Cybersecurity Survey Results

Similar documents
2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

Todd Sander Vice President, Research e.republic Inc.

2018 HIMSS Cybersecurity Survey

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

The Cost of Denial-of-Services Attacks

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

Defending Our Digital Density.

mhealth SECURITY: STATS AND SOLUTIONS

The State of Cybersecurity in Healthcare Organizations in 2016

Security+ SY0-501 Study Guide Table of Contents

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cybersecurity The Evolving Landscape

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

External Supplier Control Obligations. Cyber Security

2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

Cybersecurity for Health Care Providers

Information Governance, the Next Evolution of Privacy and Security

U.S. State of Cybercrime

TRAINING WEEK COURSE OUTLINE May RADISSON HOTEL TRINIDAD Port of Spain, Trinidad, W.I.

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Emerging Issues: Cybersecurity. Directors College 2015

Illinois Cyber Navigator Program

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

Defense in Depth Security in the Enterprise

Must Have Items for Your Cybersecurity or IT Budget in 2018

2015 HFMA What Healthcare Can Learn from the Banking Industry

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

CYBER SECURITY RISK ASSESSMENT: WHAT EVERY PENSION GOVERNMENTAL ENTITY NEEDS TO KNOW

Changing face of endpoint security

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cyber fraud and its impact on the NHS: How organisations can manage the risk

The GenCyber Program. By Chris Ralph

Reducing Cybersecurity Costs & Risk through Automation Technologies

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Information Security Controls Policy

Protecting your next investment: The importance of cybersecurity due diligence

Ⅰ Introduction 1. Ⅱ Information Security Infrastructure and Environment 2. Ⅲ Information Security Incident Prevention 8

Security

UNLOCKED DOORS RESEARCH SHOWS PRINTERS ARE BEING LEFT VULNERABLE TO CYBER ATTACKS

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

RMS(one) Solutions PROGRESSIVE SECURITY FOR MISSION CRITICAL SOLUTIONS

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

CCISO Blueprint v1. EC-Council

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

Unit 3 Cyber security

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

(U) Cyber Threats to the Homeland

R E P O R T. Cybersecurity in healthcare: The diagnosis. 1 Report Security in Healthcare: The diagnosis

EXAM - CAS-002. CompTIA Advanced Security Practitioner (CASP) Exam. Buy Full Product.

Stakeholders Analysis

Chapter 12. Information Security Management

Business Continuity Management

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Monthly Cyber Threat Briefing

CHIME and AEHIS Cybersecurity Survey. October 2016

Digital Health Cyber Security Centre

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

ACM Retreat - Today s Topics:

Hacking and Cyber Espionage

10 FOCUS AREAS FOR BREACH PREVENTION

Understanding the Changing Cybersecurity Problem

EFFECTIVE DEFENCE In a connected world. Philippe COTELLE, Airbus Defence and Space 2016, Nov 4th

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Methods for Reducing Cybersecurity Vulnerabilities of Power Substations Using Multi-Vendor Smart Devices in a Smart Grid Environment

Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services.

Healthcare HIPAA and Cybersecurity Update

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Cyber Resilience. Think18. Felicity March IBM Corporation

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

CoreMax Consulting s Cyber Security Roadmap

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Education Network Security

A Practical Approach to Implement a Risk Based ISMS

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

The Cyber War on Small Business

Ransomware A case study of the impact, recovery and remediation events

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

PT Unified Application Security Enforcement. ptsecurity.com

The Cyber Resilient Organisation in the United Kingdom: Learning to Thrive against Threats

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

2018 Guide to Building Your Security Strategy. January 23, pm 2 pm ET

Cyber Criminal Methods & Prevention Techniques. By

Journey to HIMSS18: Privacy, Security and Cybersecurity

Security Policies and Procedures Principles and Practices

Business continuity management and cyber resiliency

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

Transcription:

Cybersecurity Survey Results 4 November 2015 DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily represent official policy or position of HIMSS.

Learning Objectives Identify the tools in use to secure the healthcare environment. Learn how organizations assess, prevent and detect cybersecurity events. Learn which threat motivators respondents were most concerned about. Determine which items are the biggest barriers to mitigate cyber security incidents.

History of HIMSS Security Research First survey conducted in 2008 in USA Three-quarters of respondents conducted risk analysis Spent less than three percent of IT budget on security User-based and role-based controls to secure patient information Conducted for the sixth time in 2014 in USA Greatest security threat motivator encountered in healthcare is healthcare workers snooping into records 92 percent conducted in risk analysis Half reported spending three percent or less of their overall IT budget on securing patient data

SUMMARY RESULTS CYBERSECURITY SURVEY 2015

Motives for Improving Information Security Posture Top motivators for improving information security environments included results of risk assessment and virus/malware and vulnerability analysis results

Information Security as Business Priority of respondents indicated information security had increased as a business priority

Enhanced Information Security Capabilities 73% Improved Continuity of IT 67% 63% 33% Network Security Data Loss Prevention Disaster Recovery 27% Improving the Protection of Endpoints

Access control lists Antivirus / malware Audit logs of every access to health patient records and Public Key Authentication / Web of Trust (e.g., PGP) Biometric Technologies (static - for example, fingerprint or Data Encryption (data at rest) Data encryption (data in transit) Data loss prevention application (DLP [data loss prevention]) Digital signature Firewalls Intrusion detection system (IDS [Intrusion Detection System]) Intrusion prevention system Messaging Security Gateway Mobile Device Management (MDM [Mobile Device Mobile application management (MAM [Mobile Application Multi-factor authentication (ie, two-factor authentication) Network monitoring tools (eg data flow analysis tools) Patch management and vulnerability Single Sign On User access controls Web security gateway Do not know Information Security Tools in Place 90,0% 80,0% 70,0% 60,0% 50,0% 40,0% 30,0% 20,0% 10,0% 0,0%

Ability to Protect Information Rate the options on a scale 1-7, where one is "not prepared" and seven is "fully prepared" Brute Force Attacks (4.75) Exploit Known Vulnerabilities (4.6) Phishing Attacks (4.5) Negligent Insider Attacks (4.4) Malicious Insider Activity (4.4) Zero Day Attack (4.3) Attacks Denial of Service (DoS) (4.2) Advanced Persistent Threat of Attacks (4.1)

Techniques Used to Detect and Investigate Incidents Monitoring activity logs Monitoring user access records Network monotring 61,9% 61,9% 71,4% Working with enforcement officials of local/state law Use of cyber threat intelligence Do not know None of the above 14,3% 4,8% 9,5% 9,5%

Preparedness to Detect Security Incidents Rate the options on a scale 1-7, where one is "not prepared" and seven is "fully prepared" Statement Average Brute Force Attack 4.25 Exploitation of Known Software Vulnerabilities 4.25 Malicious insider attacks 4.20 Negligent insider attacks 4.15 Zero Day Attacks 4.05 Phishing Attacks 4.00 Denial of Services (DoS)/Distributed Denial of Services (DDoS) 4.00 Advanced Persistent Threat (APT) Attacks 3.90

Consequences of Security Incidents 31% Loss of Data/Information 19% 6% 19% Limited Disruption to Operations Significant Impact on IT Systems Damage to IT Systems 6% Other Impact

Exploitation of known software vulnerabilities is a concern Respondents are highly concerned about exploitation of known software vulnerabilities in the future 65 % polled named it as their biggest concern.

Significant Threats of the Future Top Ten Exploitation of known software vulnerabilities Malicious internal agent Domain Name System poisoning attack (DNS) Attacks Denial of Service Advanced persistent threat of attacks Phishing attacks Bruce force attacks Lax internal agent Social engineering attacks / elicitation (except phishing attacks) SQL injection attack 40% 40% 40% 45% 45% 50% 50% 55% 55% 65%

Drivers of the Most Common Threats Employees stealing patient information Members of workforce spying on information 3rd Consultants/Suppliers spying on information Medical identity theft (external) Employees stealing business information of the Consultant/Supplier who steal organisation's Black market activities Financial identity theft (external) Industrial espionage 25% 25% 35% 50% 50% 45% 45% 40% 55%

Staff Allocation to Information Security Function Dedicated to information security only part-time Member of the full-time staff Information security handled by external Chief Information Officer Information Security Director (Chief Information Security) No team members (Internal or external) Others 23,30% 16,70% 10,00% 6,70% 6,70% 3,30% 33,30%

Barriers to Information Security Count Percent Lack of adequate cybersecurity staff 60% Lack of financial resources 55% Too many emerging threats 25% Lack of know-how to use and effective implementation 20% Lack technologies and tools for effective use 20% Too many endpoints 20% Too many users too much for provisioning and deprovisioning of accounts in a timely and effective 20%

Conclusions Survey respondents organizations are challenged with respect to resources: Staffing Processes Tools Software vulnerabilities and Insider threat are of great concern Level of uncertainty still surrounds ability to protect against current and future attacks (internal and external)

Questions Lisa A Gallagher, BSEE, CISM, CPHIMS, FHIMSS VP, Technology Solutions HIMSS North America lgallagher@himss.org