SlideShare a Scribd company logo
1 of 30
Increasing Challenges in
Healthcare Privacy and Security
Presented by:
Marti Arvin
VP, Audit Strategy
CynergisTek, Inc.
2
Agenda
Safeguard PHI by Managing Vendors
OCR Enforcement Outlook
OCR Desk Audit Update
Cybersecurity Updates for Compliance
3
• Requirements Definition
• Pre-Contract Due
Diligence
• Contract Security
Specifications
• Performance Monitoring
• Breach Notification
• Contract Termination
• Documentation
Vendor Security Must Improve
Define
Select
ContractMonitor
Terminate
• Examine Scope of Effort
• Determine What Level of
Minimum Necessary
• Identify Security
Requirements
• Develop SLAs for Privacy
and Security
• Incorporate into RFI, RFP
and/or SOW
• Classify Vendor
4
Defining Requirements
• Tailor requests to scope of
contract
• Security standard followed
• Include privacy and security
questionnaire
• Request documentation
• Review third party
assessments
• Proof of Training
• Conduct site visit
• Privacy and security incident
history
5
Due Diligence: Pre-Contract
• Define expectations,
material changes,
subcontractors
• Minimum Necessary
• Transmission, storage &
processing
• Incident response
• Audit/monitoring
• Reporting requirements
• Contingency operations
6
Contract Security Specifications
• For contracts lasting
more than 6 months
• Periodic audits of key
processes
• Testing of contingency
plans/operations
• Renewal of third party
assessments
7
Maintenance
• Timeliness of
notifications
• Assistance in
investigation/risk
assessment
• Indemnification for
certain costs
• Notifications to public
8
Breach Notification
• Termination for cause vs.
end of contract
• Disposition of data if in
receipt
• User/system access
• Reminder of Minimum
Necessary
• Other continued
responsibilities
9
Contract Termination
OCR Enforcement
Outlook
10
11
OCR guidance that ransomware
incidents are breaches. Cloud
computing guidance that any
vendor handling PHI is a BA. Also
guidance on patient access to
PHI. Guidance on breach
notification, minimum necessary
and distribution of penalties still
to come.
Guidance
OCR Update
Memorial Health System settled for
$5.5M over inappropriate access by
its own employees & employees of
affiliated physician offices .
CardioNet settled for $2.5M because
of lack of appropriate security
program/no device media control
measures.
Presence Health Network settled for
$400K over failure to timely notify of
a breach
Settlements
12
• Most resolution agreements cite to Security Rule
– Enterprise wide risk analysis is foundation
– Expectation that encryption is used on all portable
and mobile devices & media
– Encryption of network servers when reasonable and
appropriate
– Managing/controls of device & media
– Contingency planning
OCR Enforcement
13
• Seeing compliance reviews that:
– Ask for documentation that goes well beyond the
issue that originally brought OCR to the door
– Ask for documentation around multiple reports of
small breaches
OCR Enforcement
14
• Business Associate Agreements
• Risk Analysis
• Failure to Manage Identified Risk, e.g. Encrypt
• Lack of Transmission Security
• Lack of Appropriate Auditing
• No Patching of Software
• Lack of appropriate access monitoring
• Improper Disposal
• Insufficient Data Backup and Contingency Planning
Key Issues in OCR’s Enforcement Cases
OCR Desk Audit Update
15
16
• Total covered entities audited 166
– 103 for Privacy and Breach Rule compliance
– 63 for Security Rule compliance
– Break down of covered entities
• 9% Health Plans
• 1% Clearinghouses
• 90% Providers
• Business Associates audited 41
– All assessed for Breach Notification and Security Rule
compliance
OCR’s Audit Findings
17
OCR comments about the audit process: Under OCR’s
separate, broad authority to open compliance reviews,
OCR could decide to open a separate compliance review in
circumstances were significant threats to the privacy and
security of PHI are revealed through the audit
OCR Audit Findings
18
Random Audit RoF Scale
A
F
19
Rating at each end of the rankings for all entities (103)
Breach Rule 5 Rating 1 Rating
Timeliness of Notification 15 67
Content of Notification 9 14
Privacy Rule
Access 11 1
NPP Content 16 2
Electronic NPP 15 59
Security Rule
Risk Analysis 13 0
Risk Management 17 1
Privacy and Breach Notification Rules
20
Rankings of the covered entities audited (103)
Breach Rule 5 4 3 2 1 N/A
Timeliness of Notification 11% 9% 2% 6% 65% 7%
Content of Notification 7% 37% 23% 14% 14% 5%
Privacy Rule
Provision of the NPP 15% 6% 4% 15% 57%
NPP Content 15% 11% 39% 33% 2%
Access right 11 54 27 10 1
Security Rule
Risk Analysis 13 23 19 8 0
Risk Management 17 29 13 3 1
Privacy and Breach Notification Rules
Cybersecurity
21
22
Cyber Incidents
2009 - 2011 2012 - 2014 2015 2016 2017*
BCBS Tenn
1.02M
Stolen HD
AvMed
1.2M
Stolen
Laptops
NYC Health
& Hospitals
1.7M
Stolen
Backup
Tapes
Advocate
Medical
4.03M
Computer
Theft
Utah
DHHS
780K
Hacking
Boston
Children
Hacktivism
Anonymous
Nemours
1.6M
Lost
Backups
Health Net
1.9M
Lost HD
Mn.PH
1.3M
Hacking
CHS
4.5M
Hacking
Anthem
BCBS
80M
Hacking
Premera
BCBS
11M
Hacking
UCLA
4.5M
Hacking
Beacon
Health
225K
Hacking
CareFirst
1.1M
Hacking
Haley VA
5 Days
Hacking
Titus
6 Days
Hacking
HPMC
10 Days
Hacking
Hurley
6 Days
Hacking
St. Francis
6K
Extortion
Appalachian
Regional
Hospitals
3 Weeks
Hacking
Orleans
Medical
Clinic
7K
Hacking
Banner Health
2.7M
Hacking
Multiple
DDOS
Hacking
Evolving Healthcare Threat Landscape
The Justice Department predicted
Cybercrime would generate
$600B in revenues in 2016
• Cybercrime-as-a-service model*
gives less technically-savvy criminals
access
• Dark web marketplaces make
“monetizing” stolen data as easy as
buying on Amazon
• Cybercriminals are adopting tactics
previously only used by nation-state
attackers
23
Cybercrime “IS” a Business
• First appeared around 2005
• Two forms: Crypto ransomware
(data) and Locker ransomware
(system)
• Sophisticated attacks use:
• New asymmetric keys for each
infection
• Industrial strength & private/public
key encryption
• Privacy enabling services like TOR
and Bitcoin for payments
• Indifferent to target, everyone is a
target (home/business)
• Malvertising, spam email,
downloaders/botnets & social
engineering
Cyber Extortion is Rampant
The United States is the largest target
worldwide by a huge margin.
SOCs worldwide report as much as a 10X
increase in ransomware attacks from
December to January with no abatement.
24
25
Percentage of Phishing Emails Delivering Ransomware
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
October 2015 November 2015 December 2015 January 2016 February 2016 March 2016
Phishing emails delivering ransomware Phishing emails delivering other malware
Source: PhishMe Q1 Malware Review
Percentageofphishingemails
26
• US Dept. of Justice Guidance on Ransomware says “No”
• Paying a ransom does not guarantee an organization will regain
access to its data; in fact, some victims were never provided with
decryption keys after paying ransom
• Some victims who paid the demand have reported being targeted
again by cyber actors
• After paying the originally demanded ransom, some victims have
been asked to pay more to get the promised decryption key
• Report ransomware incidents to the FBI using the checklist of
information that is helpful to them
– https://www.ic3.gov/media/2016/160915.aspx
Should You Pay Ransom for Your Data?
27
Ubiquitous Is The New Paradigm
• Smart phones
• I0T
• Social media
• POS systems
• Medical devices
• Removable media
(USBs)
• SPAM & email
• Applications
Threats are introduced from all
directions, simple compliance
strategies will not suffice, an
integrated set of controls is needed.
• Smart TVs
• CCTV cameras
• Environmental
systems
• Downloads
• Attachments
• Browsers
• Wearables
• Telehealth
• 93% feel vulnerable to insider
threats
• 59% worry about privileged users
most
• Contractors/service providers
next biggest concern
• 2010-2015 20% increase in
ID/Med ID theft
• 37% feel user awareness training
is failing
• Traditional audit methods are
failing right and left
28
The Insider Threat
29
• What is the scope of incident: What networks, systems or
applications are affected?
• Where was the origin of the incident in your network?
– Who/what/where/when
• Determine whether is incident is finished, ongoing or has
propagated additional incidents throughout the environment
• How did the incident occur?
• Contain the impact and propagation of the ransomware
– Tools and attacks methods used, vulnerabilities exploited
• Eradicate the instance of the ransomware
Responding to Cybersecurity Incidents
30
Questions?
Marti Arvin
Marti.Arvin@CynergisTek.com
510-402-8550, Ext 7051
Questions?
?

More Related Content

What's hot

Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveJon Lendrum
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & ForensicsPriyanka Aash
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsDominique Dessy
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert serviceMinh Le
 
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your RiskHow to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your RiskSurfWatch Labs
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider ThreatsLancope, Inc.
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen MillerAVEVA
 
Security Framework from SANS
Security Framework from SANSSecurity Framework from SANS
Security Framework from SANSJeffrey Reed
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityGreat Bay Software
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider ThreatLancope, Inc.
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowkCura_Relativity
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectivesSensePost
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 

What's hot (20)

Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
 
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive MalwareShah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
Shah Sheikh / ISACA UAE - Deep Dive on Evasive Malware
 
Incident Response: Validation, Containment & Forensics
 Incident Response: Validation, Containment & Forensics Incident Response: Validation, Containment & Forensics
Incident Response: Validation, Containment & Forensics
 
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security ControlsEbook: Splunk SANS - CIS Top 20 Critical Security Controls
Ebook: Splunk SANS - CIS Top 20 Critical Security Controls
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
 
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your RiskHow to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
How to Access and Make Use of “Trapped” Cyber Data to Reduce Your Risk
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
Identify and Stop Insider Threats
Identify and Stop Insider ThreatsIdentify and Stop Insider Threats
Identify and Stop Insider Threats
 
Security-Centric Networking
Security-Centric NetworkingSecurity-Centric Networking
Security-Centric Networking
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
Scada security presentation by Stephen Miller
Scada security presentation by Stephen MillerScada security presentation by Stephen Miller
Scada security presentation by Stephen Miller
 
Security Framework from SANS
Security Framework from SANSSecurity Framework from SANS
Security Framework from SANS
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
JAKU Botnet Analysis
JAKU Botnet AnalysisJAKU Botnet Analysis
JAKU Botnet Analysis
 
5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 

Similar to Increasing Challenges in Healthcare Privacy and Security

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Presentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferencePresentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferenceBill Despo
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
Data protection within development
Data protection within developmentData protection within development
Data protection within developmentowaspsuffolk
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningBlack Duck by Synopsys
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Nguyễn Tấn Vi - office of the CISO
Nguyễn Tấn Vi - office of the CISONguyễn Tấn Vi - office of the CISO
Nguyễn Tấn Vi - office of the CISOSecurity Bootcamp
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...Citrin Cooperman
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionBlackbaud
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 

Similar to Increasing Challenges in Healthcare Privacy and Security (20)

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Presentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferencePresentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 Conference
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Data protection within development
Data protection within developmentData protection within development
Data protection within development
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability Scanning
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Nguyễn Tấn Vi - office of the CISO
Nguyễn Tấn Vi - office of the CISONguyễn Tấn Vi - office of the CISO
Nguyễn Tấn Vi - office of the CISO
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
 
Moving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting IntroductionMoving to the Cloud: A Security and Hosting Introduction
Moving to the Cloud: A Security and Hosting Introduction
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 

Recently uploaded

Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyush Gupta
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591adityaroy0215
 
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...delhimodelshub1
 
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsiindian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana TulsiHigh Profile Call Girls Chandigarh Aarushi
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
(Jessica) Call Girl in Jaipur- 9521753030 Escorts Service 50% Off with Cash O...
(Jessica) Call Girl in Jaipur- 9521753030 Escorts Service 50% Off with Cash O...(Jessica) Call Girl in Jaipur- 9521753030 Escorts Service 50% Off with Cash O...
(Jessica) Call Girl in Jaipur- 9521753030 Escorts Service 50% Off with Cash O...indiancallgirl4rent
 
Dehradun Call Girls Service 7017441440 Real Russian Girls Looking Models
Dehradun Call Girls Service 7017441440 Real Russian Girls Looking ModelsDehradun Call Girls Service 7017441440 Real Russian Girls Looking Models
Dehradun Call Girls Service 7017441440 Real Russian Girls Looking Modelsindiancallgirl4rent
 
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service HyderabadVIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
 
Call Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any TimeCall Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any Timedelhimodelshub1
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 

Recently uploaded (20)

Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
 
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
Russian Call Girls Hyderabad Indira 9907093804 Independent Escort Service Hyd...
 
Call Girl Lucknow Gauri 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
Call Girl Lucknow Gauri 🔝 8923113531  🔝 🎶 Independent Escort Service LucknowCall Girl Lucknow Gauri 🔝 8923113531  🔝 🎶 Independent Escort Service Lucknow
Call Girl Lucknow Gauri 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
 
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsiindian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
indian Call Girl Panchkula ❤️🍑 9907093804 Low Rate Call Girls Ludhiana Tulsi
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
(Jessica) Call Girl in Jaipur- 9521753030 Escorts Service 50% Off with Cash O...
(Jessica) Call Girl in Jaipur- 9521753030 Escorts Service 50% Off with Cash O...(Jessica) Call Girl in Jaipur- 9521753030 Escorts Service 50% Off with Cash O...
(Jessica) Call Girl in Jaipur- 9521753030 Escorts Service 50% Off with Cash O...
 
Dehradun Call Girls Service 7017441440 Real Russian Girls Looking Models
Dehradun Call Girls Service 7017441440 Real Russian Girls Looking ModelsDehradun Call Girls Service 7017441440 Real Russian Girls Looking Models
Dehradun Call Girls Service 7017441440 Real Russian Girls Looking Models
 
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
 
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service HyderabadVIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
VIP Call Girls Hyderabad Megha 9907093804 Independent Escort Service Hyderabad
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
 
Call Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any TimeCall Girls LB Nagar 7001305949 all area service COD available Any Time
Call Girls LB Nagar 7001305949 all area service COD available Any Time
 
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service DehradunCall Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
 
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
 

Increasing Challenges in Healthcare Privacy and Security

  • 1. Increasing Challenges in Healthcare Privacy and Security Presented by: Marti Arvin VP, Audit Strategy CynergisTek, Inc.
  • 2. 2 Agenda Safeguard PHI by Managing Vendors OCR Enforcement Outlook OCR Desk Audit Update Cybersecurity Updates for Compliance
  • 3. 3 • Requirements Definition • Pre-Contract Due Diligence • Contract Security Specifications • Performance Monitoring • Breach Notification • Contract Termination • Documentation Vendor Security Must Improve Define Select ContractMonitor Terminate
  • 4. • Examine Scope of Effort • Determine What Level of Minimum Necessary • Identify Security Requirements • Develop SLAs for Privacy and Security • Incorporate into RFI, RFP and/or SOW • Classify Vendor 4 Defining Requirements
  • 5. • Tailor requests to scope of contract • Security standard followed • Include privacy and security questionnaire • Request documentation • Review third party assessments • Proof of Training • Conduct site visit • Privacy and security incident history 5 Due Diligence: Pre-Contract
  • 6. • Define expectations, material changes, subcontractors • Minimum Necessary • Transmission, storage & processing • Incident response • Audit/monitoring • Reporting requirements • Contingency operations 6 Contract Security Specifications
  • 7. • For contracts lasting more than 6 months • Periodic audits of key processes • Testing of contingency plans/operations • Renewal of third party assessments 7 Maintenance
  • 8. • Timeliness of notifications • Assistance in investigation/risk assessment • Indemnification for certain costs • Notifications to public 8 Breach Notification
  • 9. • Termination for cause vs. end of contract • Disposition of data if in receipt • User/system access • Reminder of Minimum Necessary • Other continued responsibilities 9 Contract Termination
  • 11. 11 OCR guidance that ransomware incidents are breaches. Cloud computing guidance that any vendor handling PHI is a BA. Also guidance on patient access to PHI. Guidance on breach notification, minimum necessary and distribution of penalties still to come. Guidance OCR Update Memorial Health System settled for $5.5M over inappropriate access by its own employees & employees of affiliated physician offices . CardioNet settled for $2.5M because of lack of appropriate security program/no device media control measures. Presence Health Network settled for $400K over failure to timely notify of a breach Settlements
  • 12. 12 • Most resolution agreements cite to Security Rule – Enterprise wide risk analysis is foundation – Expectation that encryption is used on all portable and mobile devices & media – Encryption of network servers when reasonable and appropriate – Managing/controls of device & media – Contingency planning OCR Enforcement
  • 13. 13 • Seeing compliance reviews that: – Ask for documentation that goes well beyond the issue that originally brought OCR to the door – Ask for documentation around multiple reports of small breaches OCR Enforcement
  • 14. 14 • Business Associate Agreements • Risk Analysis • Failure to Manage Identified Risk, e.g. Encrypt • Lack of Transmission Security • Lack of Appropriate Auditing • No Patching of Software • Lack of appropriate access monitoring • Improper Disposal • Insufficient Data Backup and Contingency Planning Key Issues in OCR’s Enforcement Cases
  • 15. OCR Desk Audit Update 15
  • 16. 16 • Total covered entities audited 166 – 103 for Privacy and Breach Rule compliance – 63 for Security Rule compliance – Break down of covered entities • 9% Health Plans • 1% Clearinghouses • 90% Providers • Business Associates audited 41 – All assessed for Breach Notification and Security Rule compliance OCR’s Audit Findings
  • 17. 17 OCR comments about the audit process: Under OCR’s separate, broad authority to open compliance reviews, OCR could decide to open a separate compliance review in circumstances were significant threats to the privacy and security of PHI are revealed through the audit OCR Audit Findings
  • 18. 18 Random Audit RoF Scale A F
  • 19. 19 Rating at each end of the rankings for all entities (103) Breach Rule 5 Rating 1 Rating Timeliness of Notification 15 67 Content of Notification 9 14 Privacy Rule Access 11 1 NPP Content 16 2 Electronic NPP 15 59 Security Rule Risk Analysis 13 0 Risk Management 17 1 Privacy and Breach Notification Rules
  • 20. 20 Rankings of the covered entities audited (103) Breach Rule 5 4 3 2 1 N/A Timeliness of Notification 11% 9% 2% 6% 65% 7% Content of Notification 7% 37% 23% 14% 14% 5% Privacy Rule Provision of the NPP 15% 6% 4% 15% 57% NPP Content 15% 11% 39% 33% 2% Access right 11 54 27 10 1 Security Rule Risk Analysis 13 23 19 8 0 Risk Management 17 29 13 3 1 Privacy and Breach Notification Rules
  • 22. 22 Cyber Incidents 2009 - 2011 2012 - 2014 2015 2016 2017* BCBS Tenn 1.02M Stolen HD AvMed 1.2M Stolen Laptops NYC Health & Hospitals 1.7M Stolen Backup Tapes Advocate Medical 4.03M Computer Theft Utah DHHS 780K Hacking Boston Children Hacktivism Anonymous Nemours 1.6M Lost Backups Health Net 1.9M Lost HD Mn.PH 1.3M Hacking CHS 4.5M Hacking Anthem BCBS 80M Hacking Premera BCBS 11M Hacking UCLA 4.5M Hacking Beacon Health 225K Hacking CareFirst 1.1M Hacking Haley VA 5 Days Hacking Titus 6 Days Hacking HPMC 10 Days Hacking Hurley 6 Days Hacking St. Francis 6K Extortion Appalachian Regional Hospitals 3 Weeks Hacking Orleans Medical Clinic 7K Hacking Banner Health 2.7M Hacking Multiple DDOS Hacking Evolving Healthcare Threat Landscape
  • 23. The Justice Department predicted Cybercrime would generate $600B in revenues in 2016 • Cybercrime-as-a-service model* gives less technically-savvy criminals access • Dark web marketplaces make “monetizing” stolen data as easy as buying on Amazon • Cybercriminals are adopting tactics previously only used by nation-state attackers 23 Cybercrime “IS” a Business
  • 24. • First appeared around 2005 • Two forms: Crypto ransomware (data) and Locker ransomware (system) • Sophisticated attacks use: • New asymmetric keys for each infection • Industrial strength & private/public key encryption • Privacy enabling services like TOR and Bitcoin for payments • Indifferent to target, everyone is a target (home/business) • Malvertising, spam email, downloaders/botnets & social engineering Cyber Extortion is Rampant The United States is the largest target worldwide by a huge margin. SOCs worldwide report as much as a 10X increase in ransomware attacks from December to January with no abatement. 24
  • 25. 25 Percentage of Phishing Emails Delivering Ransomware 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% October 2015 November 2015 December 2015 January 2016 February 2016 March 2016 Phishing emails delivering ransomware Phishing emails delivering other malware Source: PhishMe Q1 Malware Review Percentageofphishingemails
  • 26. 26 • US Dept. of Justice Guidance on Ransomware says “No” • Paying a ransom does not guarantee an organization will regain access to its data; in fact, some victims were never provided with decryption keys after paying ransom • Some victims who paid the demand have reported being targeted again by cyber actors • After paying the originally demanded ransom, some victims have been asked to pay more to get the promised decryption key • Report ransomware incidents to the FBI using the checklist of information that is helpful to them – https://www.ic3.gov/media/2016/160915.aspx Should You Pay Ransom for Your Data?
  • 27. 27 Ubiquitous Is The New Paradigm • Smart phones • I0T • Social media • POS systems • Medical devices • Removable media (USBs) • SPAM & email • Applications Threats are introduced from all directions, simple compliance strategies will not suffice, an integrated set of controls is needed. • Smart TVs • CCTV cameras • Environmental systems • Downloads • Attachments • Browsers • Wearables • Telehealth
  • 28. • 93% feel vulnerable to insider threats • 59% worry about privileged users most • Contractors/service providers next biggest concern • 2010-2015 20% increase in ID/Med ID theft • 37% feel user awareness training is failing • Traditional audit methods are failing right and left 28 The Insider Threat
  • 29. 29 • What is the scope of incident: What networks, systems or applications are affected? • Where was the origin of the incident in your network? – Who/what/where/when • Determine whether is incident is finished, ongoing or has propagated additional incidents throughout the environment • How did the incident occur? • Contain the impact and propagation of the ransomware – Tools and attacks methods used, vulnerabilities exploited • Eradicate the instance of the ransomware Responding to Cybersecurity Incidents