why your firewall strategy isn t working better protect
play

Why Your Firewall Strategy Isnt Working: Better Protect Your - PowerPoint PPT Presentation

Why Your Firewall Strategy Isnt Working: Better Protect Your Organization Don Kopanoff Healthcare Business Development HEALTHCARE SECURITY CHALLENGES THREE HEALTHCARE ATTACK VECTORS HOSPITAL 44% OF ALL BREACH IN 2013 ARE HEALTHCARE


  1. Why Your Firewall Strategy Isn’t Working: Better Protect Your Organization Don Kopanoff – Healthcare Business Development

  2. HEALTHCARE SECURITY CHALLENGES

  3. THREE HEALTHCARE ATTACK VECTORS HOSPITAL 44% OF ALL BREACH IN 2013 ARE HEALTHCARE —Identity Theft Resource Center TRADITIONAL ATTACK IMPLANTABLE CARDIAC DEFIBRILLATORS DRUG INFUSION PUMPS WEARABLES X-RAYS VIRTUAL ELECTRONIC MOBILE CT SCANNERS REMOTE HEALTH CARE MEDICAL RECORDS REFRIGERATION UNITS APPLICATIONS MONITORING MEDICAL INFORMATION CENTER TRANSFORMED CARE

  4. HIGH VALUE OF PHI 10 X A medical record is worth ten times more than a credit card number

  5. MEDICAL INFORMATION VULNERABILITY IMPLANTABLE DRUG INFUSION PUMPS CARDIAC DEFIBRILLATORS X-RAYS ELECTRONIC REFRIGERATION UNITS CT SCANNERS MEDICAL RECORDS

  6. TRANSFORMED HC IS A HOTBED FOR CYBER SECURITY ACTIVITY  Digitizing patient record Academic Home Health Long Term Medical Centers Care  Sharing patient information HIE Pharma Hospitals across HLS ecosystem ACOs  Data-based collaborative care Government  Analytics to enhance care Telehealth Diagnostic  Electronic registries for Imaging Centers population health Secure Industry Patient Data Payers  Personal medicine EHR Data Explosion = Too many ways in Physician Lab Facilities Offices and unprecedented security risk Medical Suppliers Ambulatory Private Pharmacies Insurance Registries

  7. US HEALTHCARE - ANATOMY OF A BREACH REGIONAL HEALTH SYSTEM LARGE HEALTH SYSTEM TEACHING HEALTH SYSTEM Cyberattack Heartbleed Most attacks affecting bug was are based on 4 laptops 4.5M patient records Paid the OCR $4.8 million after 6800 4.5 million part of missing the stolen (no encryption) patient records were exposed individuals strategy basic checklist 2015 - 50% of healthcare organizations experienced 1 – 5 cyber attacks (IDC) 1 in 3 deemed successful 2020 2015 By 2020- 42% of all healthcare data created in the Digital Universe will be unprotected .

  8. DEFENSE STRATEGY FOR ADVANCED THREATS Spam Spam Anti-spam Malicious Email Malicious Malicious Sandbox Web Filtering Link Link ePHI Malicious Exploit Exploit Web Site Intrusion Prevention Malware Malware Command & Antivirus Control Center Bot Commands Bot Commands & Stolen Data & Stolen Data App Control/ IP Reputation

  9. HEALTHCARE USE CASES

  10. USE CASE- SEGMENTING INTERNAL NETWORKS

  11. USE CASE: SECURE WIRELESS AND PRESENCE ANALYTICS BLOCKED IT

  12. HEALTHCARE’S NEW BATTLE GROUND Mobile Wearables Remote health Virtual applications monitoring care THE NEXT THREAT 70% of healthcare organizations will invest in consumer-facing mobile apps, wearables, home monitoring, and virtual care by 2018.

  13. Thank you for your time. For more info: dkopanoff@fortinet.com / @dkopanoff / 770.377.5551 www.fortinet.com/healthcare @FortinetHealth

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend