+ All Categories
Home > Health & Medicine > Florencio Cano - Patient data security in a wireless and mobile world

Florencio Cano - Patient data security in a wireless and mobile world

Date post: 14-Dec-2014
Category:
Upload: wths
View: 458 times
Download: 1 times
Share this document with a friend
Description:
Presentation of Workshop on Technology for Healthcare and Healthy Lifestyle 2011Thursday 1st Dec 2011Session IIIhttp://www.tsb.upv.es/wths2011
61
Patient data security in a wireless and mobile world Florencio Cano Gabarda SEINHE CISA, IRCA 27001 Lead Auditor
Transcript
Page 1: Florencio Cano - Patient data security in a wireless and mobile world

Patient data security in a wireless and mobile world

Florencio Cano Gabarda SEINHE

CISA, IRCA 27001 Lead Auditor

Page 2: Florencio Cano - Patient data security in a wireless and mobile world

173,8 298

472

982

2009 2010 2011 … 2015

120 % more smartphones in 2015

Smartphones sold in millions

Source: IDG

Page 3: Florencio Cano - Patient data security in a wireless and mobile world

Mobile devices are inside our network

Photo from gizmologia.com

Page 4: Florencio Cano - Patient data security in a wireless and mobile world

Photo from www.exalli.com

Whether IT like it or not

Page 5: Florencio Cano - Patient data security in a wireless and mobile world

USER used to be…

Page 6: Florencio Cano - Patient data security in a wireless and mobile world

…far far away

Page 7: Florencio Cano - Patient data security in a wireless and mobile world

Now the USER in inside the network

Page 8: Florencio Cano - Patient data security in a wireless and mobile world

Network administrators used to have control over the devices connected to the network…

2 laptops 3 switches 10 workstations 3 servers

Page 9: Florencio Cano - Patient data security in a wireless and mobile world

…but now users want to use their own devices

Page 10: Florencio Cano - Patient data security in a wireless and mobile world

Photo from www.exalli.com

Whether IT like it or not

Page 11: Florencio Cano - Patient data security in a wireless and mobile world

Securing only the perimeter is no longer possible

Photo by itjournalist

Page 12: Florencio Cano - Patient data security in a wireless and mobile world

We have to evaluate deeply

the new risks

Page 13: Florencio Cano - Patient data security in a wireless and mobile world

A risk assessment is the right tool

Page 14: Florencio Cano - Patient data security in a wireless and mobile world

A risk assessment is the right tool

Recommended by LOPD

Page 15: Florencio Cano - Patient data security in a wireless and mobile world

A risk assessment is the right tool

Recommended by LOPD

Mandated by the Esquema Nacional de Seguridad

Page 16: Florencio Cano - Patient data security in a wireless and mobile world

A risk assessment is the right tool

Recommended by LOPD

Mandated by the Esquema Nacional de Seguridad

Required by the spanish critical infrastructure protection law

Page 17: Florencio Cano - Patient data security in a wireless and mobile world

A risk assessment is the right tool

Recommended by LOPD

Mandated by the Esquema Nacional de Seguridad

Required by the spanish critical infrastructure protection law

Necessary to be certified

against ISO/IEC 27001

Page 18: Florencio Cano - Patient data security in a wireless and mobile world

Multiple methodologies

exist

Magerit Octave ISO/IEC 27005 CRAMM

Page 19: Florencio Cano - Patient data security in a wireless and mobile world

1. Identify information assets

Page 20: Florencio Cano - Patient data security in a wireless and mobile world

2. Identify threats

Page 21: Florencio Cano - Patient data security in a wireless and mobile world

3. Identify vulnerabilities

Page 22: Florencio Cano - Patient data security in a wireless and mobile world

Risk evaluation

Page 23: Florencio Cano - Patient data security in a wireless and mobile world

Critical assets

Page 24: Florencio Cano - Patient data security in a wireless and mobile world

User

Page 25: Florencio Cano - Patient data security in a wireless and mobile world

User

Data

Page 26: Florencio Cano - Patient data security in a wireless and mobile world

User

Data

Devices

Page 27: Florencio Cano - Patient data security in a wireless and mobile world

User

Data

Devices

Internal network

Page 28: Florencio Cano - Patient data security in a wireless and mobile world

User

Data

Devices

Internal network

DEFENSE IN DEPTH

Page 29: Florencio Cano - Patient data security in a wireless and mobile world

Classical threats

Page 30: Florencio Cano - Patient data security in a wireless and mobile world

Classical threats Access to patient data

Interruption of critical systems

Page 31: Florencio Cano - Patient data security in a wireless and mobile world

Classical threats Access to patient data

Interruption of critical systems

Page 32: Florencio Cano - Patient data security in a wireless and mobile world

New vulnerabilities

Page 33: Florencio Cano - Patient data security in a wireless and mobile world

New vulnerabilities Wireless vulnerabilities Network vulnerabilities Device vulnerabilities User vulnerabilities

Page 34: Florencio Cano - Patient data security in a wireless and mobile world

Insecure access

protocols

Page 35: Florencio Cano - Patient data security in a wireless and mobile world

New vulnerabilities Wireless vulnerabilities Network vulnerabilities Device vulnerabilities User vulnerabilities

Page 36: Florencio Cano - Patient data security in a wireless and mobile world

Improper network

segmentation

Page 37: Florencio Cano - Patient data security in a wireless and mobile world

Plain text protocols

Page 38: Florencio Cano - Patient data security in a wireless and mobile world

New vulnerabilities Wireless vulnerabilities Network vulnerabilities Device vulnerabilities User vulnerabilities

Page 39: Florencio Cano - Patient data security in a wireless and mobile world

Malware

Page 40: Florencio Cano - Patient data security in a wireless and mobile world

New vulnerabilities Wireless vulnerabilities Network vulnerabilities Device vulnerabilities User vulnerabilities

Page 41: Florencio Cano - Patient data security in a wireless and mobile world

Extraction of data without authorization

Page 42: Florencio Cano - Patient data security in a wireless and mobile world

Improper deletion of

data

Page 43: Florencio Cano - Patient data security in a wireless and mobile world

Lack of controls

against not authorized

access

Page 44: Florencio Cano - Patient data security in a wireless and mobile world

New and old solutions

Page 45: Florencio Cano - Patient data security in a wireless and mobile world

A sound information security polity

Page 46: Florencio Cano - Patient data security in a wireless and mobile world

Policy enforcement

Page 47: Florencio Cano - Patient data security in a wireless and mobile world

Network security

Page 48: Florencio Cano - Patient data security in a wireless and mobile world

Security by design

Network security

Page 49: Florencio Cano - Patient data security in a wireless and mobile world

Proper segmentation

Network security

Page 50: Florencio Cano - Patient data security in a wireless and mobile world

Demilitarized zone A segment for malicious or non-

trusted devices with access to Internet A segment for low risk assets

on the internal network A segment for critical devices

Proper segmentation

Page 51: Florencio Cano - Patient data security in a wireless and mobile world

VLANs and Firewalls

Network security

Page 52: Florencio Cano - Patient data security in a wireless and mobile world

Intrusion detection

Network security

Page 53: Florencio Cano - Patient data security in a wireless and mobile world

Honeypots

Network security

Page 54: Florencio Cano - Patient data security in a wireless and mobile world

Data loss prevention

Network security

Page 55: Florencio Cano - Patient data security in a wireless and mobile world

Virtual Private Networks

Network security

Page 56: Florencio Cano - Patient data security in a wireless and mobile world

Wireless security

Page 57: Florencio Cano - Patient data security in a wireless and mobile world

Proper protocols

Wireless security

Page 58: Florencio Cano - Patient data security in a wireless and mobile world

Mobile device security

Page 59: Florencio Cano - Patient data security in a wireless and mobile world

Network Access Control (NAC)

Mobile device security

Page 60: Florencio Cano - Patient data security in a wireless and mobile world

Health environments are facing new risks Organizations patient data and allow

mobile devices should review the new risks and act

There exist solutions to mitigate the new risks

Conclusions

Page 61: Florencio Cano - Patient data security in a wireless and mobile world

Thanks! Florencio Cano Gabarda

SEINHE [email protected]

@florenciocano


Recommended