Riverside Healthcare Accelerate Tech 2016 presentation

13
Key Tools to Combat CyberSecurity Threats Erik J. Devine, CISO Riverside Healthcare

Transcript of Riverside Healthcare Accelerate Tech 2016 presentation

Page 1: Riverside Healthcare Accelerate Tech 2016 presentation

Key Tools to Combat CyberSecurity ThreatsErik J. Devine, CISORiverside Healthcare

Page 2: Riverside Healthcare Accelerate Tech 2016 presentation

Expectations and Disclosures

These “tools” will not guarantee you from being hacked or having a data breach

No vendors will be promoted or criticized

Please make comments, or ask questions during presentation.

Someone in this audience is having a breach right now, and probably doesn’t know it, hopefully that someone is not me…..

Page 3: Riverside Healthcare Accelerate Tech 2016 presentation

2016 State of Cybersecurity

Only 40% of businesses can handle simple attacks

74% of businesses expect to be affected by an attack

30% of businesses see a phishing attack at least once a day

About 25% of business don’t know that their credentials were stolen, who stole them, or how they were used

Page 4: Riverside Healthcare Accelerate Tech 2016 presentation

The Bad and The Good1.02 Billion Data Records were stolen in 2014

707.5 Million Data Records were stolen in 2015

867 Million Data Records stolen so far in 2016 (Jan-Aug)

This equates to 42 records stolen per second.

Cost of a record being breached?

$158 / record

Page 5: Riverside Healthcare Accelerate Tech 2016 presentation

Breaking the Tools Down

Page 6: Riverside Healthcare Accelerate Tech 2016 presentation

Breaking down Security and Privacy

ComplianceTechnology

Awareness

RelationshipStrategic Planning

Page 7: Riverside Healthcare Accelerate Tech 2016 presentation

Key Technology ToolsFirewalls - Create Segregation with UTM Services

Endpoint Security

Application Control (Endpoint and Edge)

Patch Management

Security Event Information Management

Email Encryption, SPAM and A/V

Full Disk Encryption

Device Management

Sandboxes / File Integrity Checking

Page 8: Riverside Healthcare Accelerate Tech 2016 presentation

Key Compliance ToolsUpdated Policies and Procedures, Cybersecurity Frameworks

3rd Party review of Policies, Procedures and Technology

Regulated business making sure they are up on today’s audits and reviews.

Knowing where your data is at, and who has access to it: inside and outside your organization

Risk Assessments is key

Incident Response Planning and Testing

Page 9: Riverside Healthcare Accelerate Tech 2016 presentation

Key Awareness ToolsInformation Security Reporting Structure

Social Engineering Tests

Yearly Tests for Employees

Community Events / Conferences

Report to Department Meetings and Key Staff Members

Page 10: Riverside Healthcare Accelerate Tech 2016 presentation

Key Strategic Planning ToolsSecurity Feeds from the Internet

Government Security Officials (FBI, DHS, DOD)

Peers and Social Networking

Monitor trends within your own industry and community

Learn how to fail fast

Focus on Information Technology and Workflow

Focus on other Department needs and strategies

Page 11: Riverside Healthcare Accelerate Tech 2016 presentation

Key Relationship ToolsCulture is everything, don’t try to change the world in 7 hours or less

Speak to key personnel (board, management, staff) in their language

Transparent Communication is key

Empower your staff and peers

Empower the employee to help you. I try have 3000+ employees act as my Security Analysts.

Page 12: Riverside Healthcare Accelerate Tech 2016 presentation

Any Questions, Comments, Insults, or Need For Resuscitation?

Page 13: Riverside Healthcare Accelerate Tech 2016 presentation