Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/4/2015
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Healthcare Organizations Lack Tools for Cyber Situational Awareness and Threat Assessment

HITRUST Transforms Model for Effective Cyber Risk Management

Frisco, TX – March 4, 2015 – The Health Information Trust Alliance (HITRUST) has completed a three-month review of its approach to cyber risk management for the healthcare industry. The effort was focused on understanding the challenges of healthcare organizations across varying levels of information protection maturity. The review also focused on identifying approaches and solutions to effectively and practically mitigate and defend against cyber threats and risks. The analysis uncovered a constant theme: that today’s approach to cybersecurity is predominantly reactive and, for the vast majority of organizations, inefficient and labor-intensive.

The analysis also illuminated the fact that, although organizations are increasingly utilizing threat indicators and other threat intelligence, they are doing so without understanding the relevance to their organization. In addition, most organizations are still unable to understand the effectiveness of deployed information security products, especially in relation to emerging cyber threats.

In response, HITRUST announced today a new component of its cyber risk strategy. HITRUST CyberVision is the first real-time situational awareness and threat assessment tool tailored to the healthcare industry.

Specific findings from the review include:

·       Organizations consistently identified a lack of awareness of emerging cyber threats, especially previously unseen attacks, as a key concern. Organizations almost universally acknowledged they had minimal understanding as to the impact of cyber threats on their current cyber security products and the unique applications, systems and devices they protect. This lack of awareness leads many organizations to expend resources and rely heavily on indicators of compromise (IOCs) to determine if a breach or other suspicious cyber activity has already occurred while simultaneously updating rules and policies to block the IOCs. Although valuable, this approach is retrospective in nature and introduces inefficiencies.

·       Organizations lack understanding as to the effectiveness of the multitude of products deployed in their environments and lack the ability to communicate, especially to senior management, the effectiveness of their security measures against the probable cyber threat landscape. 

The review concluded that, to enable a better understanding of the emerging threat landscape and the impact on organizational-specific cyber security defenses, a new approach needs to be deployed and new tools developed. This fundamental shift requires a more proactive model where organizations have real-time situational awareness or insights into emerging cyber threats. The shift also requires the ability to understand the impact of emerging threats on an organization’s specific environment, including layered information security products deployed with custom configurations, as well as industry-specific applications, such as electronic health records (EHRs). This new approach allows organizations to assess the cyber threats relevant to their unique environment down to the applications and system level, so they can use their resources to mitigate the one-to-two percent of the cyber threats that are relevant rather than chasing the 98 percent that aren’t.

“Although we have made good progress in maturing our cyber risk management approach for industry, with significant improvements in information sharing, the real opportunity is to understand the emerging threats and model them against organization-specific defenses, configurations and applications,” said Daniel Nutkis, chief executive officer, HITRUST. “HITRUST CyberVision will also allow us to better engage with the vendor community to improve product effectiveness.”

 

Key Requirements for Real-Time Cyber Situational Awareness and Effective Threat Assessment

HITRUST established a comprehensive set of requirements for a service that would address the needs of industry and augment the current reactive approaches with one of proactive insights, by delivering key capabilities:

1.    Visibility into an extensive degree of current and emerging cyber threats, including previous unseen.

2.    Ability to evaluate the impact of these cyber threats against the actual security products -  network, server and end point - currently installed in an organization’s environment

3.    Ability to implement multiple configurations per security product and evaluate against default and various tuned configurations, including organization-specific configurations and unique applications.

4.    Ability to evaluate the effectives of various combinations of multiple security products and benchmark over time.

5.    Ability to evaluate and assess the risks within minutes of identifying the cyber threat and notifying those affected, based on the products and applications they have deployed.

6.    Ability to incorporate healthcare-specific applications, such as EHRs, computer control applications for medical devices, and organization-specific applications into the evaluation.

7.    Ability to create best practices product configurations including by application.

8.    Ability to feed threat intelligence and knowledge about which threats are bypassing current countermeasures and security products into the HITRUST Cyber Threat Exchange, allowing for prioritization of resources.

 

HITRUST CyberVision Enhances Effective Cyber Risk Management

HITRUST met with information security leaders, technology companies, researchers and other thought leaders to identify possible partners and approaches to address these needs. After a detailed analysis, HITRUST has partnered with NSS Labs, the leader in cyber security research and testing, to deliver key capabilities for the HITRUST CyberVision service.

“NSS is pleased to provide the technology powering HITRUST CyberVision. In order to accurately test the world’s leading security products, NSS developed the unique real-time capability of determining which exploits cyber threat actors are using, and more importantly which bypass security products. With HITRUST we are extending our technology to cover healthcare-specific systems and applications,” said Vikram Phatak, chief executive officer, NSS Labs.

Last year, HITRUST announced the Cyber Threat XChange (CTX) in order to overcome the obstacles for organizations unable to consume and take action on the threat indicators that HITRUST was distributing through its cyber center. The CTX takes this process one step further by automating and simplifying the exchange of IOCs and making them actionable and consumable. Now HITRUST CyberVision makes the HITRUST CTX even more efficient as it can automatically notify healthcare organizations and information security vendors of the emerging cyber threats for which a counter measure is not available, before the exploit has been weaponized.

CyberVision also enhances the effectiveness of the other HITRUST Cyber Threat Intelligence and Incident Coordination Center (C3) programs including the Monthly Threat Briefings and the CyberRX attack simulation exercise series. By adding situational awareness and threat assessment capabilities to the HITRUST C3, organizations now have the needed tools for effective Cyber Risk Management.

 

Industry Support

”HITRUST CyberVision is positioned to drastically improve the situational awareness relating to cyber threats specific to each organization’s environment, and allow more strategic and proactive approaches,” said Cris Ewell, chief information security officer, Seattle Children’s Hospital. “Small and large organizations can then integrate the information into their information security risk program to see real benefits.”

“The current model of cyber defense relies heavily on a retrospective approach, utilizing IOCs to determine if a breach has already occurred while blocking them from coming in possibly again, which does not focus resources on high priority gaps,” said Jeff Schilling, chief security officer, FireHost.

“Approaching your security posture with prevention as a key priority can make it extremely difficult for adversaries to compromise your organization. Applying analysis and automation capabilities, sharing threat intelligence and treating cybersecurity like a continuous and evolving process – not something that you do once and walk away – are good practices that can help healthcare organizations’ more proactively prevent and protect against cyber threats,” said Rick Howard, CSO at Palo Alto Networks.

“We get our annual flu shot to protect against viruses that may or may not impact us. In security, we apply products like vaccines, to achieve defense in depth protection against unknown attacks. With this service, HITRUST takes it one step further," said Wael Mohamed, chief operating officer, Trend Micro. “HITRUST will help healthcare organizations understand if they are being targeted and if their systems are prepared to defend against the attack. It is like personalized medicine for our enterprise networks and we are pleased to be part of this visionary approach to cybersecurity.”

“Fortinet supports HITRUST’s initiative to be more proactive when it comes to detection and assessment of zero day and other previously unknown exploits within the Healthcare Industry. The security industry as a whole spends too much money marketing the next gimmick and not enough resources testing the effectiveness of their products with organizations such as NSS, “ said John Maddison, vice president of marketing and products, Fortinet. "We welcome the chance to take part and contribute in this initiative.“

HITRUST has also been invited to testify at the House Committee on Government Reform, Subcommittee on Information Technology hearing titled “Cybersecurity: The Evolving Nature of the Cyber Threat Facing the Private Sector" on Thursday, March 5th. HITRUST looks forward to discussing this new capability and to present its new model for cybersecurity risk management with Chairman Hurd and Congressional leaders. To read the testimony and watch the live broadcasting visit: http://oversight.house.gov/hearing/cybersecurity-evolving-nature-cyber-threats-facing-private-sector/

 

Availability

HITRUST expects to have the CyberVision service available by March 9, 2015 including a free subscription level. To download a CyberVision white paper, watch a video, and register to get free access to the launch version of CyberVision - a fully functional system with many information security products -  visit: https://hitrustalliance.net/cybervision/. Additional products and applications are being tested and added continuously. HITRUST is also asking participants to help prioritize the information security products and applications they would like to see in the CyberVision service.

 

About HITRUST

Founded in 2007, the Health Information Trust Alliance (HITRUST) was born out of the belief that information protection should be a core pillar of, rather than an obstacle to, the broad adoption of health information systems and exchanges. HITRUST - in collaboration with public and private healthcare technology, privacy and information security leaders - has championed programs instrumental in safeguarding health information systems and exchanges while ensuring consumer confidence in their use.

HITRUST programs include the establishment of a common risk and compliance management framework (CSF); an assessment and assurance methodology; educational and career development; advocacy and awareness; and a federally recognized cyber Information Sharing and Analysis Organization (ISAO) and supporting initiatives. Over 84 percent of hospitals and health plans, as well as many other healthcare organizations and business associates, use the CSF, making it the most widely adopted security framework in the industry. For more information, visit www.HITRUSTalliance.net.

All product and company names herein may be trademarks of their respective owners.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
JivkoS476
50%
50%
JivkoS476,
User Rank: Apprentice
3/5/2015 | 11:02:04 AM
Management
I think that this three-month review is thoughtfully very well, really.

I think also like you  that today's approach to cyber security is predominantly reactive and for the vast majority of organizations, inefficient and labor-intensive and this  just has to change, really, even thinkcarma.com/ and KML company confirmed it .
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
US Counterintelligence Director & Fmr. Europol Leader Talk Election Security
Kelly Sheridan, Staff Editor, Dark Reading,  10/16/2020
7 Tips for Choosing Security Metrics That Matter
Ericka Chickowski, Contributing Writer,  10/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9417
PUBLISHED: 2020-10-20
The Transaction Insight reporting component of TIBCO Software Inc.'s TIBCO Foresight Archive and Retrieval System, TIBCO Foresight Archive and Retrieval System Healthcare Edition, TIBCO Foresight Operational Monitor, TIBCO Foresight Operational Monitor Healthcare Edition, TIBCO Foresight Transaction...
CVE-2020-15264
PUBLISHED: 2020-10-20
The Boxstarter installer before version 2.13.0 configures C:\ProgramData\Boxstarter to be in the system-wide PATH environment variable. However, this directory is writable by normal, unprivileged users. To exploit the vulnerability, place a DLL in this directory that a privileged service is looking ...
CVE-2020-15269
PUBLISHED: 2020-10-20
In Spree before versions 3.7.11, 4.0.4, or 4.1.11, expired user tokens could be used to access Storefront API v2 endpoints. The issue is patched in versions 3.7.11, 4.0.4 and 4.1.11. A workaround without upgrading is described in the linked advisory.
CVE-2019-9080
PUBLISHED: 2020-10-20
DomainMOD before 4.14.0 uses MD5 without a salt for password storage.
CVE-2020-15931
PUBLISHED: 2020-10-20
Netwrix Account Lockout Examiner before 5.1 allows remote attackers to capture the Net-NTLMv1/v2 authentication challenge hash of the Domain Administrator (that is configured within the product in its installation state) by generating a single Kerberos Pre-Authentication Failed (ID 4771) event on a ...