Healthcare Cognitive Security Salwa Rafee WW Security Industry Leader, Healthcare & Life Sciences, Gov, Edu January 2018
Cybersecurity is a universal challenge By What 2020, our there customers will be are facing GDPR fines can cost 20.8 billion things billions to secure for large global companies By 2022, there will be 5 billion 1.8million personal data records stolen unfulfilled cybersecurity positions Organizations are using $8 trillion lost toomany cybercrime tools from too many vendors 2 IBM Security
Top 3 Cybersecurity Mistakes Health Organizations Make 1. Historical underinvestment: Security spend 3% of IT budget vs. 15% in all other industries Legacy infrastructure, poor identity access management 2. Mixing compliance and security concerns: Passing an audit is NOT equal to Security Privacy vs Security vs Compliance Addressing vulnerabilities: EMRs, Medical devices that can t be patched, IAM 3. Overreliance on internal expertise: Limited access to technical resources Dependencies on several business associates and 3 rd parties 3 IBM Security
4 IBM Security
Live XF Interactive Security Incidents Malware represents 20% across all industries, it is 52% in Healthcare 5 IBM Security
No industry has more costly data breaches than Healthcare AVERAGE TOTAL COST of a data breach $4 MILLION AVERAGE COST of a lost or stolen record All industries Healthcare $158 $355 CHURN RATE resulting from a data breach All industries 2.8% Healthcare 5.3% 2016 Cost of Data Breach Study, Global Analysis, Ponemon Institute, June 2016. 6 IBM Security
External attackers are holding Healthcare Organizations hostage while insiders are exposing patient data to the outside INTERNALLY EXTERNALLY of healthcare providers 55% view NEGLIGENT INSIDERS as a significant future threat 34% of healthcare providers view MALICIOUS ATTACKS as a significant future threat of healthcare providers 69% view RANSOMWARE as a significant future threat >50% of hospitals have been HIT WITH RANSOMWARE over the last 12 months 2017 HIMSS Cybersecurity Survey Ransomware - WannaCry - May 2017 - Petya - Jun 2017 - Bad Rabbit - Oct 2017 7 IBM Security
IBM SECURITY IN THE HEALTHCARE INDUSTRY A Culture of Security, Privacy, Compliance
How do you evolve your security program for the future? LAYERED DEFENSES INTELLIGENCE and INTEGRATION COGNITIVE, CLOUD, and COLLABORATION 9 IBM Security
The future of security is Cognitive What if you could accelerate what analysts do each day? Investigate threats faster Automatically triage incidents with the help of artificial intelligence Be more accurate Correctly identify evolving threats, with a vast corpus of knowledge Interpret unstructured data Draw from millions of security documents 10 IBM Security
The future of security is Cloud IBM MaaS360 IBM QRadar on Cloud IBM Trusteer IBM AppSec on Cloud IBM Security App Exchange IBM X-Force Exchange IBM IDaaS Data Security on Cloud Can you confidently say yes to digital transformation? Accelerate innovation Access one of the largest cloud-based security portfolios in the world Protect multiple clouds Use 25+ hybrid cloud security offerings, built for the enterprise Use a proven platform 270M+ endpoints connected to our cloud 11 IBM Security
The future of security is Collaboration Are you part of the bigger picture? Orchestrate responses Respond to threats in minutes instead of hours with IBM Resilient Share knowledge Interact with 41K+ X-Force Exchange users and 800+ TB of threat intelligence Tailor your defenses Customize security with 100+ apps on the IBM Security App Exchange 12 IBM Security
What is Defensible Security? Ø Ø Ø Ø Ø Ø Doing the basics stops 80% of the problems. No organization globally is immune to attack. Organizations must be able to prevent the majority of attacks, detect the majority, and respond to the majority. Many organizations by now are aware they need to act given the sharp increase in attacks and sophistication. It helps organizations know what they need to do at a minimum to achieve defensible security posture. It also helps to do it in a very iterative, pragmatic way. 13 IBM Security
IBM Security Immune System SECURITY TRANSFORMATION SERVICES THREAT INTELLIGENCE X-Force Exchange Malware Analysis SECURITY ECOSYSTEM App Exchange Consulting & Systems Integration Managed Security Cloud Security ENDPOINT BigFix NETWORK QRadar Incident Forensics QRadar Network Insights SECURITY ORCHESTRATION & ANALYTICS MOBILE MaaS360 ADVANCED FRAUD Trusteer QRadar Watson Resilient i2 APPLICATIONS AppScan Application Security on Cloud IDENTITY & ACCESS Identity Governance and Access Cloud Identity zsecure DATA Guardium Multi-cloud Encryption Key Manager 14 IBM Security
Security for Healthcare & Life Sciences Hot Topics for 2018 Secure Medical Imaging Secure EMR Compliance Services Watson IoT Blockchain Med Devices 15
16 IBM Security Use Cases in other Countries
Government Innovation in Finland Government Mandates (Ready by Dec 2019): Development of National Cybersecurity Program, analytics, and measurement system Competency of Artificial Intelligence in Public Administration Blockchain technology and crypto money possibilities in taxation The ethics of regulation and exploitation of robotics and artificial intelligence and social acceptability Effective utilization of data in all sectors Ensure AI can be adopted more quickly and easily Ensure top-level expertise and attract top experts Make bold decisions and investments Build the world s best public services Establish new models for collaboration 17 IBM Security
18 IBM Security 31.1.201 18 How to create value-add with cognitive computing, advanced analytics and Finnish health data? National Finnish Health Data Sources IBM WATSON ADVANCED ANALYTICS AND COGNITIVE COMPUTING Local Hospital District Data Sources VRK KanS A My Kanta EMR PACS Canc er registr y Bio banks Geno -me DB IoT equipment data (sensors, devices) other
Cooperation with hospital ICT-systems and National Healthcare Taltioni MyData Secure, centralized national service Applications KanTa Population Register Centre Hospital ICT-system communicates with the national Health Care system Wellnes Kanta is the national data system services for healthcare services, pharmacies and citizens. The services include the electronic prescription, Pharmaceutical Database, My Kanta pages, and Patient Data Repository. Cyber Security in the hospitals and Hospitals Districts. Cognitive computing Hospital ICT-system 31.1.2018 19 19 IBM Security
UK NHS Cybersecurity Program Enhancement of the SOC operations over 10 years: 84 Foundation Trusts (the big ones) 54 Mental Health trusts 35 Community Trusts 135 non-specialist trusts 20 IBM Security
Public Sector Security Program in State of Victoria State-wide Security Program that includes HealthCare, Education, and Gov agencies Data Strategy for analytics, security, privacy 2-year Cybersecurity Fellowship Program for Clinicians National Genomics Secure Database using AI (Watson) Leverage Quantum Computing Capabilities in Research 21 IBM Security
Augmented Intelligence BRINGING THE POWER OF COGNITIVE SECURITY TO THE SECURITY ANALYST
How Watson for Cyber Security works STRUCTURED DATA UNSTRUCTURED DATA WEB CRAWLER 5-10 updates / hour! 100K updates / week! X-Force Exchange Research Breach replies Billions of Data Elements Trusted partner feed Other threat feeds Websites Blogs Attack write-ups Best practices Millions of Documents Open source News Course of action Massive Corpus of Security Knowledge 10B elements plus 4M added / hour 1.25M docs plus 15K added / day 50 beta customers 140K+ web visits in 5 weeks 200+ trial requests SEE THE BIG PICTURE QRadar Advisor enables us to truly understand our risk and the needed actions to mitigate a threat. ACT WITH SPEED & CONFIDENCE The QRadar Advisor results in the enhanced context graph is a BIG savings in time versus manual research. 23 IBM Security
A global leader in enterprise security #1 fastest growing of the Top 5 security vendors* 8,000+ employees 17,500+ customers 133 countries 3,500+ security patents 20 acquisitions since 2002 * According to 2015 Gartner Market Share 24 IBM Security
X-Force Command Center Experience Cambridge, MA What is the X-Force Command Center? It is a state-of-the-art facility that immerses clients/potential clients in a simulated Security Operations Center (SOC) using tactics and protocols designed to anticipate and defend against current and future cyber threats. It will provide critical cyber security-related crisis leadership skills in a safe live fire environment where participants can experience the effects of live malware. The participants will operate real tools, investigate active infections, and respond to internal and external cyber security events. 25 IBM Security
THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.