SlideShare a Scribd company logo
webinar
feb 16
2016
safeguarding
cloud + mobile
healthcare
data
agenda:
■ breach trends
■ anatomy of a breach
■ security challenges
■ the casb approach to
security
■ case studies
poll:
what do you see
as the biggest
threats to
healthcare data?
healthcare breaches have skyrocketed:
up 900% year over year
individuals affected breach type
2014 2015
large-scale breaches rampant in 2015:
top 6 breaches accounted for 96.6% of breached records
■ anthem alone accounted for
78.8m lost records
■ 11m records lost in premera
breach
■ in 2014, largest breach affected
1m
the anatomy of a breach:
premera blue cross / anthem blue cross
HR 1. May 2014 - spoofed
sites, prennera.com,
we11point.com
3. Employee login with
corporate credentials
2. Spear phishing
emails
4. Corporate creds
5. Log into Premera,
Anthem
5. Query + steal 11M
identities
Jan/Feb 2015 IT
discovers breach
8%
of healthcare orgs
had cloud apps
deployed in 2014
37%
of healthcare orgs
had cloud apps
deployed in 2015
cloud
adoption is
rising fast
5.2%
of healthcare orgs
use single sign-on
Bitglass Cloud Adoption Report
57%
of employees refuse
MDM/MAM for BYOD
38%
of IT professionals
don’t participate in
their own BYOD
programs
employees are
resisting
“big brother”
Bitglass BYOD Security Survey 2015
poll:
what capability do
you most need in a
security solution?
traditional
security
approaches are
inadequate
CASB: a
better
approach to
cloud security
identity
discovery
data-centric
security
mobile
casb discovery:
gain visibility into your org’s cloud usage
■ analyze outbound data flows to
learn what SaaS apps your
organization is using
■ understand risk profiles of
different apps
■ essential in process of enabling
secure cloud app usage
casb security:
a data-centric approach
the new data reality requires a new security
architecture
■ cross-device, cross-platform agentless data
protection
■ granular DLP for data at rest and in motion
■ contextual access control
■ detailed logging for compliance and audit
agentless byod security:
achieve compliance and drive adoption
■ secure devices without invasive profiles or
certificates
■ solve the multiple affiliations problem
■ device and OS independent
■ selectively wipe corporate data
■ enforce device security policies
■ full data control and visibility for IT
casb identity:
centralized identity management is key in securing data
■ cloud app identity management should
maintain the best practices of on-prem
identity
■ SSO enables cross-app visibility into
suspicious access activity
■ contextual multi-factor authentication
mitigates risk
needs:
■ ensure security of PHI in
Google Apps and on BYOD
■ maintain HIPAA compliance
key features:
■ DLP
■ visibility / audit
■ identity management
■ mobile data protection
bay cove
human
services ■ 2500+ employees
■ 160 locations
■ northeastern US
situation:
■ existing solution, AT&T
Toggle, obsolete
needs:
■ respect user privacy
■ support future O365 migration
■ HIPAA compliance
key features:
■ DLP policies applied to PHI
■ selective wipe, enforce device
PIN and encryption
US
hospital
system ■ 2500+ employees
■ 160 locations
■ northeastern US
■ 7000
employees
■ southeastern
US
resources:
more info about byod
■ healthcare breach report
■ bay cove human services: case study
■ ESG Lab product review
download the full healthcare breach report
in 2015 one in
three Americans
were victims of
healthcare data
breaches due to
hacking
download
the report
bitglass.com
@bitglass

More Related Content

What's hot

IT security
IT securityIT security
IT security
Aman Jain
 
Business Safety
Business SafetyBusiness Safety
Business Safety
BNLD
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
NowSecure
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During Communication
PECB
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
North Texas Chapter of the ISSA
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Aralanrehbock
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
Ricardo Resnik
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
James Cash
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practices
Potato
 
The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic
The Connors Group
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
Ping Identity
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
NormShield, Inc.
 
HxRefactored - TrueVault - Jason Wang
HxRefactored - TrueVault - Jason WangHxRefactored - TrueVault - Jason Wang
HxRefactored - TrueVault - Jason WangHxRefactored
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 
Data security
Data securityData security
Data security
ForeSolutions
 
Introducing Security Guardian from ExactTrak
Introducing Security Guardian from ExactTrakIntroducing Security Guardian from ExactTrak
Introducing Security Guardian from ExactTrak
Simon Cuthbert
 
OLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - PublicOLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - Public
Simon Hartley
 
GroupProtectionM6A1
GroupProtectionM6A1GroupProtectionM6A1
GroupProtectionM6A1
JeremiahMcKinley
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
Symantec
 

What's hot (20)

IT security
IT securityIT security
IT security
 
Business Safety
Business SafetyBusiness Safety
Business Safety
 
Cyber Security –PPT
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPT
 
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
85% of App Store Apps Fail OWASP Mobile Top 10: Are you exposed?
 
Encryption During Communication
Encryption During CommunicationEncryption During Communication
Encryption During Communication
 
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon MurphyNTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Ar
 
Effective security monitoring mp 2014
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
 
Reducing the Impact of Cyber Attacks
Reducing the Impact of Cyber AttacksReducing the Impact of Cyber Attacks
Reducing the Impact of Cyber Attacks
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practices
 
The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic The Connors Group Cyber Security Infographic
The Connors Group Cyber Security Infographic
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation2017 Cyber Risk Grades by Industry:  Normshield Executive Presentation
2017 Cyber Risk Grades by Industry: Normshield Executive Presentation
 
HxRefactored - TrueVault - Jason Wang
HxRefactored - TrueVault - Jason WangHxRefactored - TrueVault - Jason Wang
HxRefactored - TrueVault - Jason Wang
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 
Data security
Data securityData security
Data security
 
Introducing Security Guardian from ExactTrak
Introducing Security Guardian from ExactTrakIntroducing Security Guardian from ExactTrak
Introducing Security Guardian from ExactTrak
 
OLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - PublicOLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - Public
 
GroupProtectionM6A1
GroupProtectionM6A1GroupProtectionM6A1
GroupProtectionM6A1
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 

Viewers also liked

Dr roohullah shabon international work around the globe
Dr roohullah shabon international work around the globeDr roohullah shabon international work around the globe
Dr roohullah shabon international work around the globe
Dr Roohullah Shabon
 
4033 _favant natalia_tp9.ppt
4033 _favant natalia_tp9.ppt4033 _favant natalia_tp9.ppt
4033 _favant natalia_tp9.ppt
natyfavant
 
Madhya pradesh connectivity & diversity
Madhya pradesh connectivity & diversityMadhya pradesh connectivity & diversity
Madhya pradesh connectivity & diversity
MP Tourism
 
Doug Duncan, Fannie Mae Chief Economist, Presentation at SJREI
Doug Duncan, Fannie Mae Chief Economist, Presentation at SJREIDoug Duncan, Fannie Mae Chief Economist, Presentation at SJREI
Doug Duncan, Fannie Mae Chief Economist, Presentation at SJREI
sjreiassociation
 
Social marketing: anders bekeken (7E-model)
Social marketing: anders bekeken (7E-model)Social marketing: anders bekeken (7E-model)
Social marketing: anders bekeken (7E-model)
CIBE communicatie
 
Kak Zaregistrirovatsa v Global InterGold ?
Kak Zaregistrirovatsa v Global InterGold ?Kak Zaregistrirovatsa v Global InterGold ?
Kak Zaregistrirovatsa v Global InterGold ?
online & offline
 
小巧手握包
小巧手握包小巧手握包
小巧手握包
秀蓮 王
 
Latihan4 michael 5133331019
Latihan4 michael 5133331019Latihan4 michael 5133331019
Latihan4 michael 5133331019Michael Mick
 
20150223_Infoday H2020_Espacio_Francisco Gutiérrez
20150223_Infoday H2020_Espacio_Francisco Gutiérrez20150223_Infoday H2020_Espacio_Francisco Gutiérrez
20150223_Infoday H2020_Espacio_Francisco Gutiérrez
Elena Cortés Ventura
 
Company Profile
Company ProfileCompany Profile
Company Profile
Muhammad Rambe
 
04_CI4_LIFECLAYGLASS_Raquel De Rivas
04_CI4_LIFECLAYGLASS_Raquel De Rivas04_CI4_LIFECLAYGLASS_Raquel De Rivas
04_CI4_LIFECLAYGLASS_Raquel De RivasElena Cortés Ventura
 
Jabulani Design
Jabulani DesignJabulani Design
Jabulani Design
catherinedeane
 

Viewers also liked (14)

Dr roohullah shabon international work around the globe
Dr roohullah shabon international work around the globeDr roohullah shabon international work around the globe
Dr roohullah shabon international work around the globe
 
4033 _favant natalia_tp9.ppt
4033 _favant natalia_tp9.ppt4033 _favant natalia_tp9.ppt
4033 _favant natalia_tp9.ppt
 
Madhya pradesh connectivity & diversity
Madhya pradesh connectivity & diversityMadhya pradesh connectivity & diversity
Madhya pradesh connectivity & diversity
 
Doug Duncan, Fannie Mae Chief Economist, Presentation at SJREI
Doug Duncan, Fannie Mae Chief Economist, Presentation at SJREIDoug Duncan, Fannie Mae Chief Economist, Presentation at SJREI
Doug Duncan, Fannie Mae Chief Economist, Presentation at SJREI
 
Social marketing: anders bekeken (7E-model)
Social marketing: anders bekeken (7E-model)Social marketing: anders bekeken (7E-model)
Social marketing: anders bekeken (7E-model)
 
Kak Zaregistrirovatsa v Global InterGold ?
Kak Zaregistrirovatsa v Global InterGold ?Kak Zaregistrirovatsa v Global InterGold ?
Kak Zaregistrirovatsa v Global InterGold ?
 
Bulan+dygo
Bulan+dygoBulan+dygo
Bulan+dygo
 
小巧手握包
小巧手握包小巧手握包
小巧手握包
 
Latihan4 michael 5133331019
Latihan4 michael 5133331019Latihan4 michael 5133331019
Latihan4 michael 5133331019
 
20150223_Infoday H2020_Espacio_Francisco Gutiérrez
20150223_Infoday H2020_Espacio_Francisco Gutiérrez20150223_Infoday H2020_Espacio_Francisco Gutiérrez
20150223_Infoday H2020_Espacio_Francisco Gutiérrez
 
Unyp think slideshare
Unyp think slideshareUnyp think slideshare
Unyp think slideshare
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
04_CI4_LIFECLAYGLASS_Raquel De Rivas
04_CI4_LIFECLAYGLASS_Raquel De Rivas04_CI4_LIFECLAYGLASS_Raquel De Rivas
04_CI4_LIFECLAYGLASS_Raquel De Rivas
 
Jabulani Design
Jabulani DesignJabulani Design
Jabulani Design
 

Similar to Safeguarding Cloud and Mobile Healthcare Data

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
ClearDATACloud
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
Bitglass
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
Bitglass
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptx
MyAppGurus
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
Netskope
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
Bitglass
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
Bitglass
 
HIPAA Compliant BYOD: After the MDM Honeymoon
HIPAA Compliant BYOD: After the MDM HoneymoonHIPAA Compliant BYOD: After the MDM Honeymoon
HIPAA Compliant BYOD: After the MDM Honeymoon
Bitglass
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
Bitglass
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Bitglass
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
Kaseya
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
Sirius
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
Jonathon Coulter
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
CitiusTech
 
Every cloud cloud risk assessment 2018
Every cloud cloud risk assessment  2018Every cloud cloud risk assessment  2018
Every cloud cloud risk assessment 2018
soniamcpherson11
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
OnRamp
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
Priyanka Aash
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
scoopnewsgroup
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
Micheal Axelsen
 

Similar to Safeguarding Cloud and Mobile Healthcare Data (20)

5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare6 essentials for secure BYOD in healthcare
6 essentials for secure BYOD in healthcare
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Tips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptxTips for creating Effective & HIPPA compliant mobile.pptx
Tips for creating Effective & HIPPA compliant mobile.pptx
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
CASBs: Real World Use Cases
CASBs: Real World Use CasesCASBs: Real World Use Cases
CASBs: Real World Use Cases
 
Top 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in HealthcareTop 5 Cloud Security Threats in Healthcare
Top 5 Cloud Security Threats in Healthcare
 
HIPAA Compliant BYOD: After the MDM Honeymoon
HIPAA Compliant BYOD: After the MDM HoneymoonHIPAA Compliant BYOD: After the MDM Honeymoon
HIPAA Compliant BYOD: After the MDM Honeymoon
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
Webinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security ThreatsWebinar - Bitglass and CyberEdge - Hidden Security Threats
Webinar - Bitglass and CyberEdge - Hidden Security Threats
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Every cloud cloud risk assessment 2018
Every cloud cloud risk assessment  2018Every cloud cloud risk assessment  2018
Every cloud cloud risk assessment 2018
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Think Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your PrintersThink Your Network Is Safe? Check Your Printers
Think Your Network Is Safe? Check Your Printers
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 

More from Bitglass

Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass
 
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
Bitglass
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
Bitglass
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial services
Bitglass
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
Bitglass
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
Bitglass
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
Bitglass
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
Bitglass
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
Bitglass
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
Bitglass
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
Bitglass
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
Bitglass
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
Bitglass
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
Bitglass
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
Bitglass
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
Bitglass
 
Bridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond MediaBridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond Media
Bitglass
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
Bitglass
 

More from Bitglass (20)

Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
Bitglass Webinar - BlueCross BlueShield of Tennessee's CASB Journey to Secure...
 
Bitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud SecurityBitglass Webinar - A Primer on CASBs and Cloud Security
Bitglass Webinar - A Primer on CASBs and Cloud Security
 
Webinar - Mobile Security Trends
Webinar - Mobile Security TrendsWebinar - Mobile Security Trends
Webinar - Mobile Security Trends
 
Empowering the Cloud Through G Suite
Empowering the Cloud Through G SuiteEmpowering the Cloud Through G Suite
Empowering the Cloud Through G Suite
 
securing the cloud for financial services
securing the cloud for financial servicessecuring the cloud for financial services
securing the cloud for financial services
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Mitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security ThreatsMitigating the Top 5 Cloud Security Threats
Mitigating the Top 5 Cloud Security Threats
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
Securing IaaS Applications
Securing IaaS ApplicationsSecuring IaaS Applications
Securing IaaS Applications
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
CASBs - A New Hope
CASBs - A New HopeCASBs - A New Hope
CASBs - A New Hope
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?Webinar: are casbs ready for primetime?
Webinar: are casbs ready for primetime?
 
Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)Security and Accountability in the Cloud (in partnership with SANS)
Security and Accountability in the Cloud (in partnership with SANS)
 
The Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 ApocalypseThe Four Horsemen of the O365 Apocalypse
The Four Horsemen of the O365 Apocalypse
 
Office 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your DataOffice 365 Security: How to Safeguard Your Data
Office 365 Security: How to Safeguard Your Data
 
CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)CASBs and Office 365 (with Argyle)
CASBs and Office 365 (with Argyle)
 
Bridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond MediaBridging the Office 365 Security Gap - Redmond Media
Bridging the Office 365 Security Gap - Redmond Media
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Safeguarding Cloud and Mobile Healthcare Data

  • 2. agenda: ■ breach trends ■ anatomy of a breach ■ security challenges ■ the casb approach to security ■ case studies
  • 3. poll: what do you see as the biggest threats to healthcare data?
  • 4. healthcare breaches have skyrocketed: up 900% year over year individuals affected breach type 2014 2015
  • 5. large-scale breaches rampant in 2015: top 6 breaches accounted for 96.6% of breached records ■ anthem alone accounted for 78.8m lost records ■ 11m records lost in premera breach ■ in 2014, largest breach affected 1m
  • 6. the anatomy of a breach: premera blue cross / anthem blue cross HR 1. May 2014 - spoofed sites, prennera.com, we11point.com 3. Employee login with corporate credentials 2. Spear phishing emails 4. Corporate creds 5. Log into Premera, Anthem 5. Query + steal 11M identities Jan/Feb 2015 IT discovers breach
  • 7. 8% of healthcare orgs had cloud apps deployed in 2014 37% of healthcare orgs had cloud apps deployed in 2015 cloud adoption is rising fast 5.2% of healthcare orgs use single sign-on Bitglass Cloud Adoption Report
  • 8. 57% of employees refuse MDM/MAM for BYOD 38% of IT professionals don’t participate in their own BYOD programs employees are resisting “big brother” Bitglass BYOD Security Survey 2015
  • 9. poll: what capability do you most need in a security solution?
  • 11. CASB: a better approach to cloud security identity discovery data-centric security mobile
  • 12. casb discovery: gain visibility into your org’s cloud usage ■ analyze outbound data flows to learn what SaaS apps your organization is using ■ understand risk profiles of different apps ■ essential in process of enabling secure cloud app usage
  • 13. casb security: a data-centric approach the new data reality requires a new security architecture ■ cross-device, cross-platform agentless data protection ■ granular DLP for data at rest and in motion ■ contextual access control ■ detailed logging for compliance and audit
  • 14. agentless byod security: achieve compliance and drive adoption ■ secure devices without invasive profiles or certificates ■ solve the multiple affiliations problem ■ device and OS independent ■ selectively wipe corporate data ■ enforce device security policies ■ full data control and visibility for IT
  • 15. casb identity: centralized identity management is key in securing data ■ cloud app identity management should maintain the best practices of on-prem identity ■ SSO enables cross-app visibility into suspicious access activity ■ contextual multi-factor authentication mitigates risk
  • 16. needs: ■ ensure security of PHI in Google Apps and on BYOD ■ maintain HIPAA compliance key features: ■ DLP ■ visibility / audit ■ identity management ■ mobile data protection bay cove human services ■ 2500+ employees ■ 160 locations ■ northeastern US
  • 17. situation: ■ existing solution, AT&T Toggle, obsolete needs: ■ respect user privacy ■ support future O365 migration ■ HIPAA compliance key features: ■ DLP policies applied to PHI ■ selective wipe, enforce device PIN and encryption US hospital system ■ 2500+ employees ■ 160 locations ■ northeastern US ■ 7000 employees ■ southeastern US
  • 18. resources: more info about byod ■ healthcare breach report ■ bay cove human services: case study ■ ESG Lab product review
  • 19. download the full healthcare breach report in 2015 one in three Americans were victims of healthcare data breaches due to hacking download the report

Editor's Notes

  1. What do you see as the biggest threats to healthcare data? Phished employee credentials Lost or stolen devices Unauthorized access from employees Brute-force attacks
  2. What do you see as the biggest threats to healthcare data? Phished employee credentials Lost or stolen devices Unauthorized access from employees Brute-force attacks
  3. BYOD has long been a part of IT in higher education Most universities have migrated to a cloud app such as Google Apps or O365 in the last year 23% of institutions had cloud apps deployed in 2014. 83% of institutions had cloud apps deployed by 2015. Only 20% of institutions use single sign-on Needs of universities: Secure unsanctioned apps like Dropbox and Box, widely used but unsecured. Secure other cloud apps. Provide DLP, not native to solutions like Dropbox. Control access from BYOD.
  4. Users are actively pushing against invasive tools that give employers control of their personal data on personal devices. In fact, these stats show that many employees simply refuse to adopt MDM and MAM. Even IT professionals, those who purchase these solutions with the knowledge they will be deployed in the organization and have a deep familiarity with the functions and capabilities of these tools, refuse to participate.
  5. What capability do you most need in a security solution? Visibility into how data is shared Control over access from unmanaged devices Data leakage prevention Ability to remotely wipe devices Enforce device PIN or encryption
  6. The old approach to the problem is to secure the infrastructure. Secure your network, put agents on every trusted device to manage the device etc. Fact is that the "trusted device" approach makes you more vulnerable to breaches since users take their devices home for the weekend, and come back infected on monday. Malware Mondays! and expensive to administer since you have to manage every device and network. And usability is poor too. One of the big problems with this architecture -- unmanaged devices accessing the cloud directly. No visibility or control for IT teams. Complex to deploy/ Poor user experience/ Data-sync proliferation/ BYOD blindspot
  7. 2500 employees
  8. 2500 employees