SlideShare a Scribd company logo
Celebrating a decade
of guiding security
professionals.
@Secure360 or #Sec360 www.Secure360.org
Wearing My Heart on My Sleeve…
Literally!
Barry Caplin
Tues. May 12, 2015, 11A
Wearing My Heart On
My Sleeve…
Literally!
Secure360
Tues. May 12, 2015
bcaplin1@fairview.org
bc@bjb.org @bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Barry Caplin
VP, Chief Information Security Officer
Fairview Health Services
http://about.me/barrycaplin
securityandcoffee.blogspot.com
@bcaplin
Fairview Overview
• Not-for-profit established in 1906
• Academic Health System since 1997
partnership with University of Minnesota
• >22K employees
• >3,300 aligned physicians
 Employed, faculty, independent
• 7 hospitals/medical centers
(>2,500 staffed beds)
• 40-plus primary care clinics
• 55-plus specialty clinics
• 47 senior housing locations
• 30-plus retail pharmacies
4
2012 data
•5.7 million outpatient encounters
•74,649 inpatient admissions
•$2.8 billion total assets
•$3.2 billion total revenue
Who is Fairview?
A partnership of North Memorial and Fairview
Agenda
• WTF?
• Who’s Watching?
• You’re doing what with my data?
• You can’t see me… I’m anonymized!
• Security Challenges for home and work
“I asked you not to
tell me that!”
Who’s got?...
8
Apr. 3, 2010
300K ipads
1M apps
250K ebooks
… day 1!
2011 – tablet/smartphone sales exceeded PCs
10
Apr. 24, 2015
1M orders
2500 apps
available
… day 1!
2016 – IOT sales exceed smartphone+tablet
2011 – tablet/smartphone sales exceeded PCs
Got Fitness?
High Hopes?
Consumers:
Not yet embraced
Don’t want to pay too much
Skeptical about social sharing
Concerned about Privacy
Who’s Watching?
2014 FTC report on Data Brokers
•Combine online & offline – often without consent
- Purchases
- Social Media
- Warranty info
- Subscriptions
- Affiliations
•They share
•Analysis creates Inference
•Regulation proposed
Back To The Future!
1997
2013
Example TOS/Privacy – Fitness device
• 13 or older
• Account with valid email
• Rules about posting content
• You own your content
• Use at your own risk
• Consult doctor before exercising
• “Use Common Sense”/Wear & Care – skin
• 3rd
party disclaimer
• Indemnity
• Limitation of Liability/Dispute Resolution
Example TOS/Privacy – Fitness device
• Only collect data useful to improving products, services,
experience
• Transparency
• Never sell PII (can opt-in)
• Take security seriously
• Info:
• Email address, pw, nickname, dob
• Oauth: name, profile pic, friend list, phone contact list (friend id – not saved)
• Web logs incl. IP
• Cookies – don’t honor DNT – AppNexus, DataXu, DblClick, Google AdWords,
AdRoll, Twitter, LiveRamp, Advertising.com, Bidswitch, Facebook, Genome,
SearchForce
• Analytics – Mixpanel, Google Analytics, New Relic, KissInsights, Optimizely
• Friends’ contact info
• Location – GPS, WiFi APs, cell tower IDs
Example TOS/Privacy – Fitness device
• De-Identified data -> health community, marketing,
for sale
• PII shared with:
• Order fulfillment, email mgmt., CC processing firms
• Legal or Gov’t request
• Merger, sale or reorg
• Anyone user specifies (third party apps)
Who’s Watching?
2014 FTC report on Data Brokers
•Combine online & offline – often without consent
- Purchases
- Social Media
- Warranty info
- Subscriptions
- Affiliations
•They share
•Analysis creates Inference
•Regulation proposed
Data Brokers collect
• Basic ID data – name, address
• ++ – ssn, license #
• Demographics – A/S/L, race, employment, religion
• Court records – bankruptcy, criminal, domestic
• Home/Neighborhood – rent/loan info
• Interests
• Financial – credit, income, net
• Vehicle – brand, new/used
• Travel – preferences
• Purchase behaviors
• Health – tobacco, allergies, glasses, supplements
De-Identi-what?
• 2000 study – 87% census ID’d using: zip, d.o.b., gender
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006
• 2013 – 40% of genome participants ID’d
• 2008 – 80% ID’d using when/how for 3 Netflix ratings
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4531148
• Feb deal between Facebook, Acxiom and other data
brokers
−Acxiom data linked to 90% of US social profiles
• MIT – 4 phone position samples to link to specific person
http://www.technologyreview.com/news/513016/how-wireless-carriers-are-monetizing-your-
movements/
https://epic.org/privacy/reidentification/ + MIT + UCLA
De-Identi-what?
(re-identification)
(De-anonymization)
Data Exfil
• Data explicitly given
• Implicitly but known (phone, Google Now)
• Implicitly but unknown
• Transitive Consent
Is Privacy Dead?
• Just the definition!
• Privacy is about control
• You must have the ability to decide:
− What
− When
− How, and
− With whom
You share your personal data
• What’s in it for you
“Magic Quadrant” of Data Leak Pain
No/Yes Huh?
Unknown
Choice
Known
How
Much
Future Shock
• Msoft/U of Rochester (NY)
• GPS + vehicle data
• Where you will be 80 weeks from now – 80%
confidence
http://www.cs.rochester.edu/~sadilek/publications/Sadilek-Krumm_Far-Out_AAAI-12.pdf
Security Challenges
Exposure of data
Leakage of data – sold, donated, tossed,
repaired drives
Poor Design/Protocols
Malware
Integrity
Availability
But don’t we have all this now???
At Work
At Work
• Wearable = portable = stealable
• What data
• How stored – device, phone, computer, component,
cloud
• How backed up (cloud)
• Encryption available?
• Location
• Medical, health info on staff
• Additional info exposure – opportunities for social
engineering
For Work?
• BYOW?
• Employer-provided?
− Badge
− Smartphone
− Glass?
− RTLS?
− Health/fitness monitoring?
− Time – Desk, Meetings, Bathroom, Break, Lunch or
Coffee time?
Additional Attack Vectors
• Glasses or camera-enabled
− Video/pictures
− IP disclosure?
− Glass-jacking?
• Info disclosure and “Bio-
Social Engineering” ©
− AccelerometerTempest
− Negotiation biomarker
disclosure – never let them
see you sweat!
− Human pattern mapping
− Biomarker manipulation
− Augmented Reality
distortion
− Group Movement/Behavior
Medical
• Primary mechanism is… Obscurity
• Focus is on
− Function
− Aesthetics
− Communication
− Cost
− Speed to Market
• Testing?
• Patching?
• Design?
Security
Security
The Real Issue…
CISOs are from Mars
CIOs are from Venus
Secure360
Tues. May 12, 2015 1:30P
bcaplin1@fairview.org
bc@bjb.org @bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Barry Caplin
VP, Chief Information Security Officer
Fairview Health Services
Wearing Your Heart On Your Sleeve - Literally!

More Related Content

What's hot

Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
Tim Rich
 
The Reputation Economy: Protecting your most valuable asset in the age of Google
The Reputation Economy: Protecting your most valuable asset in the age of GoogleThe Reputation Economy: Protecting your most valuable asset in the age of Google
The Reputation Economy: Protecting your most valuable asset in the age of Google
KR_Barker
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)
KR_Barker
 
Beer and Branding for Graduate BioSciences (Oct 2016)
Beer and Branding for Graduate BioSciences (Oct 2016)Beer and Branding for Graduate BioSciences (Oct 2016)
Beer and Branding for Graduate BioSciences (Oct 2016)
KR_Barker
 
The Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsThe Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsJohn Lovett
 
The Reputation Economy (July/2015)
The Reputation Economy (July/2015)The Reputation Economy (July/2015)
The Reputation Economy (July/2015)
KR_Barker
 
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
KR_Barker
 
Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)
Alyanna Marie
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
Hubbamar
 
The Reputation Economy (March 2016)
The Reputation Economy (March 2016)The Reputation Economy (March 2016)
The Reputation Economy (March 2016)
KR_Barker
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
Frederick Lane
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
Donald E. Hester
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
tomasztopa
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
FourthAsAService
 
Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)
KR_Barker
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
Phil Bradley
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
The Lorenzi Group
 
Digital Self
Digital SelfDigital Self
Digital Self
AngeloMirabel
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 

What's hot (20)

Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
The Reputation Economy: Protecting your most valuable asset in the age of Google
The Reputation Economy: Protecting your most valuable asset in the age of GoogleThe Reputation Economy: Protecting your most valuable asset in the age of Google
The Reputation Economy: Protecting your most valuable asset in the age of Google
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)
 
Beer and Branding for Graduate BioSciences (Oct 2016)
Beer and Branding for Graduate BioSciences (Oct 2016)Beer and Branding for Graduate BioSciences (Oct 2016)
Beer and Branding for Graduate BioSciences (Oct 2016)
 
The Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsThe Web Analyst's Code of Ethics
The Web Analyst's Code of Ethics
 
The Reputation Economy (July/2015)
The Reputation Economy (July/2015)The Reputation Economy (July/2015)
The Reputation Economy (July/2015)
 
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
 
Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
The Reputation Economy (March 2016)
The Reputation Economy (March 2016)The Reputation Economy (March 2016)
The Reputation Economy (March 2016)
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
 
Digital Self
Digital SelfDigital Self
Digital Self
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 

Viewers also liked

Recorte Web - UPA - MediaIN
Recorte Web - UPA - MediaINRecorte Web - UPA - MediaIN
Recorte Web - UPA - MediaIN
Joel Mussiett Fernández
 
Konzept 100.tagesschau.mobi
Konzept 100.tagesschau.mobiKonzept 100.tagesschau.mobi
Konzept 100.tagesschau.mobi
Alex Boerger
 
Service: The Antidote to Greed
Service: The Antidote to GreedService: The Antidote to Greed
Service: The Antidote to Greed
Steve Thomason
 
God Is Always Just
God Is Always JustGod Is Always Just
God Is Always Just
William Harris
 
Certificates attained
Certificates attainedCertificates attained
Certificates attainedKush Dalal
 
KorEsate - Investment Deck
KorEsate - Investment DeckKorEsate - Investment Deck
KorEsate - Investment Deck
Mike De'Shazer
 
Grafico diario del dax perfomance index para el 13 02-2012
Grafico diario del dax perfomance index para el 13 02-2012Grafico diario del dax perfomance index para el 13 02-2012
Grafico diario del dax perfomance index para el 13 02-2012Experiencia Trading
 
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1f' yagami
 
LOS HIJOS
LOS HIJOSLOS HIJOS
LOS HIJOS
MarriceFerrer
 
Creating a Better Protective Suit Against Ebola
Creating a Better Protective Suit Against EbolaCreating a Better Protective Suit Against Ebola
Creating a Better Protective Suit Against Ebola
Sapient Consulting
 
La escuela y yo
La  escuela y yoLa  escuela y yo
Britain 2012 and the implications for government communication
Britain 2012 and the implications for government communicationBritain 2012 and the implications for government communication
Britain 2012 and the implications for government communication
Ipsos UK
 
Exploring Augmented Reality for Practical Purposes
Exploring Augmented Reality  for Practical PurposesExploring Augmented Reality  for Practical Purposes
Exploring Augmented Reality for Practical Purposes
Sapient Consulting
 
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Urban Habitat
 
Infographics Creation Guide
Infographics Creation GuideInfographics Creation Guide
Infographics Creation Guide
Sapient Consulting
 
KorEstate
KorEstate KorEstate
KorEstate
Mike De'Shazer
 
Presentation1
Presentation1Presentation1
Presentation1marj3
 
SEO Research Survey: Common SEO Assumptions and Real User Feedback
SEO Research Survey: Common SEO Assumptions and Real User FeedbackSEO Research Survey: Common SEO Assumptions and Real User Feedback
SEO Research Survey: Common SEO Assumptions and Real User Feedback
Eli Schwartz
 
Presentacion simuladores
Presentacion simuladoresPresentacion simuladores
Presentacion simuladores
geraldin11
 
Gartner Supply Chain Executive Conference 2013
Gartner Supply Chain Executive Conference 2013 Gartner Supply Chain Executive Conference 2013
Gartner Supply Chain Executive Conference 2013
Yakuzaazero
 

Viewers also liked (20)

Recorte Web - UPA - MediaIN
Recorte Web - UPA - MediaINRecorte Web - UPA - MediaIN
Recorte Web - UPA - MediaIN
 
Konzept 100.tagesschau.mobi
Konzept 100.tagesschau.mobiKonzept 100.tagesschau.mobi
Konzept 100.tagesschau.mobi
 
Service: The Antidote to Greed
Service: The Antidote to GreedService: The Antidote to Greed
Service: The Antidote to Greed
 
God Is Always Just
God Is Always JustGod Is Always Just
God Is Always Just
 
Certificates attained
Certificates attainedCertificates attained
Certificates attained
 
KorEsate - Investment Deck
KorEsate - Investment DeckKorEsate - Investment Deck
KorEsate - Investment Deck
 
Grafico diario del dax perfomance index para el 13 02-2012
Grafico diario del dax perfomance index para el 13 02-2012Grafico diario del dax perfomance index para el 13 02-2012
Grafico diario del dax perfomance index para el 13 02-2012
 
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
 
LOS HIJOS
LOS HIJOSLOS HIJOS
LOS HIJOS
 
Creating a Better Protective Suit Against Ebola
Creating a Better Protective Suit Against EbolaCreating a Better Protective Suit Against Ebola
Creating a Better Protective Suit Against Ebola
 
La escuela y yo
La  escuela y yoLa  escuela y yo
La escuela y yo
 
Britain 2012 and the implications for government communication
Britain 2012 and the implications for government communicationBritain 2012 and the implications for government communication
Britain 2012 and the implications for government communication
 
Exploring Augmented Reality for Practical Purposes
Exploring Augmented Reality  for Practical PurposesExploring Augmented Reality  for Practical Purposes
Exploring Augmented Reality for Practical Purposes
 
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
 
Infographics Creation Guide
Infographics Creation GuideInfographics Creation Guide
Infographics Creation Guide
 
KorEstate
KorEstate KorEstate
KorEstate
 
Presentation1
Presentation1Presentation1
Presentation1
 
SEO Research Survey: Common SEO Assumptions and Real User Feedback
SEO Research Survey: Common SEO Assumptions and Real User FeedbackSEO Research Survey: Common SEO Assumptions and Real User Feedback
SEO Research Survey: Common SEO Assumptions and Real User Feedback
 
Presentacion simuladores
Presentacion simuladoresPresentacion simuladores
Presentacion simuladores
 
Gartner Supply Chain Executive Conference 2013
Gartner Supply Chain Executive Conference 2013 Gartner Supply Chain Executive Conference 2013
Gartner Supply Chain Executive Conference 2013
 

Similar to Wearing Your Heart On Your Sleeve - Literally!

Respect Thy Data: The Gospel
Respect Thy Data: The GospelRespect Thy Data: The Gospel
Respect Thy Data: The Gospel
Jill Gilbert
 
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
m Habitat
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
Barry Caplin
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
Barry Caplin
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
Stephen Cobb
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
StampedeCon
 
Sdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) finalSdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) final
kimlyman
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Rebecca Leitch
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Security Innovation
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
Joshua Johnston
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
Tom Walker
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare Privacy
Vivian Motti
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare Privacy
Vivian Motti
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
Nicholas Davis
 
Flextracker incuba uc high technology
Flextracker   incuba uc high technologyFlextracker   incuba uc high technology
Flextracker incuba uc high technologyLaercio Simões
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
StephenGwadi
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
Data-Set
 
MDYA 360: Improving At-Risk Youth’s Future
MDYA 360: Improving At-Risk Youth’s Future MDYA 360: Improving At-Risk Youth’s Future
MDYA 360: Improving At-Risk Youth’s Future
Qualtrics
 
Big Data and You
Big Data and YouBig Data and You
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Jan Wiegelmann
 

Similar to Wearing Your Heart On Your Sleeve - Literally! (20)

Respect Thy Data: The Gospel
Respect Thy Data: The GospelRespect Thy Data: The Gospel
Respect Thy Data: The Gospel
 
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
 
Sdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) finalSdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) final
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare Privacy
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare Privacy
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Flextracker incuba uc high technology
Flextracker   incuba uc high technologyFlextracker   incuba uc high technology
Flextracker incuba uc high technology
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
MDYA 360: Improving At-Risk Youth’s Future
MDYA 360: Improving At-Risk Youth’s Future MDYA 360: Improving At-Risk Youth’s Future
MDYA 360: Improving At-Risk Youth’s Future
 
Big Data and You
Big Data and YouBig Data and You
Big Data and You
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital Transformation
 

More from Barry Caplin

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
Barry Caplin
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
Barry Caplin
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
Barry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
Barry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
Barry Caplin
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
Barry Caplin
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
Barry Caplin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Barry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
Barry Caplin
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
Barry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
Barry Caplin
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Barry Caplin
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
Barry Caplin
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
Barry Caplin
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness Program
Barry Caplin
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
Barry Caplin
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 

More from Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness Program
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Wearing Your Heart On Your Sleeve - Literally!

  • 1. Celebrating a decade of guiding security professionals. @Secure360 or #Sec360 www.Secure360.org Wearing My Heart on My Sleeve… Literally! Barry Caplin Tues. May 12, 2015, 11A
  • 2. Wearing My Heart On My Sleeve… Literally! Secure360 Tues. May 12, 2015 bcaplin1@fairview.org bc@bjb.org @bcaplin http://about.me/barrycaplin http://securityandcoffee.blogspot.com Barry Caplin VP, Chief Information Security Officer Fairview Health Services
  • 4. Fairview Overview • Not-for-profit established in 1906 • Academic Health System since 1997 partnership with University of Minnesota • >22K employees • >3,300 aligned physicians  Employed, faculty, independent • 7 hospitals/medical centers (>2,500 staffed beds) • 40-plus primary care clinics • 55-plus specialty clinics • 47 senior housing locations • 30-plus retail pharmacies 4 2012 data •5.7 million outpatient encounters •74,649 inpatient admissions •$2.8 billion total assets •$3.2 billion total revenue
  • 5. Who is Fairview? A partnership of North Memorial and Fairview
  • 6. Agenda • WTF? • Who’s Watching? • You’re doing what with my data? • You can’t see me… I’m anonymized! • Security Challenges for home and work
  • 7. “I asked you not to tell me that!” Who’s got?...
  • 8. 8 Apr. 3, 2010 300K ipads 1M apps 250K ebooks … day 1!
  • 9. 2011 – tablet/smartphone sales exceeded PCs
  • 10. 10 Apr. 24, 2015 1M orders 2500 apps available … day 1!
  • 11. 2016 – IOT sales exceed smartphone+tablet
  • 12. 2011 – tablet/smartphone sales exceeded PCs
  • 13.
  • 15. High Hopes? Consumers: Not yet embraced Don’t want to pay too much Skeptical about social sharing Concerned about Privacy
  • 16. Who’s Watching? 2014 FTC report on Data Brokers •Combine online & offline – often without consent - Purchases - Social Media - Warranty info - Subscriptions - Affiliations •They share •Analysis creates Inference •Regulation proposed
  • 17. Back To The Future!
  • 18. 1997
  • 19. 2013
  • 20. Example TOS/Privacy – Fitness device • 13 or older • Account with valid email • Rules about posting content • You own your content • Use at your own risk • Consult doctor before exercising • “Use Common Sense”/Wear & Care – skin • 3rd party disclaimer • Indemnity • Limitation of Liability/Dispute Resolution
  • 21. Example TOS/Privacy – Fitness device • Only collect data useful to improving products, services, experience • Transparency • Never sell PII (can opt-in) • Take security seriously • Info: • Email address, pw, nickname, dob • Oauth: name, profile pic, friend list, phone contact list (friend id – not saved) • Web logs incl. IP • Cookies – don’t honor DNT – AppNexus, DataXu, DblClick, Google AdWords, AdRoll, Twitter, LiveRamp, Advertising.com, Bidswitch, Facebook, Genome, SearchForce • Analytics – Mixpanel, Google Analytics, New Relic, KissInsights, Optimizely • Friends’ contact info • Location – GPS, WiFi APs, cell tower IDs
  • 22. Example TOS/Privacy – Fitness device • De-Identified data -> health community, marketing, for sale • PII shared with: • Order fulfillment, email mgmt., CC processing firms • Legal or Gov’t request • Merger, sale or reorg • Anyone user specifies (third party apps)
  • 23.
  • 24. Who’s Watching? 2014 FTC report on Data Brokers •Combine online & offline – often without consent - Purchases - Social Media - Warranty info - Subscriptions - Affiliations •They share •Analysis creates Inference •Regulation proposed
  • 25. Data Brokers collect • Basic ID data – name, address • ++ – ssn, license # • Demographics – A/S/L, race, employment, religion • Court records – bankruptcy, criminal, domestic • Home/Neighborhood – rent/loan info • Interests • Financial – credit, income, net • Vehicle – brand, new/used • Travel – preferences • Purchase behaviors • Health – tobacco, allergies, glasses, supplements
  • 26. De-Identi-what? • 2000 study – 87% census ID’d using: zip, d.o.b., gender http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006 • 2013 – 40% of genome participants ID’d • 2008 – 80% ID’d using when/how for 3 Netflix ratings http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4531148 • Feb deal between Facebook, Acxiom and other data brokers −Acxiom data linked to 90% of US social profiles • MIT – 4 phone position samples to link to specific person http://www.technologyreview.com/news/513016/how-wireless-carriers-are-monetizing-your- movements/ https://epic.org/privacy/reidentification/ + MIT + UCLA
  • 28. Data Exfil • Data explicitly given • Implicitly but known (phone, Google Now) • Implicitly but unknown • Transitive Consent
  • 29. Is Privacy Dead? • Just the definition! • Privacy is about control • You must have the ability to decide: − What − When − How, and − With whom You share your personal data • What’s in it for you
  • 30. “Magic Quadrant” of Data Leak Pain No/Yes Huh? Unknown Choice Known How Much
  • 31. Future Shock • Msoft/U of Rochester (NY) • GPS + vehicle data • Where you will be 80 weeks from now – 80% confidence http://www.cs.rochester.edu/~sadilek/publications/Sadilek-Krumm_Far-Out_AAAI-12.pdf
  • 32. Security Challenges Exposure of data Leakage of data – sold, donated, tossed, repaired drives Poor Design/Protocols Malware Integrity Availability But don’t we have all this now???
  • 33.
  • 35. At Work • Wearable = portable = stealable • What data • How stored – device, phone, computer, component, cloud • How backed up (cloud) • Encryption available? • Location • Medical, health info on staff • Additional info exposure – opportunities for social engineering
  • 36. For Work? • BYOW? • Employer-provided? − Badge − Smartphone − Glass? − RTLS? − Health/fitness monitoring? − Time – Desk, Meetings, Bathroom, Break, Lunch or Coffee time?
  • 37. Additional Attack Vectors • Glasses or camera-enabled − Video/pictures − IP disclosure? − Glass-jacking? • Info disclosure and “Bio- Social Engineering” © − AccelerometerTempest − Negotiation biomarker disclosure – never let them see you sweat! − Human pattern mapping − Biomarker manipulation − Augmented Reality distortion − Group Movement/Behavior
  • 38.
  • 40. • Primary mechanism is… Obscurity • Focus is on − Function − Aesthetics − Communication − Cost − Speed to Market • Testing? • Patching? • Design? Security
  • 43.
  • 44. CISOs are from Mars CIOs are from Venus Secure360 Tues. May 12, 2015 1:30P bcaplin1@fairview.org bc@bjb.org @bcaplin http://about.me/barrycaplin http://securityandcoffee.blogspot.com Barry Caplin VP, Chief Information Security Officer Fairview Health Services

Editor's Notes

  1. Talk based on 7 parts of 5 part blog series (blog link, twitter link) Check out my about.me, with links to twitter feed and Security and Coffee blog.
  2. https://www.ftc.gov/news-events/press-releases/2014/05/ftc-recommends-congress-require-data-broker-industry-be-more
  3. AppleWatch 2015; iPad 2010; iPhone 2007; Android/Youtube 2005 In 2004, the ACLU produced a satiric video called “Ordering Pizza in 2015” that has become the single most-downloaded piece of content we’ve ever produced (at least we believe in the absence of complete stats). I won’t describe it—you can watch it here if you haven’t seen it—but like many successful viral products, it combined humor with a biting commentary on an all-too-real set of trends.  https://www.aclu.org/blog/aclus-pizza-video-10-years-later
  4. http://thedatamap.org/
  5. http://thedatamap.org/
  6. https://www.fitbit.com/terms
  7. https://www.fitbit.com/privacy
  8. https://www.fitbit.com/privacy
  9. 2.8 zettabytes in 2012; predicted >5.6zb in 2015 http://www.technologyreview.com/news/514351/has-big-data-made-anonymity-impossible/
  10. https://www.ftc.gov/news-events/press-releases/2014/05/ftc-recommends-congress-require-data-broker-industry-be-more
  11. http://www.techrepublic.com/article/the-scary-truth-about-data-security-with-wearables/
  12. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006 Latanya Sweeney, Uniqueness of Simple Demographics in the U.S. Population (Laboratory for Int’l Data Privacy, Working Paper LIDAP-WP4, 2000). For more on this study, see infra Part I.B.1.b. More recently, Philippe Golle revisited Dr. Sweeney’s study, and recalculated the statistics based on year 2000 census data. Dr. Golle could not replicate the earlier 87 percent statistic, but he did calculate that 61 percent of the population in 1990 and 63 percent in 2000 were uniquely identified by ZIP, birth date, and sex. Philippe Golle, Revisiting the Uniqueness of Simple Demographics in the US Population, 5 ACM W ORKSHOP ON P RIVACY IN THE E LEC . S OC ’ Y 77, 78 (2006) http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4531148 We apply our de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's largest online movie rental service. We demonstrate that an adversary who knows only a little bit about an individual subscriber can easily identify this subscriber's record in the dataset. Arvind Narayanan & Vitaly Shmatikov, Robust De-Anonymization of Large Sparse Datasets, in PROC. OF THE 2008 IEEE SYMP. ON SECURITY AND PRIVACY 111, 121 [hereinafter Netflix Prize Study]. For more on this study, see infra Part I.B.1.c. MIT researchers Yves-Alexandre de Montjoye and César A. Hidalgo http://www.technologyreview.com/news/514351/has-big-data-made-anonymity-impossible/
  13. http://aboutmyinfo.org/index.html
  14. Analyzed 32K days worth of GPS data http://www.cs.rochester.edu/~sadilek/publications/Sadilek-Krumm_Far-Out_AAAI-12.pdf
  15. Real-Time Location Service
  16. http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html http://www.secure-medicine.org/public/publications/icd-study.pdf http://www.forbes.com/sites/singularity/2012/12/06/yes-you-can-hack-a-pacemaker-and-other-medical-devices-too/ Before 2006, all pacemaker programming and interrogation was performed using inductive telemetry. Programming using inductive telemetry requires very close skin contact. The programming wand is held up to the chest, a magnetic reed switch is opened on the implant, and the device is then open for programming and/or interrogation. Communication is near field (sub 1MHZ), and data rates are less than 50KHZ.The obvious drawback to inductive telemetry is the extremely close range required. To remedy this, manufacturers began implementing radiofrequency (RF) communication on their devices and utilized the MICS (Medical Implant Communication Service) frequency band. MICS operates in the 402-405MHZ band and offers interrogation and programming from greater distances, with faster transfer speeds. In 2006, the FDA began approving fully wireless-5based pacemakers and ICDs.Recent remote monitors/bedside transmitters and pacemaker/ICD programmers support both inductive telemetry as well as RF communication. When communicating with RF implantable devices, the devices typically pair with the programmer or transmitter by using the serial number, or the serial number and model number. It's important to note that currently the bedside transmitters do not allow a physician to dial into the devices and reprogram the devices. The transmitter can only dial out. http://arstechnica.com/security/2012/08/medical-device-hack-attacks/ http://www.telegraph.co.uk/news/science/science-news/11212777/Terrorists-could-hack-pacemakers-like-in-Homeland-say-security-experts.html