Why Your Firewall Strategy Isn’t Working: Better Protect Your Organization Don Kopanoff – Healthcare Business Development
HEALTHCARE SECURITY CHALLENGES
THREE HEALTHCARE ATTACK VECTORS HOSPITAL 44% OF ALL BREACH IN 2013 ARE HEALTHCARE —Identity Theft Resource Center TRADITIONAL ATTACK IMPLANTABLE CARDIAC DEFIBRILLATORS DRUG INFUSION PUMPS WEARABLES X-RAYS VIRTUAL ELECTRONIC MOBILE CT SCANNERS REMOTE HEALTH CARE MEDICAL RECORDS REFRIGERATION UNITS APPLICATIONS MONITORING MEDICAL INFORMATION CENTER TRANSFORMED CARE
HIGH VALUE OF PHI 10 X A medical record is worth ten times more than a credit card number
MEDICAL INFORMATION VULNERABILITY IMPLANTABLE DRUG INFUSION PUMPS CARDIAC DEFIBRILLATORS X-RAYS ELECTRONIC REFRIGERATION UNITS CT SCANNERS MEDICAL RECORDS
TRANSFORMED HC IS A HOTBED FOR CYBER SECURITY ACTIVITY Digitizing patient record Academic Home Health Long Term Medical Centers Care Sharing patient information HIE Pharma Hospitals across HLS ecosystem ACOs Data-based collaborative care Government Analytics to enhance care Telehealth Diagnostic Electronic registries for Imaging Centers population health Secure Industry Patient Data Payers Personal medicine EHR Data Explosion = Too many ways in Physician Lab Facilities Offices and unprecedented security risk Medical Suppliers Ambulatory Private Pharmacies Insurance Registries
US HEALTHCARE - ANATOMY OF A BREACH REGIONAL HEALTH SYSTEM LARGE HEALTH SYSTEM TEACHING HEALTH SYSTEM Cyberattack Heartbleed Most attacks affecting bug was are based on 4 laptops 4.5M patient records Paid the OCR $4.8 million after 6800 4.5 million part of missing the stolen (no encryption) patient records were exposed individuals strategy basic checklist 2015 - 50% of healthcare organizations experienced 1 – 5 cyber attacks (IDC) 1 in 3 deemed successful 2020 2015 By 2020- 42% of all healthcare data created in the Digital Universe will be unprotected .
DEFENSE STRATEGY FOR ADVANCED THREATS Spam Spam Anti-spam Malicious Email Malicious Malicious Sandbox Web Filtering Link Link ePHI Malicious Exploit Exploit Web Site Intrusion Prevention Malware Malware Command & Antivirus Control Center Bot Commands Bot Commands & Stolen Data & Stolen Data App Control/ IP Reputation
HEALTHCARE USE CASES
USE CASE- SEGMENTING INTERNAL NETWORKS
USE CASE: SECURE WIRELESS AND PRESENCE ANALYTICS BLOCKED IT
HEALTHCARE’S NEW BATTLE GROUND Mobile Wearables Remote health Virtual applications monitoring care THE NEXT THREAT 70% of healthcare organizations will invest in consumer-facing mobile apps, wearables, home monitoring, and virtual care by 2018.
Thank you for your time. For more info: dkopanoff@fortinet.com / @dkopanoff / 770.377.5551 www.fortinet.com/healthcare @FortinetHealth
Recommend
More recommend