CSTC2018: Insider Threat_Jaime Lisk and Joe Danaher

Page 1

INSIDER THREAT What are you up against?


28% OF ATTACKS INVOLVE INSIDERS 2018 Verizon Data Breach Investigations Report


HEALTHCARE


WHAT IS AT RISK?


WHAT ARE THE CAUSES?


CONTRIBUTING FACTORS


WHAT HAVE YOU DONE SO FAR?


WHAT NEW TECHNICAL CONTROLS ARE YOU IMPLEMENTING?


SECURITY AWARENESS

Invest in Security Awareness Training

Top 3 must know: How to spot a phish How to manage passwords How to report a security incident


• Hiring Practices • Background Screening • Orientation • PII-PHI Handling • Acceptable Use and Social Media Policies HR-IT INTEGRATION

• HR Staff • Aware of IT tools • HRIS-workflows to notify IT for adding/removing users • Multi Factor Authentication for HR


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.