18
1 Securing the Clinically-Integrated Supply Chain W308C, Monday, February 11, 2019 Karl J. West, Intermountain Healthcare

Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

1

Securing the Clinically-IntegratedSupply Chain

W308C, Monday, February 11, 2019

Karl J. West, Intermountain Healthcare

Page 2: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

2

A Large, Integrated Health System with a Tradition of

Innovation

Helping people live the healthiest lives possible ®

37,500 employees

$2 B non-labor spend

AA+ Standard & Poor’s

Aa1 Moody’s

Based in Salt

Lake City, Utah

Hospitals

• 1975 Began

• 23 Hospitals

• 2,800 Beds

• 1983 Started

• SelectHealth

• 900,000

Members

Health Plans Medical Group• 1994 Started

• 1,600

Employed

physicians

• 4,000 Affiliated

physicians

• 180 Clinics

Continuum Care

• TeleHealth

• Homecare

• Life Flight

• Central lab

• Central

pharmacy

Page 3: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

3

• Implemented as a centralized function in 2006

• About 740 employees

• Presence at all facilities, including linen

utilization

• Cover 6 major functional areas and 30

specialties

• $2+ billion spend overseen by the SCO

Supply Chain Overview

Page 4: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

4186 Band-Aid choices to 12

A Focus on Reducing Variation

Page 5: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

5

• Broader inventory support

• Cost visibility to the patient

• Asset-light approach

• Revenue generating opportunities

Benefits of a Clinically-IntegratedSupply Chain

Page 6: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

6

• Pre-infected hardware (bloatware & malware)

• Malware insertion

• Vulnerabilities

• Counterfeit hardware

• Consumables fraud

• Supply Chain vulnerability becomes attack point in hospital

Threats

Page 7: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

7

Attacker

Capability

Accessibility

ExploitVulnerabilit

y

Vulnerability Pathway

Page 8: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

8

2004GPCode

Encrypts files

on Windows OS

2006Archievus appears

on Windows.

Trojan.Ransom.A

distributed

2010Operation

Aurora

2012Reveton

de buts

2015LockerPin attacks

mobile devices.

Encoder, Chimera, Petya,

Mischa, Tox, Ransom32,

and CryptoLocker

2014CrytoWall

distributed

CTB-locker & Sypeng

introduced

2017WannaCry fast

spreading malware

NotPetya spreads fast

bent on destruction

2016Jigsaw targets Macs.

SamSam, Petya, Mamba

Zcryptor, CryptXXX

introduced

Attacks are Growing in Frequency

Healthcare cyberattacks rose

320%between 2015 and 2016

Healthcare most frequently

industry with

194 attacks per 1000 devices

Page 9: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

9

Attacks are Growing in Sophistication

HIGH

HIGH

LOW

LOWTHREAT

SOPHISTICATION

Non-Malware

Malware

HACKTIVISM E-CRIME NATION-STATE

Page 10: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

10

What is Your Risk Tolerance?

What are you willing to pay?

Page 11: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

11

Methods for Risk Management

Risks

Risk Inventory

Catalog

Risk Register

Page 12: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

12

Accurate Risk Register

• Description

• Rating (Low, Moderate, High, Critical)

• Area

• Owner (Technical & Business)

• Business Process/Impact

• Financial Impact

• Plan of Action

• Target Resolution Date

• Status

Page 13: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

13

Page 14: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

14

Data Classification

PUBLIC INTERNAL USE

SENSTIVE CRITICAL

Page 15: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

15

Accurate Data Inventory

• Application Name

• Application Description

• Data Classification

• Security Review ID

• Business Owner Contact

• Technical Owner Contact

• Asset Location

• Access: Internal/External/Both

• Contains PHI?

• Number of Records/Users

Page 16: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

16

Risk Management Plan

• A strategic risk management plan is imperative

– Identify organizational risk appetite

– Identify key technology assets

– Identify and evaluate IT security controls

– Identify residual risks

– Document acceptance of residual risks

• Demand incremental and evolutionary improvements to cyber maturity

• Establish a culture of security

Page 17: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

17

Email Protection

End-Point Protection

Access Management

Asset Management

Data Protection &

Loss Prevention

Network Management

Vulnerability Management

Incident Response

Cybersecurity Policies

Medical Device Security

1

2

3

4

5

6

7

8

9

10

Page 18: Securing the Clinically-Integrated Supply Chain · Aurora 2012 Reveton de buts 2015 LockerPin attacks mobile devices. Encoder, Chimera, Petya, Mischa, Tox, Ransom32, and CryptoLocker

18

Questions?