The path to greater healthcare security and more powerful behavioral analytics will require care providers to make strides with managing, training, governing and monitoring their users. Being able to correlate users with all systems they access is a must, but most care providers struggle with basic identity management.
Are some of the people within your healthcare organization behaving badly?
Of course they are. No insult intended—it’s not just your organization. Every organization has a few bad actors scattered amongst all the great employees that comprise the bulk of the workforce.
In fact, statistics indicate that the majority of patient data breaches result from insider threats. The 2017 Verizon Data Breach Report notes that healthcare “…is the only industry where employees are the predominant threat actors in breaches.”
And it only takes a few bad actors—or even just one—to cause massive damage to your organization.
John Houston is the VP of Information Security and Privacy at the University of Pittsburg Medical Center. Kurt Long is FairWarning’s CEO and Founder. In this webinar, John and Kurt team up to discuss the importance of incorporating behavioral security analytics in protecting the patient data of healthcare organizations.
Much of patient privacy monitoring is deterministic: providing definitive, yes-or-no insights to whether health records have been improperly accessed. Behavioral analytics, on the other hand, yields probabilistic insights, i.e., there’s an x% probability that health records were improperly accessed.
Behavioral analytics use cases include:
Providing information security insights
Exposing insider threats
Revealing compromised credentials
Ultimately, behavioral analytics can provide predictive and preventative insights: Predicting which employees may cause future problems based on past behavior, and using those insights to prevent future problems.
In this webinar, you’ll learn:
The one problem responsible for the majority of data breaches
How the lack of insider/user knowledge is crippling the data security defenses of 9 out of 10 healthcare organizations
The role legacy application architectures play in people-related security problems
Details about user identity management problems with major EHR vendors
The (painful!) lessons that have been learned from security problems resulting from poor user identity intelligence
How nuggets of valuable behavioral insights can be gleaned from often-ignored sources
Employee behavioral actions that are most synonymous with data theft activities