SlideShare a Scribd company logo
1 of 28
The Dreaded Embedded
Barry Caplin
VP & CISO
Fairview Health Services
bcaplin1@fairview.org
bc@bjb.org
@bcaplin
securityandcoffee.blogspot.com
Secure 360
Tues. May 17, 2016
Tweet along: #Sec360
@bcaplin
http://about.me/barrycaplin
securityandcoffee.blogspot.com
o Not-for-profit established in 1906
o Academic Health System since 1997
partnership with University of Minnesota
o >22K employees
o >3,300 aligned physicians
o Employed, faculty, independent
o 7 hospitals/medical centers
(>2,500 staffed beds)
o 40-plus primary care clinics
o 55-plus specialty clinics
o 47 senior housing locations
o 30-plus retail pharmacies
2014 volumes
o 6.39M outpatient encounters
o 1.4M clinic visits
o 71,049 inpatient admissions
o 76,595 surgeries
o 9,298 births
o 282 blood and marrow transplants
o 340 organ transplants
o >$4 billion total revenue
Who is Fairview?
A partnership of North Memorial and Fairview
• For Reals?
• What’s a “Thing” and why is it on the
Internet?
• Put a Chip In It
• Are Medical Devices “Things”?
• You’re doing what with my data?
• Security Concerns
• Solutions?
Agenda
Tweet along: #Sec360
CSI:Cyber 11/1/15 s2/ep5 “hack E.R.”
• “Hacker group” takes over hospital
• Kills via infusion pump
• Ransom
• Weak/no auth and encryption in med devices
• Smart TV
• Hardware Poisoning
• Flat Network
• Medical Record Integrity
• Physical Access to Network
• Financial v Hacktivism
What’s Real?
“I asked you not
to tell me that!”
Who’s got?...
Apr. 3, 2010
300K ipads
1M apps
250K ebooks
… day 1!
2011 – tablet/smartphone sales exceeded PCs
Apr. 24, 2015
1M orders
2500 apps
available
… day 1!
2016 – IOT sales exceed
smartphone
+
tablet
http://weputachipinit.tumblr.com/
Medical Devices
http://get-fun-here.blogspot.com/2014/04/
22-strange-medical-instruments-from.html
Medical Devices
1997
2013
“Embedded”
• Quantified Self
• Insulin pumps, pace-
makers, ICD, etc.
 FDA requirements
 Device manufacturers
 Ease of connection
• Jay Radcliffe,
BlackHat 2011
Barnaby Jack,
HackerHalted 2012
• Homeland attack (Broken
Hearts, s2/ep10 12/2/12)
 Wireless attack via
pacemaker id/sn
 Dick Cheney ICD, 2007
• MITM or snooping
• Integrity
• Availability
Security Challenges
 Exposure/Leakage of data – including
repairs
 Poor Design/Protocols
 Ownership
 Malware
 Direct Attack
 Integrity
 Availability
But don’t we have all this now???
• Primary mechanism is… Obscurity
• Focus is on
Function
Aesthetics
Communication
Cost
Speed to Market
• Testing?
• Patching?
• Design?
Security
• Sneakernet
– USB updates or data
movement
• Data Exfiltration
– aka Breach!
• Integrity
– Alter Capability
– Alter Data/Reporting
• Availability
• Medjacking
– Attack
– Infiltrate
– Pivot
Attack Vectors
https://securityledger.com/wp-
content/uploads/2015/06/AOA_MEDJACK_LAYOUT_6-0_6-3-2015-1.pdf
• FDA certification process
– Complex, painful, long, expensive
• Patching and FDA advice
– Manufacturers responsible for patches
– Premarket review not required for
security patch
FDA Reality
http://www.fda.gov/MedicalDevices/DeviceRegulationand
Guidance/GuidanceDocuments/ucm077812.htm
http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/
ucm356423.htm
• Retail
• Manufacturing
• Energy
We Are Not Alone
Solutions
• FDA, NIST and others in progress
• NCCoE/NIST/UMN TLI infusion pump security study
https://nccoe.nist.gov/sites/default/files/nccoe/NCCOE_HIT-Medical-Device-
Use-Case.pdf
https://nccoe.nist.gov/projects/use_cases/medical_devices
• Medical Device Innovation, Safety and Security Consortium (MDISS),
International Society of Automation (ISA), HITRUST Alliance, NIST and
others working with:
• FDA, HHS, DOD, NHISAC, CIS (Center for Internet Security), AAMI
(Association for Advancement of Medical Instrumentation), ACCE
(American College of Clinical Engineering), SANS, and others
• IHE/MDISS – Medical Device Software Patching white paper
https://ihe.net/uploadedFiles/Documents/PCD/IHE_PCD_WP_Patching_Rev1.0
_PC_2015-07-01.pdf
• MDS2 (Manufacturer Disclosure Statement for Medical Device
Security) http://www.nema.org/Standards/Pages/Manufacturer-Disclosure-
Statement-for-Medical-Device-Security.aspx
• Archimedes http://www.secure-medicine.org/
• NIST SP-1800 Securing Electronic Health Records on Mobile Devices
https://nccoe.nist.gov/projects/use_cases/health_it/ehr_on_mobile_devices
Frameworks
• LifeCycle and Risk
Management approach
– CyberSecurity Insurance?
• SLM – Security Lifecycle
Management
• Existing?:
– NAC
– Scanning
– Communications
– Threat/Vuln Intell
– Patching?
– Segmentation?
– Segregation?
Solutions?
Intake
Analysis
Requirements
DesignTest
Deploy
Maintain
• It will get worse before it gets better
• Mandatory NIST CyberSecurity Framework?
• FDA pre-market security accreditation?
• Help Vendors
– Ask
– Assess
– Push back
• Help Universities
– Connect
– Advise
• The First Rule of Security… We Talk About Security!
– HSPIG
Final Thoughts
http://mnc3.org
Tweet along: #Sec360 www.Secure360.org
Barry Caplin
Fairview Health Services
bcaplin1@fairview.org
bc@bjb.org
@bcaplin
securityandcoffee.blogspot.com

More Related Content

What's hot

Maximize Your Economic Stimulus Dollars
Maximize Your Economic Stimulus DollarsMaximize Your Economic Stimulus Dollars
Maximize Your Economic Stimulus DollarsSteve Martin
 
Global AI seattle How AI will Reinvent Healthcare
Global AI seattle   How AI will Reinvent HealthcareGlobal AI seattle   How AI will Reinvent Healthcare
Global AI seattle How AI will Reinvent HealthcareAlex Ermolaev
 
mhealth - The role of Technology
mhealth - The role of Technologymhealth - The role of Technology
mhealth - The role of TechnologyWalton Institute
 
Social Media Access in Hospitals
Social Media Access in HospitalsSocial Media Access in Hospitals
Social Media Access in HospitalsInCrowd, Inc.
 
Media Interviews10.12
Media Interviews10.12Media Interviews10.12
Media Interviews10.12JLAKelly
 
Oct 23 CAPHC Patient Safety Symposium - Dr. Trey Coffey
Oct 23   CAPHC Patient Safety Symposium - Dr. Trey CoffeyOct 23   CAPHC Patient Safety Symposium - Dr. Trey Coffey
Oct 23 CAPHC Patient Safety Symposium - Dr. Trey CoffeyGlenna Gosewich
 
Data integrity
Data integrityData integrity
Data integrityKiran Kota
 

What's hot (10)

HC360-OurSystem
HC360-OurSystemHC360-OurSystem
HC360-OurSystem
 
Maximize Your Economic Stimulus Dollars
Maximize Your Economic Stimulus DollarsMaximize Your Economic Stimulus Dollars
Maximize Your Economic Stimulus Dollars
 
Global AI seattle How AI will Reinvent Healthcare
Global AI seattle   How AI will Reinvent HealthcareGlobal AI seattle   How AI will Reinvent Healthcare
Global AI seattle How AI will Reinvent Healthcare
 
mhealth - The role of Technology
mhealth - The role of Technologymhealth - The role of Technology
mhealth - The role of Technology
 
BioIT 2015 Data Lake Talk
BioIT 2015 Data Lake TalkBioIT 2015 Data Lake Talk
BioIT 2015 Data Lake Talk
 
Social Media Access in Hospitals
Social Media Access in HospitalsSocial Media Access in Hospitals
Social Media Access in Hospitals
 
Media Interviews10.12
Media Interviews10.12Media Interviews10.12
Media Interviews10.12
 
Oct 23 CAPHC Patient Safety Symposium - Dr. Trey Coffey
Oct 23   CAPHC Patient Safety Symposium - Dr. Trey CoffeyOct 23   CAPHC Patient Safety Symposium - Dr. Trey Coffey
Oct 23 CAPHC Patient Safety Symposium - Dr. Trey Coffey
 
Data integrity
Data integrityData integrity
Data integrity
 
The Doctor Compensation Survey Says:
The  Doctor Compensation Survey Says:The  Doctor Compensation Survey Says:
The Doctor Compensation Survey Says:
 

Viewers also liked

Web hackingtools 2015
Web hackingtools 2015Web hackingtools 2015
Web hackingtools 2015devObjective
 
Baseball Traditions
Baseball TraditionsBaseball Traditions
Baseball TraditionsDan Ashton
 
Social Media for building a pipeline for health professions
Social Media for building a pipeline for health professionsSocial Media for building a pipeline for health professions
Social Media for building a pipeline for health professionsDan Cohen
 
How 12 Business Leaders Got to the C-Suite
How 12 Business Leaders Got to the C-SuiteHow 12 Business Leaders Got to the C-Suite
How 12 Business Leaders Got to the C-SuiteMashable
 
Ux och design som konverterar del 2
Ux och design som konverterar del 2Ux och design som konverterar del 2
Ux och design som konverterar del 2Wipcore
 
8 khoanh khac ban nen cuoi
8 khoanh khac ban nen cuoi8 khoanh khac ban nen cuoi
8 khoanh khac ban nen cuoidinhnam0006
 
5 Common Mistakes That Could Kill Your Business Before You've Even Started
5 Common Mistakes That Could Kill Your Business Before You've Even Started5 Common Mistakes That Could Kill Your Business Before You've Even Started
5 Common Mistakes That Could Kill Your Business Before You've Even StartedCarly Klineberg
 
Creating the bigger picture - Die Designvision in agilen Projekten
Creating the bigger picture - Die Designvision in agilen ProjektenCreating the bigger picture - Die Designvision in agilen Projekten
Creating the bigger picture - Die Designvision in agilen ProjektenSilke Kreiling
 
Guia de estudio escuela y contexto social
Guia de estudio escuela y contexto socialGuia de estudio escuela y contexto social
Guia de estudio escuela y contexto socialvicentealcaide92
 
BPStudy #104 | IoTプラットフォームSORACOMと その開発の裏側
BPStudy #104 | IoTプラットフォームSORACOMと その開発の裏側BPStudy #104 | IoTプラットフォームSORACOMと その開発の裏側
BPStudy #104 | IoTプラットフォームSORACOMと その開発の裏側SORACOM,INC
 
How digital is impacting market strategy
How digital is impacting market strategyHow digital is impacting market strategy
How digital is impacting market strategyMANSI DHINGRA
 
ДОПОМОГА ДИТИНІ З ПОРУШЕННЯМИ ЗОРУ
ДОПОМОГА ДИТИНІ З ПОРУШЕННЯМИ ЗОРУДОПОМОГА ДИТИНІ З ПОРУШЕННЯМИ ЗОРУ
ДОПОМОГА ДИТИНІ З ПОРУШЕННЯМИ ЗОРУДмитрий Погорелов
 
LEAP-In: Hack your org
LEAP-In: Hack your orgLEAP-In: Hack your org
LEAP-In: Hack your orgBrant Cooper
 

Viewers also liked (20)

Web hackingtools 2015
Web hackingtools 2015Web hackingtools 2015
Web hackingtools 2015
 
Baseball Traditions
Baseball TraditionsBaseball Traditions
Baseball Traditions
 
Realtime T12(1)
Realtime T12(1)Realtime T12(1)
Realtime T12(1)
 
L
LL
L
 
Slide 1
Slide 1Slide 1
Slide 1
 
Front cover...
Front cover...Front cover...
Front cover...
 
Social Media for building a pipeline for health professions
Social Media for building a pipeline for health professionsSocial Media for building a pipeline for health professions
Social Media for building a pipeline for health professions
 
How 12 Business Leaders Got to the C-Suite
How 12 Business Leaders Got to the C-SuiteHow 12 Business Leaders Got to the C-Suite
How 12 Business Leaders Got to the C-Suite
 
Ux och design som konverterar del 2
Ux och design som konverterar del 2Ux och design som konverterar del 2
Ux och design som konverterar del 2
 
8 khoanh khac ban nen cuoi
8 khoanh khac ban nen cuoi8 khoanh khac ban nen cuoi
8 khoanh khac ban nen cuoi
 
5 Common Mistakes That Could Kill Your Business Before You've Even Started
5 Common Mistakes That Could Kill Your Business Before You've Even Started5 Common Mistakes That Could Kill Your Business Before You've Even Started
5 Common Mistakes That Could Kill Your Business Before You've Even Started
 
Creating the bigger picture - Die Designvision in agilen Projekten
Creating the bigger picture - Die Designvision in agilen ProjektenCreating the bigger picture - Die Designvision in agilen Projekten
Creating the bigger picture - Die Designvision in agilen Projekten
 
Guia de estudio escuela y contexto social
Guia de estudio escuela y contexto socialGuia de estudio escuela y contexto social
Guia de estudio escuela y contexto social
 
BPStudy #104 | IoTプラットフォームSORACOMと その開発の裏側
BPStudy #104 | IoTプラットフォームSORACOMと その開発の裏側BPStudy #104 | IoTプラットフォームSORACOMと その開発の裏側
BPStudy #104 | IoTプラットフォームSORACOMと その開発の裏側
 
How digital is impacting market strategy
How digital is impacting market strategyHow digital is impacting market strategy
How digital is impacting market strategy
 
Strategic Management Chapter 1
Strategic Management Chapter 1Strategic Management Chapter 1
Strategic Management Chapter 1
 
Changes in Family Wealth, 1989 to 2013
Changes in Family Wealth, 1989 to 2013Changes in Family Wealth, 1989 to 2013
Changes in Family Wealth, 1989 to 2013
 
ДОПОМОГА ДИТИНІ З ПОРУШЕННЯМИ ЗОРУ
ДОПОМОГА ДИТИНІ З ПОРУШЕННЯМИ ЗОРУДОПОМОГА ДИТИНІ З ПОРУШЕННЯМИ ЗОРУ
ДОПОМОГА ДИТИНІ З ПОРУШЕННЯМИ ЗОРУ
 
Idea Pitch
Idea PitchIdea Pitch
Idea Pitch
 
LEAP-In: Hack your org
LEAP-In: Hack your orgLEAP-In: Hack your org
LEAP-In: Hack your org
 

Similar to Dreaded Embedded sec360 5-17-16

IoT_Healthcare_Brochure V1
IoT_Healthcare_Brochure V1IoT_Healthcare_Brochure V1
IoT_Healthcare_Brochure V1Rubana Shifat
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Barry Caplin
 
Seattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareSeattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareCalance
 
Critical Care: The Importance of Stronger Authentication in Health Care
Critical Care: The Importance of Stronger Authentication in Health CareCritical Care: The Importance of Stronger Authentication in Health Care
Critical Care: The Importance of Stronger Authentication in Health CareFIDO Alliance
 
Seattle code camp 2016 - Role of Data Science in Healthcare
Seattle code camp 2016  - Role of Data Science in HealthcareSeattle code camp 2016  - Role of Data Science in Healthcare
Seattle code camp 2016 - Role of Data Science in HealthcareGaurav Garg
 
Panel: Improving Health Through Active Design
Panel: Improving Health Through Active DesignPanel: Improving Health Through Active Design
Panel: Improving Health Through Active DesignTed Eytan, MD, MS, MPH
 
Seattle Code Camp 2016- Role of Data Science in HHealthcare
Seattle Code Camp 2016- Role of Data Science in HHealthcareSeattle Code Camp 2016- Role of Data Science in HHealthcare
Seattle Code Camp 2016- Role of Data Science in HHealthcareRuba Qaqish
 
Seattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareSeattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareRuba Qaqish
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusBarry Caplin
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Behavioural change presentation from Mobile World Congress 2016
Behavioural change presentation from Mobile World Congress 2016Behavioural change presentation from Mobile World Congress 2016
Behavioural change presentation from Mobile World Congress 2016Ross Taylor
 
McGrath Health Data Analyst SXSW
McGrath Health Data Analyst SXSWMcGrath Health Data Analyst SXSW
McGrath Health Data Analyst SXSWRobert McGrath
 
Best practices from the field how one health center battles covid 19
Best practices from the field how one health center battles covid 19Best practices from the field how one health center battles covid 19
Best practices from the field how one health center battles covid 19Compliatric Where Compliance Happens
 
Best practices from the field how one health center battles covid 19
Best practices from the field how one health center battles covid 19Best practices from the field how one health center battles covid 19
Best practices from the field how one health center battles covid 19Compliatric
 
10 most trusted clinical laboratories in 2021
10 most trusted clinical laboratories in 202110 most trusted clinical laboratories in 2021
10 most trusted clinical laboratories in 2021Merry D'souza
 
Detroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDetroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDoug Copley
 
CHC Briefing: OSEHRA is a great business opportunity for healthcare IT ISVs a...
CHC Briefing: OSEHRA is a great business opportunity for healthcare IT ISVs a...CHC Briefing: OSEHRA is a great business opportunity for healthcare IT ISVs a...
CHC Briefing: OSEHRA is a great business opportunity for healthcare IT ISVs a...Shahid Shah
 
Why FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesWhy FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesFIDO Alliance
 
Health IT Summit in Seattle 2014 - Case Study "Health IT Transformation: Insu...
Health IT Summit in Seattle 2014 - Case Study "Health IT Transformation: Insu...Health IT Summit in Seattle 2014 - Case Study "Health IT Transformation: Insu...
Health IT Summit in Seattle 2014 - Case Study "Health IT Transformation: Insu...Health IT Conference – iHT2
 

Similar to Dreaded Embedded sec360 5-17-16 (20)

IoT_Healthcare_Brochure V1
IoT_Healthcare_Brochure V1IoT_Healthcare_Brochure V1
IoT_Healthcare_Brochure V1
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
Pegwin pitch deck
Pegwin pitch deckPegwin pitch deck
Pegwin pitch deck
 
Seattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareSeattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in Healthcare
 
Critical Care: The Importance of Stronger Authentication in Health Care
Critical Care: The Importance of Stronger Authentication in Health CareCritical Care: The Importance of Stronger Authentication in Health Care
Critical Care: The Importance of Stronger Authentication in Health Care
 
Seattle code camp 2016 - Role of Data Science in Healthcare
Seattle code camp 2016  - Role of Data Science in HealthcareSeattle code camp 2016  - Role of Data Science in Healthcare
Seattle code camp 2016 - Role of Data Science in Healthcare
 
Panel: Improving Health Through Active Design
Panel: Improving Health Through Active DesignPanel: Improving Health Through Active Design
Panel: Improving Health Through Active Design
 
Seattle Code Camp 2016- Role of Data Science in HHealthcare
Seattle Code Camp 2016- Role of Data Science in HHealthcareSeattle Code Camp 2016- Role of Data Science in HHealthcare
Seattle Code Camp 2016- Role of Data Science in HHealthcare
 
Seattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in HealthcareSeattle Code Camp 2016- Role of Data Science in Healthcare
Seattle Code Camp 2016- Role of Data Science in Healthcare
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Behavioural change presentation from Mobile World Congress 2016
Behavioural change presentation from Mobile World Congress 2016Behavioural change presentation from Mobile World Congress 2016
Behavioural change presentation from Mobile World Congress 2016
 
McGrath Health Data Analyst SXSW
McGrath Health Data Analyst SXSWMcGrath Health Data Analyst SXSW
McGrath Health Data Analyst SXSW
 
Best practices from the field how one health center battles covid 19
Best practices from the field how one health center battles covid 19Best practices from the field how one health center battles covid 19
Best practices from the field how one health center battles covid 19
 
Best practices from the field how one health center battles covid 19
Best practices from the field how one health center battles covid 19Best practices from the field how one health center battles covid 19
Best practices from the field how one health center battles covid 19
 
10 most trusted clinical laboratories in 2021
10 most trusted clinical laboratories in 202110 most trusted clinical laboratories in 2021
10 most trusted clinical laboratories in 2021
 
Detroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare CybersecurityDetroit ISSA Healthcare Cybersecurity
Detroit ISSA Healthcare Cybersecurity
 
CHC Briefing: OSEHRA is a great business opportunity for healthcare IT ISVs a...
CHC Briefing: OSEHRA is a great business opportunity for healthcare IT ISVs a...CHC Briefing: OSEHRA is a great business opportunity for healthcare IT ISVs a...
CHC Briefing: OSEHRA is a great business opportunity for healthcare IT ISVs a...
 
Why FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare ServicesWhy FIDO Matters: Healthcare Services
Why FIDO Matters: Healthcare Services
 
Health IT Summit in Seattle 2014 - Case Study "Health IT Transformation: Insu...
Health IT Summit in Seattle 2014 - Case Study "Health IT Transformation: Insu...Health IT Summit in Seattle 2014 - Case Study "Health IT Transformation: Insu...
Health IT Summit in Seattle 2014 - Case Study "Health IT Transformation: Insu...
 

More from Barry Caplin

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare securityBarry Caplin
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503Barry Caplin
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503Barry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - PasswordsBarry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and CyberbullyingBarry Caplin
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13Barry Caplin
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Barry Caplin
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityBarry Caplin
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso saysBarry Caplin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11Barry Caplin
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental InsiderBarry Caplin
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksBarry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsBarry Caplin
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsBarry Caplin
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart ParentBarry Caplin
 

More from Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart Parent
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Dreaded Embedded sec360 5-17-16

  • 1. The Dreaded Embedded Barry Caplin VP & CISO Fairview Health Services bcaplin1@fairview.org bc@bjb.org @bcaplin securityandcoffee.blogspot.com Secure 360 Tues. May 17, 2016 Tweet along: #Sec360
  • 3. o Not-for-profit established in 1906 o Academic Health System since 1997 partnership with University of Minnesota o >22K employees o >3,300 aligned physicians o Employed, faculty, independent o 7 hospitals/medical centers (>2,500 staffed beds) o 40-plus primary care clinics o 55-plus specialty clinics o 47 senior housing locations o 30-plus retail pharmacies 2014 volumes o 6.39M outpatient encounters o 1.4M clinic visits o 71,049 inpatient admissions o 76,595 surgeries o 9,298 births o 282 blood and marrow transplants o 340 organ transplants o >$4 billion total revenue
  • 4. Who is Fairview? A partnership of North Memorial and Fairview
  • 5. • For Reals? • What’s a “Thing” and why is it on the Internet? • Put a Chip In It • Are Medical Devices “Things”? • You’re doing what with my data? • Security Concerns • Solutions? Agenda Tweet along: #Sec360
  • 6. CSI:Cyber 11/1/15 s2/ep5 “hack E.R.” • “Hacker group” takes over hospital • Kills via infusion pump • Ransom • Weak/no auth and encryption in med devices • Smart TV • Hardware Poisoning • Flat Network • Medical Record Integrity • Physical Access to Network • Financial v Hacktivism What’s Real?
  • 7.
  • 8. “I asked you not to tell me that!” Who’s got?...
  • 9. Apr. 3, 2010 300K ipads 1M apps 250K ebooks … day 1!
  • 10. 2011 – tablet/smartphone sales exceeded PCs
  • 11. Apr. 24, 2015 1M orders 2500 apps available … day 1!
  • 12. 2016 – IOT sales exceed smartphone + tablet
  • 16. 1997
  • 17. 2013
  • 18. “Embedded” • Quantified Self • Insulin pumps, pace- makers, ICD, etc.  FDA requirements  Device manufacturers  Ease of connection • Jay Radcliffe, BlackHat 2011 Barnaby Jack, HackerHalted 2012 • Homeland attack (Broken Hearts, s2/ep10 12/2/12)  Wireless attack via pacemaker id/sn  Dick Cheney ICD, 2007 • MITM or snooping • Integrity • Availability
  • 19. Security Challenges  Exposure/Leakage of data – including repairs  Poor Design/Protocols  Ownership  Malware  Direct Attack  Integrity  Availability But don’t we have all this now???
  • 20. • Primary mechanism is… Obscurity • Focus is on Function Aesthetics Communication Cost Speed to Market • Testing? • Patching? • Design? Security
  • 21. • Sneakernet – USB updates or data movement • Data Exfiltration – aka Breach! • Integrity – Alter Capability – Alter Data/Reporting • Availability • Medjacking – Attack – Infiltrate – Pivot Attack Vectors https://securityledger.com/wp- content/uploads/2015/06/AOA_MEDJACK_LAYOUT_6-0_6-3-2015-1.pdf
  • 22. • FDA certification process – Complex, painful, long, expensive • Patching and FDA advice – Manufacturers responsible for patches – Premarket review not required for security patch FDA Reality http://www.fda.gov/MedicalDevices/DeviceRegulationand Guidance/GuidanceDocuments/ucm077812.htm http://www.fda.gov/MedicalDevices/Safety/AlertsandNotices/ ucm356423.htm
  • 23. • Retail • Manufacturing • Energy We Are Not Alone
  • 25. • FDA, NIST and others in progress • NCCoE/NIST/UMN TLI infusion pump security study https://nccoe.nist.gov/sites/default/files/nccoe/NCCOE_HIT-Medical-Device- Use-Case.pdf https://nccoe.nist.gov/projects/use_cases/medical_devices • Medical Device Innovation, Safety and Security Consortium (MDISS), International Society of Automation (ISA), HITRUST Alliance, NIST and others working with: • FDA, HHS, DOD, NHISAC, CIS (Center for Internet Security), AAMI (Association for Advancement of Medical Instrumentation), ACCE (American College of Clinical Engineering), SANS, and others • IHE/MDISS – Medical Device Software Patching white paper https://ihe.net/uploadedFiles/Documents/PCD/IHE_PCD_WP_Patching_Rev1.0 _PC_2015-07-01.pdf • MDS2 (Manufacturer Disclosure Statement for Medical Device Security) http://www.nema.org/Standards/Pages/Manufacturer-Disclosure- Statement-for-Medical-Device-Security.aspx • Archimedes http://www.secure-medicine.org/ • NIST SP-1800 Securing Electronic Health Records on Mobile Devices https://nccoe.nist.gov/projects/use_cases/health_it/ehr_on_mobile_devices Frameworks
  • 26. • LifeCycle and Risk Management approach – CyberSecurity Insurance? • SLM – Security Lifecycle Management • Existing?: – NAC – Scanning – Communications – Threat/Vuln Intell – Patching? – Segmentation? – Segregation? Solutions? Intake Analysis Requirements DesignTest Deploy Maintain
  • 27. • It will get worse before it gets better • Mandatory NIST CyberSecurity Framework? • FDA pre-market security accreditation? • Help Vendors – Ask – Assess – Push back • Help Universities – Connect – Advise • The First Rule of Security… We Talk About Security! – HSPIG Final Thoughts http://mnc3.org
  • 28. Tweet along: #Sec360 www.Secure360.org Barry Caplin Fairview Health Services bcaplin1@fairview.org bc@bjb.org @bcaplin securityandcoffee.blogspot.com

Editor's Notes

  1. June 29, 2007 the first iPhone was released – tied to AT&T
  2. http://weputachipinit.tumblr.com/
  3. http://get-fun-here.blogspot.com/2014/04/22-strange-medical-instruments-from.html http://www.surgicaltechnologists.net/blog/20-scary-old-school-surgical-tools/ - arrow extractor, trephine drill
  4. https://www.washingtonpost.com/news/the-switch/wp/2015/08/03/connected-medical-devices-the-internet-of-things-that-could-kill-you/
  5. http://thedatamap.org/
  6. http://thedatamap.org/
  7. http://www.medicaldesignbriefs.com/component/content/article/mdb/features/22579 http://www.fda.gov/AboutFDA/PartnershipsCollaborations/MemorandaofUnderstandingMOUs/OtherMOUs/ucm412565.htm http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM356190.pdf https://ihe.net/uploadedFiles/Documents/PCD/IHE_PCD_WP_Patching_Rev1.0_PC_2015-07-01.pdf http://www.insidemedicaldevices.com/2015/08/11/cybersecurity-risks-with-connected-devices/