healthcare organizations under attack: protecting phi and pii · agenda 1. phi and pii overview 2....

17
boston.healthprivacyforum.com | #hitprivacy December 5-7, 2016 Westin Boston Waterfront Healthcare Organizations Under Attack: Protecting PHI and PII Jonathan Cohen | Synchronoss Technologies

Upload: others

Post on 09-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

boston.healthprivacyforum.com | #hitprivacy

December 5-7, 2016 Westin Boston Waterfront

Healthcare Organizations Under Attack: Protecting PHI and PII

Jonathan Cohen | Synchronoss Technologies

Page 2: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

AGENDA

1.  PHI and PII Overview

2.  Why PHI is an Appealing Target

3.  Platform Overview

4.  Use Cases

5.  Next Steps

Page 3: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

PHI AND PII OVERVIEW

Types of PHI and other Patient PII that must be protected by Providers and Clinicians, e.g.

Pa#entEncounterForms

Con#nuityofCareDocumentElectronicMedicalRecord

Page 4: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

THREATS TO PATIENT INFORMATION

Source:FireEye&SynchronossAnalysis

Rich set of personal data extremely valuable to cybercriminals for Identity Theft

Often contains payment card information and bank account data that can be used for theft and fraud

Perhaps the most valuable records to steal (street value >$300 per record)

This information is often inadequately protected on mobile devices

Yet, for productivity and improved patient care, clinicians need to embrace mobility

Page 5: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

TO FUTHER COMPLICATE THINGS…

61% Users Reuse Passwords Among

Websites

26 Accounts That Require

Username & Password

63% Confirmed Breaches Involved Weak Or Stolen Credentials

Page 6: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

Of the 5,000+ largest successful attacks in the last 10 years, 82% exploited weak or stolen passwords

Only TWO involved 2-factor authentication!

Page 7: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

How do we meet the needs?

Key Elements of a Secure Enterprise Platform

Page 8: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

KEY ELEMENTS OF A SECURE ENTERPRISE PLATFORM

MOBILITY

ANALYTICS IDENTITY

COLLABORATION

SECURE EXTERNAL COLLABORATION

DESCRIPTIVE, PREDICTIVE & PRESCRIPTIVE ANALYTICS

SERVICES

SECURE MOBILE CONTAINER +

PRODUCTIVITY APPS

MULTI FACTOR AUTHENTICATION,

PROOFING & CERTIFICATES

Page 9: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

VERIFIES IDENTITIES

ISSUES CREDENTIALS

AUTHENTICATES USERS

MANAGED ATTRIBUTES

FOCUS ON IDENTITY MANAGEMENT AND AUTHENTICATION

Page 10: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

REPRESENTATIVE USE CASES

Page 11: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

PRACTICAL APPLICATIONS – USE CASES

LIFE SCIENCES

HEALTHCARE

MOBILITY

FieldaccesstoCTMS&EDCappsonBYOD

SecureEMRaccessonclinicianBYOD

IDENTITY & ANALYTICS

Dynamicprovisioning/de-provisioningaccesstoregulatorysubmission

content

PrescriberverificaDonforcontrolledsubstances

COLLABORATION

R&DCollaboraDonWorkspacefor

Pharma,Biotech&Academia

CollaboraDvecareworkspacefor

distributedmedicalteams

Page 12: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

Collaboration Gateway

DATA CONNECTORS

LIMS, ELN, KB

DCTM, SharePoint

Box, O365 eCTD, CMC, EHR

BRINGING IT ALL TOGETHER – SECURE ENTERPRISE PLATFORM FOR HEALTHCARE

Mo

bili

ty

LAGOON & ORBIT Orbit Suite in Container on

Devices

SEC

URE

PR

OD

UC

TIV

ITY

Basic Research •  Chemical registration •  Compound management and

analysis

Pre Clinical Science •  Early stage analysis and

performance •  Innovative research (e.g.

Biomarkers, Genomics)

Clinical Trials •  Trials management with CROs •  Electronic data capture & submission

management •  Monitoring & auditing

CO

NTEX

TUA

L A

UTH

ORIZA

TION

Commercialization •  Manufacturing quality & process

controls •  Supply chain & logistics

management

Frictionless Access

+

UNIFIED IDENTITY

ID UNIVERSAL

Polic

y &

Co

ntrols

Collaboration Workspace

Page 13: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

FROM STATIC MOBILE APPS THAT PROVIDE MINIMAL VALUE…

Clinical investigator (CI) opens Patient

Encounter Form mobile app on BYO

tablet

CI completes capture of patient

info, including mobile contact info

and saves work

Next day the CI is reviewing the CRFs from prior day and

notices a concerning test

result

The CI opens native messaging app on

her tablet and connects with the

patient

Additional clarifying information is

captured and then appended to the

CRF

LegendWorkflow

interruption

Compliance violation

PHI not secured on personal device

Record of chat session with patent manually transcribed to Patient Encounter Form

Patient Encounter Form (ePEF) app may not be available on BYO device or adequately secured

Page 14: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

…TO MOBILE APPS SECURELY ENABLED WITH WORKFLOWS

Clinical investigator (CI) opens ePEF

mobile app on BYO tablet

CI completes capture of patient

info, including mobile contact info and

saves work

Next day the CI is reviewing the CRFs from prior day and

notices a concerning test result

The CI opens native messaging app on

her tablet and connects with the

patient

Additional clarifying information is

captured and then appended to the

ePEF

HIPAA compliant messaging app launched from ePEF mobile app

Conversation recorded and securely appended to ePEF

Conversation recorded and securely appended to ePEF

Page 15: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

GATEWAY CONTAINER

ANALYTICS IDENTITY DATA

Private and Public Cloud Plugins

Integrate with any API

PUBLICAPIPRIVATEAPI

PLUGINS

POLICY

© Synchronoss. All Rights Reserved. 2016

MEDICALDEVICE

DRONE

SENSOR

•  Sensitive IoT data secured within the container •  Mobile apps secured in container interact with IoT devices •  Gateway secures transmission, placed as cloud service or on-customer

premises •  Plugin architecture enables interaction with back-end services

INNOVATIVE APPLICATION FOR INTERNET OF THINGS

Page 16: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

KEY TAKEAWAYS

Strong mobile security framework and authentication is required to enable secure external collaboration, to secure PHI and PII

Container-based security is best to secure mobile apps on BYO devices that contain and/or transmit PHI or PII

IoT transmitting PHI or PII is no different and requires that data must be protected at rest and in motion

Page 17: Healthcare Organizations Under Attack: Protecting PHI and PII · AGENDA 1. PHI and PII Overview 2. Why PHI is an Appealing Target 3. Platform Overview 4. Use Cases ... LIFE SCIENCES

Jonathan Cohen Synchronoss Technologies