@HISA_HIC #HIC18
Mr Jorge Silveira
Executive Director of Information Management & Chief Information Officer
Code Yellow - Cybersecurity Process-based cyber incident response
Northeast Health Wangaratta
Process-based cyber incident response Mr Jorge Silveira Executive - - PowerPoint PPT Presentation
Code Yellow - Cybersecurity Process-based cyber incident response Mr Jorge Silveira Executive Director of Information Management & Chief Information Officer Northeast Health Wangaratta @HISA_HIC #HIC18 Introduction about
@HISA_HIC #HIC18
Mr Jorge Silveira
Executive Director of Information Management & Chief Information Officer
Northeast Health Wangaratta
@HISA_HIC #HIC18
@HISA_HIC #HIC18
@HISA_HIC #HIC18
@HISA_HIC #HIC18
1. Desktop exercises a) Internal validation and review b) External validation and review c) Sector validation and review 2. Actual incident
@HISA_HIC #HIC18
@HISA_HIC #HIC18
@HISA_HIC #HIC18
@HISA_HIC #HIC18
message
and messages were originating from our mail servers
@HISA_HIC #HIC18
09:55 am
The following immediate containment actions took place:
By 10:03 am
10:05 am
The following actions were added to the containment plan:
@HISA_HIC #HIC18
11:41 am
Good progress reviewing logs, but the combination of the following:
1. Confirmed Cybersecurity Incident 2. Root-cause analysis in progress 3. Clear understanding of incident impact (which was still in progress)
Prompted the CIO to call “Code Yellow – Information Technology” until certainty and assurance of no further damage and containment was provided.
12:00 pm
12:30 pm
@HISA_HIC #HIC18
the OWA public interface and a single compromised account
precautionary measure
@HISA_HIC #HIC18
1. How did I feel when realizing one of the systems I am trusted to protect may have been compromised?
A: Not good really… but I knew it will one day, will happen to all of us... Not a matter of IF, but WHEN…
A: Have structure that will guide you through: a) A cybersecurity code yellow process b) An Incident Response Plan (IRP) c) An Incident Response Team (IRT) d) Access to cybersecurity professionals e) Cybersecurity insurance f) Communication templates ready (write them before an incident)
@HISA_HIC #HIC18
@HISA_HIC #HIC18
@HISA_HIC #HIC18
1. Other opportunities for improvement:
a) Email filtering did not detect the avalanche of emails being sent (service provided by 3rd party) b) There was no formal procedure to assess SPAM messages when reported to service desk
levels
responsibility between various staff members
@HISA_HIC #HIC18
people and process also have their contribution to a cyber safe environment
conversations with third-party providers ongoing to acquire details of services provided and better understand risk
that you establish one
@HISA_HIC #HIC18