Stopping PHI Theft with DLP
Real World Scenarios
with DLP Real World Scenarios My Journey into Patient Data - - PowerPoint PPT Presentation
Stopping PHI Theft with DLP Real World Scenarios My Journey into Patient Data Protection 10+ years in Data Loss Prevention Dozens of customer installations across the finance and healthcare industries Chris Leffel My story in
Real World Scenarios
My Journey into Patient Data Protection
Prevention
installations across the finance and healthcare industries
protection really starts 5 years ago… Chris Leffel
Shiva Kashalkar Bio
Services and Advanced Threat Protection
product management experience
Data Analytics companies
3
Shiva Kashalkar
Director, Product Marketing Marketing Professional
Foundations – Get to know your data
Confidential 4
Foundation – How fingerprinting works
Confidential 5 Email Web Network Monitoring Discovery Scanners Endpoint
Common Inspection Engine 600 file formats. Format Independent. Archive files. Language independent. Multibyte
CONTENT RULES
Keywords Regular Expressions Dictionaries File Metadata (Type, Size, Name) File Category DB Record Fingerprints Exact & Partial File Fingerprints
Record1: CustName,AcctNum,SSN Record2: CustName,AcctNum,SSN Record3: CustName,AcctNum,SSN . . .
Examples DB Record Matching CustName AND (AcctNum OR SSN) from Database Partial File Matching Paragraph match from fingerprinted file Patterns Credit Card Number, SSN, Passport Num Regular Expressions Medical Record Number, Email Address Dictionaries HIPAA Code Sets - NDC, LOINC, HCPCS US Addresses
Foundation – Data Base Record Matching
identification and control
Confidential 6
Foundations – Where can your data go?
Confidential 7
Confidential 8
Case Studies
Who sent all that Patient Data to Gmail!
Confidential 9
Who sent all that Patient Data to Gmail!
efficiency… that did not have their own domain and email address
Confidential 10
How did we catch them?
Confidential 11
Internet
smtp
Who uploaded file to the UK?
server in the UK
Confidential 12
Who uploaded file to the UK?
server in the UK
email was blocked the AR person decided to upload the data using a file sharing and collaboration service. The server for the service just happened to be in the UK
Confidential 13
How did we catch them?
Confidential 14
Internet Secure Web Gateway
http/https http/https icap
Who is sending data via FTP?
Confidential 15
Who is sending data via FTP?
This caused the CT to log the full patient record in the system log.
monitoring’ provided by the CT Vendor.
Confidential 16
How did we catch them?
Confidential 17
Internet
tcp/ip tcp/ip Switch
What files can the janitor see?
share without adequate access control
ever treated
Confidential 18
What files can the janitor see?
share without adequate access control
ever treated
too large for the internal IT file share and the main EMC filer was used as a temporary repository.
Confidential 19
How did we catch them?
Confidential 20
File Shares Data Bases Laptops
Summary
framework
Confidential 21
Digital Guardian
Confidential 22
against theft
endpoint - the most challenging use case
data protection with DG appliance
Managed Security Program for DLP
Magic Quadrant Leader Wave Leader
Threat Aware Data Protection
Confidential 23
Deepest Visibility Real-Time Analytics Flexible Controls
Unstructured Data
discovery
down your business
storage, cloud and endpoints
Data Protection Program Framework
Confidential 25
Understand Build Enforce & Educate Assess & Improve CONTROL VISIBILITY ANALYTICS
Understand: What Data to Protect
Confidential 26
Content-based Context-based User-Based
File inspection to identify, tag and fingerprint sensitive data for lowest false positives Identify & tag sensitive data (structured and unstructured) even before you develop policies Enable users to classify sensitive data based on business requirements
Classified
Mac Joe Smith 462-81-5406 42 Wallaby Cook Source/Destination Application Network State Operation Drive Type Time of Day Upload/Download User Computer Classification Email Session
DWG
200+ Parameters
Most comprehensive data discovery & classification on the market today
Understand: When Data is at Risk
Confidential 27
Burn to CD DVD View & Open Network Upload USB Devices Application Launch Email Cloud Application Remote Drives Save to Local Drive Attach to Email Cut & Paste Delete & Recycle File Encrypt File Create Send to Printer Print Screen Connect Device
Build: Smart Policies & Controls Based
Confidential 28
“Digital Guardian helped us change the conversation with business unit leaders.”
Total Egress – 90 Days
Removable Printing Uploads Emails
10,000,000 1,000,000 100,000 10,000 1,000 100 10 1 Total Files Total GB
Share with Business Leaders SMART Policies & Controls
6,801,689 14,241 1,708,903 614 39,976 145,968 52 76
Enforce & Educate: Flexible & Automated Controls
Confidential 29
You have attempted to transfer PST file(s) to removable drive. Please provide a justification for moving PST file(s) to removable drive
Content, context and behavior based rules can automatically prompt or block insider and outsider threats
Understand Enforce & Educate Assess & Improve Build
Assess: Analytics & Reports that Drive Continuous Improvement
Confidential 30
1000 800 600 400 200 Incidents Per Week Risk Reduction Over Time
Summary
enables you to go from reactive to proactive
dramatically increases your security program’s effectiveness
business
31
32