spam Malicious Email Malicious Malicious Sandbox Web Filtering Link Link ePHI Malicious Exploit Exploit Web Site Intrusion Prevention Malware Malware Command & Antivirus Control Center Bot Commands Bot Commands & Stolen Data & Stolen Data App Control/ IP Reputation

  9. HEALTHCARE USE CASES

  10. USE CASE- SEGMENTING INTERNAL NETWORKS

  11. USE CASE: SECURE WIRELESS AND PRESENCE ANALYTICS BLOCKED IT

  12. HEALTHCARE’S NEW BATTLE GROUND Mobile Wearables Remote health Virtual applications monitoring care THE NEXT THREAT 70% of healthcare organizations will invest in consumer-facing mobile apps, wearables, home monitoring, and virtual care by 2018.

  13. Thank you for your time. For more info: dkopanoff@fortinet.com / @dkopanoff / 770.377.5551 www.fortinet.com/healthcare @FortinetHealth

Recommend


More recommend