Why Your Firewall Strategy Isnt Working: Better Protect Your - - PowerPoint PPT Presentation

why your firewall strategy isn t working better protect
SMART_READER_LITE
LIVE PREVIEW

Why Your Firewall Strategy Isnt Working: Better Protect Your - - PowerPoint PPT Presentation

Why Your Firewall Strategy Isnt Working: Better Protect Your Organization Don Kopanoff Healthcare Business Development HEALTHCARE SECURITY CHALLENGES THREE HEALTHCARE ATTACK VECTORS HOSPITAL 44% OF ALL BREACH IN 2013 ARE HEALTHCARE


slide-1
SLIDE 1

Why Your Firewall Strategy Isn’t Working: Better Protect Your Organization Don Kopanoff – Healthcare Business Development

slide-2
SLIDE 2

HEALTHCARE SECURITY CHALLENGES

slide-3
SLIDE 3

THREE HEALTHCARE ATTACK VECTORS

DRUG INFUSION PUMPS IMPLANTABLE CARDIAC DEFIBRILLATORS ELECTRONIC MEDICAL RECORDS

MEDICAL INFORMATION CENTER

HOSPITAL

TRADITIONAL ATTACK

44% OF ALL BREACH IN 2013 ARE HEALTHCARE

—Identity Theft Resource Center

TRANSFORMED CARE

MOBILE APPLICATIONS WEARABLES REMOTE HEALTH MONITORING VIRTUAL CARE X-RAYS REFRIGERATION UNITS CT SCANNERS

slide-4
SLIDE 4

HIGH VALUE OF PHI

10

A medical record is worth ten times more than a credit card number

X

slide-5
SLIDE 5

MEDICAL INFORMATION VULNERABILITY

DRUG INFUSION PUMPS IMPLANTABLE CARDIAC DEFIBRILLATORS X-RAYS CT SCANNERS REFRIGERATION UNITS ELECTRONIC MEDICAL RECORDS

slide-6
SLIDE 6

TRANSFORMED HC IS A HOTBED FOR CYBER SECURITY ACTIVITY

Pharmacies

Pharma Physician Offices

Long Term Care

Government Medical Suppliers

Academic Medical Centers Ambulatory Registries

Payers Hospitals

Lab Facilities Private Insurance

Diagnostic Imaging Centers

Industry

Home Health

HIE EHR

Telehealth ACOs

Secure Patient Data

  • Digitizing patient record
  • Sharing patient information

across HLS ecosystem

  • Data-based collaborative care
  • Analytics to enhance care
  • Electronic registries for

population health

  • Personal medicine

Data Explosion = Too many ways in and unprecedented security risk

slide-7
SLIDE 7

US HEALTHCARE - ANATOMY OF A BREACH

REGIONAL HEALTH SYSTEM LARGE HEALTH SYSTEM TEACHING HEALTH SYSTEM

Cyberattack affecting 4.5 million individuals

4 laptops stolen 4.5M patient records (no encryption) Paid the OCR $4.8 million after 6800 patient records were exposed

2015 2020

Heartbleed bug was part of strategy Most attacks are based on missing the basic checklist

2015 - 50% of healthcare organizations experienced 1 – 5 cyber attacks (IDC) 1 in 3 deemed successful By 2020- 42% of all healthcare data created in the Digital Universe will be unprotected.

slide-8
SLIDE 8

DEFENSE STRATEGY FOR ADVANCED THREATS

Spam Malicious Link Exploit Malware Spam Malicious Link Exploit Malware Bot Commands & Stolen Data Bot Commands & Stolen Data

Sandbox

Malicious Email Malicious Web Site Command & Control Center Anti-spam Web Filtering Intrusion Prevention Antivirus App Control/ IP Reputation ePHI

slide-9
SLIDE 9

HEALTHCARE USE CASES

slide-10
SLIDE 10

USE CASE- SEGMENTING INTERNAL NETWORKS

slide-11
SLIDE 11

USE CASE: SECURE WIRELESS AND PRESENCE ANALYTICS

BLOCKED IT

slide-12
SLIDE 12

HEALTHCARE’S NEW BATTLE GROUND

Mobile applications Wearables Remote health monitoring Virtual care

THE NEXT THREAT

70% of healthcare organizations will invest in consumer-facing mobile apps, wearables, home monitoring, and virtual care by 2018.

slide-13
SLIDE 13

Thank you for your time.

For more info:

dkopanoff@fortinet.com / @dkopanoff / 770.377.5551 www.fortinet.com/healthcare @FortinetHealth