Healthcare Cognitive Security

Similar documents
May the (IBM) X-Force Be With You

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Ponemon Institute s 2018 Cost of a Data Breach Study

Securing global enterprise with innovation

Integrated, Intelligence driven Cyber Threat Hunting

The New Era of Cognitive Security

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

Fabrizio Patriarca. Come creare valore dalla GDPR

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

IBM MaaS360 Kiosk Mode Settings

Be effective in protecting against the cybercrime

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

ISAM Advanced Access Control

IBM Security Network Protection Solutions

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

How to Secure Your Cloud with...a Cloud?

Notice on Names and Logos Used in This Presentation

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

Predators are lurking in the Dark Web - is your network vulnerable?

Detect Fraud & Financial Crime

Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER

Securing Digital Transformation

Securing Your Digital Transformation

The McGill University Health Centre (MUHC)

IBM Future of Work Forum

Cybersecurity. Securely enabling transformation and change

Best Practices in Securing a Multicloud World

Aligning with HIPAA mandates in healthcare

FOR FINANCIAL SERVICES ORGANIZATIONS

THE ACCENTURE CYBER DEFENSE SOLUTION

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

HOSTED SECURITY SERVICES

IBM Security Access Manager

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Angela McKay Director, Government Security Policy and Strategy Microsoft

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Healthcare IT Modernization and the Adoption of Hybrid Cloud

IBM Next Generation Intrusion Prevention System

DIGITAL TRUST Making digital work by making digital secure

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Cyber Risk and Networked Medical Devices

AKAMAI CLOUD SECURITY SOLUTIONS

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

in collaboration with

IBM Threat Protection System: XGS - QRadar Integration

IBM Security Strategy Intelligence, Integration and Expertise

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Run the business. Not the risks.

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

Eight important criteria for selecting a managed security services provider

CYBER SOLUTIONS & THREAT INTELLIGENCE

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Reducing Cybersecurity Costs & Risk through Automation Technologies

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Managed Endpoint Defense

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

locuz.com SOC Services

Cyber Security Technologies

Cybersecurity and Hospitals: A Board Perspective

IBM Application Security on Cloud

THALES DATA THREAT REPORT

IBM Security Network Protection Open Mic - Thursday, 31 March 2016

XGS & QRadar Integration

Security in India: Enabling a New Connected Era

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Let s Talk About Threat Intelligence

IBM Cloud Internet Services: Optimizing security to protect your web applications

CYBER SECURITY TRAINING

DIGITAL TRUST AT THE CORE

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

AI AND CYBERSECURITY APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN SECURITY UNDERSTANDING AND DEFENDING AGAINST ADVERSARIAL AI

Configuring zsecure To Send Data to QRadar

Sustainable Security Operations

Mastering The Endpoint

Provide Your Customers with a New Compute Experience

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

TRUE SECURITY-AS-A-SERVICE

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

Package of initiatives on Cybersecurity

The New Healthcare Economy is rising up

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Data Management and Security in the GDPR Era

Combatting advanced threats with endpoint security intelligence

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Intelligent Building and Cybersecurity 2016

Transcription:

Healthcare Cognitive Security Salwa Rafee WW Security Industry Leader, Healthcare & Life Sciences, Gov, Edu January 2018

Cybersecurity is a universal challenge By What 2020, our there customers will be are facing GDPR fines can cost 20.8 billion things billions to secure for large global companies By 2022, there will be 5 billion 1.8million personal data records stolen unfulfilled cybersecurity positions Organizations are using $8 trillion lost toomany cybercrime tools from too many vendors 2 IBM Security

Top 3 Cybersecurity Mistakes Health Organizations Make 1. Historical underinvestment: Security spend 3% of IT budget vs. 15% in all other industries Legacy infrastructure, poor identity access management 2. Mixing compliance and security concerns: Passing an audit is NOT equal to Security Privacy vs Security vs Compliance Addressing vulnerabilities: EMRs, Medical devices that can t be patched, IAM 3. Overreliance on internal expertise: Limited access to technical resources Dependencies on several business associates and 3 rd parties 3 IBM Security

4 IBM Security

Live XF Interactive Security Incidents Malware represents 20% across all industries, it is 52% in Healthcare 5 IBM Security

No industry has more costly data breaches than Healthcare AVERAGE TOTAL COST of a data breach $4 MILLION AVERAGE COST of a lost or stolen record All industries Healthcare $158 $355 CHURN RATE resulting from a data breach All industries 2.8% Healthcare 5.3% 2016 Cost of Data Breach Study, Global Analysis, Ponemon Institute, June 2016. 6 IBM Security

External attackers are holding Healthcare Organizations hostage while insiders are exposing patient data to the outside INTERNALLY EXTERNALLY of healthcare providers 55% view NEGLIGENT INSIDERS as a significant future threat 34% of healthcare providers view MALICIOUS ATTACKS as a significant future threat of healthcare providers 69% view RANSOMWARE as a significant future threat >50% of hospitals have been HIT WITH RANSOMWARE over the last 12 months 2017 HIMSS Cybersecurity Survey Ransomware - WannaCry - May 2017 - Petya - Jun 2017 - Bad Rabbit - Oct 2017 7 IBM Security

IBM SECURITY IN THE HEALTHCARE INDUSTRY A Culture of Security, Privacy, Compliance

How do you evolve your security program for the future? LAYERED DEFENSES INTELLIGENCE and INTEGRATION COGNITIVE, CLOUD, and COLLABORATION 9 IBM Security

The future of security is Cognitive What if you could accelerate what analysts do each day? Investigate threats faster Automatically triage incidents with the help of artificial intelligence Be more accurate Correctly identify evolving threats, with a vast corpus of knowledge Interpret unstructured data Draw from millions of security documents 10 IBM Security

The future of security is Cloud IBM MaaS360 IBM QRadar on Cloud IBM Trusteer IBM AppSec on Cloud IBM Security App Exchange IBM X-Force Exchange IBM IDaaS Data Security on Cloud Can you confidently say yes to digital transformation? Accelerate innovation Access one of the largest cloud-based security portfolios in the world Protect multiple clouds Use 25+ hybrid cloud security offerings, built for the enterprise Use a proven platform 270M+ endpoints connected to our cloud 11 IBM Security

The future of security is Collaboration Are you part of the bigger picture? Orchestrate responses Respond to threats in minutes instead of hours with IBM Resilient Share knowledge Interact with 41K+ X-Force Exchange users and 800+ TB of threat intelligence Tailor your defenses Customize security with 100+ apps on the IBM Security App Exchange 12 IBM Security

What is Defensible Security? Ø Ø Ø Ø Ø Ø Doing the basics stops 80% of the problems. No organization globally is immune to attack. Organizations must be able to prevent the majority of attacks, detect the majority, and respond to the majority. Many organizations by now are aware they need to act given the sharp increase in attacks and sophistication. It helps organizations know what they need to do at a minimum to achieve defensible security posture. It also helps to do it in a very iterative, pragmatic way. 13 IBM Security

IBM Security Immune System SECURITY TRANSFORMATION SERVICES THREAT INTELLIGENCE X-Force Exchange Malware Analysis SECURITY ECOSYSTEM App Exchange Consulting & Systems Integration Managed Security Cloud Security ENDPOINT BigFix NETWORK QRadar Incident Forensics QRadar Network Insights SECURITY ORCHESTRATION & ANALYTICS MOBILE MaaS360 ADVANCED FRAUD Trusteer QRadar Watson Resilient i2 APPLICATIONS AppScan Application Security on Cloud IDENTITY & ACCESS Identity Governance and Access Cloud Identity zsecure DATA Guardium Multi-cloud Encryption Key Manager 14 IBM Security

Security for Healthcare & Life Sciences Hot Topics for 2018 Secure Medical Imaging Secure EMR Compliance Services Watson IoT Blockchain Med Devices 15

16 IBM Security Use Cases in other Countries

Government Innovation in Finland Government Mandates (Ready by Dec 2019): Development of National Cybersecurity Program, analytics, and measurement system Competency of Artificial Intelligence in Public Administration Blockchain technology and crypto money possibilities in taxation The ethics of regulation and exploitation of robotics and artificial intelligence and social acceptability Effective utilization of data in all sectors Ensure AI can be adopted more quickly and easily Ensure top-level expertise and attract top experts Make bold decisions and investments Build the world s best public services Establish new models for collaboration 17 IBM Security

18 IBM Security 31.1.201 18 How to create value-add with cognitive computing, advanced analytics and Finnish health data? National Finnish Health Data Sources IBM WATSON ADVANCED ANALYTICS AND COGNITIVE COMPUTING Local Hospital District Data Sources VRK KanS A My Kanta EMR PACS Canc er registr y Bio banks Geno -me DB IoT equipment data (sensors, devices) other

Cooperation with hospital ICT-systems and National Healthcare Taltioni MyData Secure, centralized national service Applications KanTa Population Register Centre Hospital ICT-system communicates with the national Health Care system Wellnes Kanta is the national data system services for healthcare services, pharmacies and citizens. The services include the electronic prescription, Pharmaceutical Database, My Kanta pages, and Patient Data Repository. Cyber Security in the hospitals and Hospitals Districts. Cognitive computing Hospital ICT-system 31.1.2018 19 19 IBM Security

UK NHS Cybersecurity Program Enhancement of the SOC operations over 10 years: 84 Foundation Trusts (the big ones) 54 Mental Health trusts 35 Community Trusts 135 non-specialist trusts 20 IBM Security

Public Sector Security Program in State of Victoria State-wide Security Program that includes HealthCare, Education, and Gov agencies Data Strategy for analytics, security, privacy 2-year Cybersecurity Fellowship Program for Clinicians National Genomics Secure Database using AI (Watson) Leverage Quantum Computing Capabilities in Research 21 IBM Security

Augmented Intelligence BRINGING THE POWER OF COGNITIVE SECURITY TO THE SECURITY ANALYST

How Watson for Cyber Security works STRUCTURED DATA UNSTRUCTURED DATA WEB CRAWLER 5-10 updates / hour! 100K updates / week! X-Force Exchange Research Breach replies Billions of Data Elements Trusted partner feed Other threat feeds Websites Blogs Attack write-ups Best practices Millions of Documents Open source News Course of action Massive Corpus of Security Knowledge 10B elements plus 4M added / hour 1.25M docs plus 15K added / day 50 beta customers 140K+ web visits in 5 weeks 200+ trial requests SEE THE BIG PICTURE QRadar Advisor enables us to truly understand our risk and the needed actions to mitigate a threat. ACT WITH SPEED & CONFIDENCE The QRadar Advisor results in the enhanced context graph is a BIG savings in time versus manual research. 23 IBM Security

A global leader in enterprise security #1 fastest growing of the Top 5 security vendors* 8,000+ employees 17,500+ customers 133 countries 3,500+ security patents 20 acquisitions since 2002 * According to 2015 Gartner Market Share 24 IBM Security

X-Force Command Center Experience Cambridge, MA What is the X-Force Command Center? It is a state-of-the-art facility that immerses clients/potential clients in a simulated Security Operations Center (SOC) using tactics and protocols designed to anticipate and defend against current and future cyber threats. It will provide critical cyber security-related crisis leadership skills in a safe live fire environment where participants can experience the effects of live malware. The participants will operate real tools, investigate active infections, and respond to internal and external cyber security events. 25 IBM Security

THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.