SlideShare uma empresa Scribd logo
1 de 45
Celebrating a decade
of guiding security
professionals.
@Secure360 or #Sec360 www.Secure360.org
Wearing My Heart on My Sleeve…
Literally!
Barry Caplin
Tues. May 12, 2015, 11A
Wearing My Heart On
My Sleeve…
Literally!
Secure360
Tues. May 12, 2015
bcaplin1@fairview.org
bc@bjb.org @bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Barry Caplin
VP, Chief Information Security Officer
Fairview Health Services
http://about.me/barrycaplin
securityandcoffee.blogspot.com
@bcaplin
Fairview Overview
• Not-for-profit established in 1906
• Academic Health System since 1997
partnership with University of Minnesota
• >22K employees
• >3,300 aligned physicians
 Employed, faculty, independent
• 7 hospitals/medical centers
(>2,500 staffed beds)
• 40-plus primary care clinics
• 55-plus specialty clinics
• 47 senior housing locations
• 30-plus retail pharmacies
4
2012 data
•5.7 million outpatient encounters
•74,649 inpatient admissions
•$2.8 billion total assets
•$3.2 billion total revenue
Who is Fairview?
A partnership of North Memorial and Fairview
Agenda
• WTF?
• Who’s Watching?
• You’re doing what with my data?
• You can’t see me… I’m anonymized!
• Security Challenges for home and work
“I asked you not to
tell me that!”
Who’s got?...
8
Apr. 3, 2010
300K ipads
1M apps
250K ebooks
… day 1!
2011 – tablet/smartphone sales exceeded PCs
10
Apr. 24, 2015
1M orders
2500 apps
available
… day 1!
2016 – IOT sales exceed smartphone+tablet
2011 – tablet/smartphone sales exceeded PCs
Got Fitness?
High Hopes?
Consumers:
Not yet embraced
Don’t want to pay too much
Skeptical about social sharing
Concerned about Privacy
Who’s Watching?
2014 FTC report on Data Brokers
•Combine online & offline – often without consent
- Purchases
- Social Media
- Warranty info
- Subscriptions
- Affiliations
•They share
•Analysis creates Inference
•Regulation proposed
Back To The Future!
1997
2013
Example TOS/Privacy – Fitness device
• 13 or older
• Account with valid email
• Rules about posting content
• You own your content
• Use at your own risk
• Consult doctor before exercising
• “Use Common Sense”/Wear & Care – skin
• 3rd
party disclaimer
• Indemnity
• Limitation of Liability/Dispute Resolution
Example TOS/Privacy – Fitness device
• Only collect data useful to improving products, services,
experience
• Transparency
• Never sell PII (can opt-in)
• Take security seriously
• Info:
• Email address, pw, nickname, dob
• Oauth: name, profile pic, friend list, phone contact list (friend id – not saved)
• Web logs incl. IP
• Cookies – don’t honor DNT – AppNexus, DataXu, DblClick, Google AdWords,
AdRoll, Twitter, LiveRamp, Advertising.com, Bidswitch, Facebook, Genome,
SearchForce
• Analytics – Mixpanel, Google Analytics, New Relic, KissInsights, Optimizely
• Friends’ contact info
• Location – GPS, WiFi APs, cell tower IDs
Example TOS/Privacy – Fitness device
• De-Identified data -> health community, marketing,
for sale
• PII shared with:
• Order fulfillment, email mgmt., CC processing firms
• Legal or Gov’t request
• Merger, sale or reorg
• Anyone user specifies (third party apps)
Who’s Watching?
2014 FTC report on Data Brokers
•Combine online & offline – often without consent
- Purchases
- Social Media
- Warranty info
- Subscriptions
- Affiliations
•They share
•Analysis creates Inference
•Regulation proposed
Data Brokers collect
• Basic ID data – name, address
• ++ – ssn, license #
• Demographics – A/S/L, race, employment, religion
• Court records – bankruptcy, criminal, domestic
• Home/Neighborhood – rent/loan info
• Interests
• Financial – credit, income, net
• Vehicle – brand, new/used
• Travel – preferences
• Purchase behaviors
• Health – tobacco, allergies, glasses, supplements
De-Identi-what?
• 2000 study – 87% census ID’d using: zip, d.o.b., gender
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006
• 2013 – 40% of genome participants ID’d
• 2008 – 80% ID’d using when/how for 3 Netflix ratings
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4531148
• Feb deal between Facebook, Acxiom and other data
brokers
−Acxiom data linked to 90% of US social profiles
• MIT – 4 phone position samples to link to specific person
http://www.technologyreview.com/news/513016/how-wireless-carriers-are-monetizing-your-
movements/
https://epic.org/privacy/reidentification/ + MIT + UCLA
De-Identi-what?
(re-identification)
(De-anonymization)
Data Exfil
• Data explicitly given
• Implicitly but known (phone, Google Now)
• Implicitly but unknown
• Transitive Consent
Is Privacy Dead?
• Just the definition!
• Privacy is about control
• You must have the ability to decide:
− What
− When
− How, and
− With whom
You share your personal data
• What’s in it for you
“Magic Quadrant” of Data Leak Pain
No/Yes Huh?
Unknown
Choice
Known
How
Much
Future Shock
• Msoft/U of Rochester (NY)
• GPS + vehicle data
• Where you will be 80 weeks from now – 80%
confidence
http://www.cs.rochester.edu/~sadilek/publications/Sadilek-Krumm_Far-Out_AAAI-12.pdf
Security Challenges
Exposure of data
Leakage of data – sold, donated, tossed,
repaired drives
Poor Design/Protocols
Malware
Integrity
Availability
But don’t we have all this now???
At Work
At Work
• Wearable = portable = stealable
• What data
• How stored – device, phone, computer, component,
cloud
• How backed up (cloud)
• Encryption available?
• Location
• Medical, health info on staff
• Additional info exposure – opportunities for social
engineering
For Work?
• BYOW?
• Employer-provided?
− Badge
− Smartphone
− Glass?
− RTLS?
− Health/fitness monitoring?
− Time – Desk, Meetings, Bathroom, Break, Lunch or
Coffee time?
Additional Attack Vectors
• Glasses or camera-enabled
− Video/pictures
− IP disclosure?
− Glass-jacking?
• Info disclosure and “Bio-
Social Engineering” ©
− AccelerometerTempest
− Negotiation biomarker
disclosure – never let them
see you sweat!
− Human pattern mapping
− Biomarker manipulation
− Augmented Reality
distortion
− Group Movement/Behavior
Medical
• Primary mechanism is… Obscurity
• Focus is on
− Function
− Aesthetics
− Communication
− Cost
− Speed to Market
• Testing?
• Patching?
• Design?
Security
Security
The Real Issue…
CISOs are from Mars
CIOs are from Venus
Secure360
Tues. May 12, 2015 1:30P
bcaplin1@fairview.org
bc@bjb.org @bcaplin
http://about.me/barrycaplin
http://securityandcoffee.blogspot.com
Barry Caplin
VP, Chief Information Security Officer
Fairview Health Services
Wearing Your Heart On Your Sleeve - Literally!

Mais conteúdo relacionado

Mais procurados

Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneTim Rich
 
The Reputation Economy: Protecting your most valuable asset in the age of Google
The Reputation Economy: Protecting your most valuable asset in the age of GoogleThe Reputation Economy: Protecting your most valuable asset in the age of Google
The Reputation Economy: Protecting your most valuable asset in the age of GoogleKR_Barker
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012curlistl
 
Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)KR_Barker
 
Beer and Branding for Graduate BioSciences (Oct 2016)
Beer and Branding for Graduate BioSciences (Oct 2016)Beer and Branding for Graduate BioSciences (Oct 2016)
Beer and Branding for Graduate BioSciences (Oct 2016)KR_Barker
 
The Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsThe Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsJohn Lovett
 
The Reputation Economy (July/2015)
The Reputation Economy (July/2015)The Reputation Economy (July/2015)
The Reputation Economy (July/2015)KR_Barker
 
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...KR_Barker
 
Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Alyanna Marie
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533Hubbamar
 
The Reputation Economy (March 2016)
The Reputation Economy (March 2016)The Reputation Economy (March 2016)
The Reputation Economy (March 2016)KR_Barker
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the YoungFrederick Lane
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Onlinetomasztopa
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017FourthAsAService
 
Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)KR_Barker
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the InternetPhil Bradley
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesThe Lorenzi Group
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data28 Burnside
 

Mais procurados (20)

Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
The Reputation Economy: Protecting your most valuable asset in the age of Google
The Reputation Economy: Protecting your most valuable asset in the age of GoogleThe Reputation Economy: Protecting your most valuable asset in the age of Google
The Reputation Economy: Protecting your most valuable asset in the age of Google
 
Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012Legal Issues In Social Media Oct. 2012
Legal Issues In Social Media Oct. 2012
 
Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)Your Online Identity: Discovering, Controlling, Managing (January 2016)
Your Online Identity: Discovering, Controlling, Managing (January 2016)
 
Beer and Branding for Graduate BioSciences (Oct 2016)
Beer and Branding for Graduate BioSciences (Oct 2016)Beer and Branding for Graduate BioSciences (Oct 2016)
Beer and Branding for Graduate BioSciences (Oct 2016)
 
The Web Analyst's Code of Ethics
The Web Analyst's Code of EthicsThe Web Analyst's Code of Ethics
The Web Analyst's Code of Ethics
 
The Reputation Economy (July/2015)
The Reputation Economy (July/2015)The Reputation Economy (July/2015)
The Reputation Economy (July/2015)
 
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
The Reputation Economy: Managing Your Online Identity in the Age of Google- N...
 
Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
The Reputation Economy (March 2016)
The Reputation Economy (March 2016)The Reputation Economy (March 2016)
The Reputation Economy (March 2016)
 
2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young2014-09-10 Cybertraps for the Young
2014-09-10 Cybertraps for the Young
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
Online Privacy - What everyone should know - Full Sail Hall of Fame Week - 2017
 
Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)
 
Privacy on the Internet
Privacy on the InternetPrivacy on the Internet
Privacy on the Internet
 
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR ExecutivesDigital Forensics, eDiscovery & Technology Risks for HR Executives
Digital Forensics, eDiscovery & Technology Risks for HR Executives
 
Digital Self
Digital SelfDigital Self
Digital Self
 
Introduction to Ethics of Big Data
Introduction to Ethics of Big DataIntroduction to Ethics of Big Data
Introduction to Ethics of Big Data
 

Destaque

Konzept 100.tagesschau.mobi
Konzept 100.tagesschau.mobiKonzept 100.tagesschau.mobi
Konzept 100.tagesschau.mobiAlex Boerger
 
Service: The Antidote to Greed
Service: The Antidote to GreedService: The Antidote to Greed
Service: The Antidote to GreedSteve Thomason
 
Certificates attained
Certificates attainedCertificates attained
Certificates attainedKush Dalal
 
KorEsate - Investment Deck
KorEsate - Investment DeckKorEsate - Investment Deck
KorEsate - Investment DeckMike De'Shazer
 
Grafico diario del dax perfomance index para el 13 02-2012
Grafico diario del dax perfomance index para el 13 02-2012Grafico diario del dax perfomance index para el 13 02-2012
Grafico diario del dax perfomance index para el 13 02-2012Experiencia Trading
 
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1f' yagami
 
Creating a Better Protective Suit Against Ebola
Creating a Better Protective Suit Against EbolaCreating a Better Protective Suit Against Ebola
Creating a Better Protective Suit Against EbolaSapient Consulting
 
Britain 2012 and the implications for government communication
Britain 2012 and the implications for government communicationBritain 2012 and the implications for government communication
Britain 2012 and the implications for government communicationIpsos UK
 
Exploring Augmented Reality for Practical Purposes
Exploring Augmented Reality  for Practical PurposesExploring Augmented Reality  for Practical Purposes
Exploring Augmented Reality for Practical PurposesSapient Consulting
 
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...Urban Habitat
 
Presentation1
Presentation1Presentation1
Presentation1marj3
 
SEO Research Survey: Common SEO Assumptions and Real User Feedback
SEO Research Survey: Common SEO Assumptions and Real User FeedbackSEO Research Survey: Common SEO Assumptions and Real User Feedback
SEO Research Survey: Common SEO Assumptions and Real User FeedbackEli Schwartz
 
Presentacion simuladores
Presentacion simuladoresPresentacion simuladores
Presentacion simuladoresgeraldin11
 
Gartner Supply Chain Executive Conference 2013
Gartner Supply Chain Executive Conference 2013 Gartner Supply Chain Executive Conference 2013
Gartner Supply Chain Executive Conference 2013 Yakuzaazero
 

Destaque (20)

Recorte Web - UPA - MediaIN
Recorte Web - UPA - MediaINRecorte Web - UPA - MediaIN
Recorte Web - UPA - MediaIN
 
Konzept 100.tagesschau.mobi
Konzept 100.tagesschau.mobiKonzept 100.tagesschau.mobi
Konzept 100.tagesschau.mobi
 
Service: The Antidote to Greed
Service: The Antidote to GreedService: The Antidote to Greed
Service: The Antidote to Greed
 
God Is Always Just
God Is Always JustGod Is Always Just
God Is Always Just
 
Certificates attained
Certificates attainedCertificates attained
Certificates attained
 
KorEsate - Investment Deck
KorEsate - Investment DeckKorEsate - Investment Deck
KorEsate - Investment Deck
 
Grafico diario del dax perfomance index para el 13 02-2012
Grafico diario del dax perfomance index para el 13 02-2012Grafico diario del dax perfomance index para el 13 02-2012
Grafico diario del dax perfomance index para el 13 02-2012
 
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
Unsur unsur hara_bagi_pertumbuhan_tanaman_bab_ii1
 
LOS HIJOS
LOS HIJOSLOS HIJOS
LOS HIJOS
 
Creating a Better Protective Suit Against Ebola
Creating a Better Protective Suit Against EbolaCreating a Better Protective Suit Against Ebola
Creating a Better Protective Suit Against Ebola
 
La escuela y yo
La  escuela y yoLa  escuela y yo
La escuela y yo
 
Britain 2012 and the implications for government communication
Britain 2012 and the implications for government communicationBritain 2012 and the implications for government communication
Britain 2012 and the implications for government communication
 
Exploring Augmented Reality for Practical Purposes
Exploring Augmented Reality  for Practical PurposesExploring Augmented Reality  for Practical Purposes
Exploring Augmented Reality for Practical Purposes
 
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
Breaking the Impasse:Balancing the Interests of Public Health & Housing in Af...
 
Infographics Creation Guide
Infographics Creation GuideInfographics Creation Guide
Infographics Creation Guide
 
KorEstate
KorEstate KorEstate
KorEstate
 
Presentation1
Presentation1Presentation1
Presentation1
 
SEO Research Survey: Common SEO Assumptions and Real User Feedback
SEO Research Survey: Common SEO Assumptions and Real User FeedbackSEO Research Survey: Common SEO Assumptions and Real User Feedback
SEO Research Survey: Common SEO Assumptions and Real User Feedback
 
Presentacion simuladores
Presentacion simuladoresPresentacion simuladores
Presentacion simuladores
 
Gartner Supply Chain Executive Conference 2013
Gartner Supply Chain Executive Conference 2013 Gartner Supply Chain Executive Conference 2013
Gartner Supply Chain Executive Conference 2013
 

Semelhante a Wearing Your Heart On Your Sleeve - Literally!

Respect Thy Data: The Gospel
Respect Thy Data: The GospelRespect Thy Data: The Gospel
Respect Thy Data: The GospelJill Gilbert
 
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...m Habitat
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16Barry Caplin
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental InsiderBarry Caplin
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?Stephen Cobb
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013StampedeCon
 
Sdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) finalSdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) finalkimlyman
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingRebecca Leitch
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingSecurity Innovation
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacyJoshua Johnston
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible DataTom Walker
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare PrivacyVivian Motti
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare PrivacyVivian Motti
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Flextracker incuba uc high technology
Flextracker   incuba uc high technologyFlextracker   incuba uc high technology
Flextracker incuba uc high technologyLaercio Simões
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation Data-Set
 
MDYA 360: Improving At-Risk Youth’s Future
MDYA 360: Improving At-Risk Youth’s Future MDYA 360: Improving At-Risk Youth’s Future
MDYA 360: Improving At-Risk Youth’s Future Qualtrics
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationJan Wiegelmann
 

Semelhante a Wearing Your Heart On Your Sleeve - Literally! (20)

Respect Thy Data: The Gospel
Respect Thy Data: The GospelRespect Thy Data: The Gospel
Respect Thy Data: The Gospel
 
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
Jeremy Wyatt's Presentation on Privacy for the mHealthHabitat Heart of the Ha...
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?The mobile health IT security challenge: way bigger than HIPAA?
The mobile health IT security challenge: way bigger than HIPAA?
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
 
Sdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) finalSdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) final
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be TellingPrivacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
 
Free geek class on Data privacy
Free geek class on Data privacyFree geek class on Data privacy
Free geek class on Data privacy
 
Hivos and Responsible Data
Hivos and Responsible DataHivos and Responsible Data
Hivos and Responsible Data
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare Privacy
 
Healthcare Privacy
Healthcare PrivacyHealthcare Privacy
Healthcare Privacy
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Flextracker incuba uc high technology
Flextracker   incuba uc high technologyFlextracker   incuba uc high technology
Flextracker incuba uc high technology
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
Data set Legislation
Data set   Legislation Data set   Legislation
Data set Legislation
 
MDYA 360: Improving At-Risk Youth’s Future
MDYA 360: Improving At-Risk Youth’s Future MDYA 360: Improving At-Risk Youth’s Future
MDYA 360: Improving At-Risk Youth’s Future
 
Big Data and You
Big Data and YouBig Data and You
Big Data and You
 
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital TransformationData Analytics and Artificial Intelligence in the era of Digital Transformation
Data Analytics and Artificial Intelligence in the era of Digital Transformation
 

Mais de Barry Caplin

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare securityBarry Caplin
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503Barry Caplin
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503Barry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - PasswordsBarry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and CyberbullyingBarry Caplin
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13Barry Caplin
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso saysBarry Caplin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11Barry Caplin
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksBarry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsBarry Caplin
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsBarry Caplin
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle ManagementBarry Caplin
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramBarry Caplin
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101Barry Caplin
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfBarry Caplin
 

Mais de Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 
Elements of an Information Security Awareness Program
Elements of an Information Security Awareness ProgramElements of an Information Security Awareness Program
Elements of an Information Security Awareness Program
 
Risk Management 101
Risk Management 101Risk Management 101
Risk Management 101
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 

Último

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Wearing Your Heart On Your Sleeve - Literally!

  • 1. Celebrating a decade of guiding security professionals. @Secure360 or #Sec360 www.Secure360.org Wearing My Heart on My Sleeve… Literally! Barry Caplin Tues. May 12, 2015, 11A
  • 2. Wearing My Heart On My Sleeve… Literally! Secure360 Tues. May 12, 2015 bcaplin1@fairview.org bc@bjb.org @bcaplin http://about.me/barrycaplin http://securityandcoffee.blogspot.com Barry Caplin VP, Chief Information Security Officer Fairview Health Services
  • 4. Fairview Overview • Not-for-profit established in 1906 • Academic Health System since 1997 partnership with University of Minnesota • >22K employees • >3,300 aligned physicians  Employed, faculty, independent • 7 hospitals/medical centers (>2,500 staffed beds) • 40-plus primary care clinics • 55-plus specialty clinics • 47 senior housing locations • 30-plus retail pharmacies 4 2012 data •5.7 million outpatient encounters •74,649 inpatient admissions •$2.8 billion total assets •$3.2 billion total revenue
  • 5. Who is Fairview? A partnership of North Memorial and Fairview
  • 6. Agenda • WTF? • Who’s Watching? • You’re doing what with my data? • You can’t see me… I’m anonymized! • Security Challenges for home and work
  • 7. “I asked you not to tell me that!” Who’s got?...
  • 8. 8 Apr. 3, 2010 300K ipads 1M apps 250K ebooks … day 1!
  • 9. 2011 – tablet/smartphone sales exceeded PCs
  • 10. 10 Apr. 24, 2015 1M orders 2500 apps available … day 1!
  • 11. 2016 – IOT sales exceed smartphone+tablet
  • 12. 2011 – tablet/smartphone sales exceeded PCs
  • 13.
  • 15. High Hopes? Consumers: Not yet embraced Don’t want to pay too much Skeptical about social sharing Concerned about Privacy
  • 16. Who’s Watching? 2014 FTC report on Data Brokers •Combine online & offline – often without consent - Purchases - Social Media - Warranty info - Subscriptions - Affiliations •They share •Analysis creates Inference •Regulation proposed
  • 17. Back To The Future!
  • 18. 1997
  • 19. 2013
  • 20. Example TOS/Privacy – Fitness device • 13 or older • Account with valid email • Rules about posting content • You own your content • Use at your own risk • Consult doctor before exercising • “Use Common Sense”/Wear & Care – skin • 3rd party disclaimer • Indemnity • Limitation of Liability/Dispute Resolution
  • 21. Example TOS/Privacy – Fitness device • Only collect data useful to improving products, services, experience • Transparency • Never sell PII (can opt-in) • Take security seriously • Info: • Email address, pw, nickname, dob • Oauth: name, profile pic, friend list, phone contact list (friend id – not saved) • Web logs incl. IP • Cookies – don’t honor DNT – AppNexus, DataXu, DblClick, Google AdWords, AdRoll, Twitter, LiveRamp, Advertising.com, Bidswitch, Facebook, Genome, SearchForce • Analytics – Mixpanel, Google Analytics, New Relic, KissInsights, Optimizely • Friends’ contact info • Location – GPS, WiFi APs, cell tower IDs
  • 22. Example TOS/Privacy – Fitness device • De-Identified data -> health community, marketing, for sale • PII shared with: • Order fulfillment, email mgmt., CC processing firms • Legal or Gov’t request • Merger, sale or reorg • Anyone user specifies (third party apps)
  • 23.
  • 24. Who’s Watching? 2014 FTC report on Data Brokers •Combine online & offline – often without consent - Purchases - Social Media - Warranty info - Subscriptions - Affiliations •They share •Analysis creates Inference •Regulation proposed
  • 25. Data Brokers collect • Basic ID data – name, address • ++ – ssn, license # • Demographics – A/S/L, race, employment, religion • Court records – bankruptcy, criminal, domestic • Home/Neighborhood – rent/loan info • Interests • Financial – credit, income, net • Vehicle – brand, new/used • Travel – preferences • Purchase behaviors • Health – tobacco, allergies, glasses, supplements
  • 26. De-Identi-what? • 2000 study – 87% census ID’d using: zip, d.o.b., gender http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006 • 2013 – 40% of genome participants ID’d • 2008 – 80% ID’d using when/how for 3 Netflix ratings http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4531148 • Feb deal between Facebook, Acxiom and other data brokers −Acxiom data linked to 90% of US social profiles • MIT – 4 phone position samples to link to specific person http://www.technologyreview.com/news/513016/how-wireless-carriers-are-monetizing-your- movements/ https://epic.org/privacy/reidentification/ + MIT + UCLA
  • 28. Data Exfil • Data explicitly given • Implicitly but known (phone, Google Now) • Implicitly but unknown • Transitive Consent
  • 29. Is Privacy Dead? • Just the definition! • Privacy is about control • You must have the ability to decide: − What − When − How, and − With whom You share your personal data • What’s in it for you
  • 30. “Magic Quadrant” of Data Leak Pain No/Yes Huh? Unknown Choice Known How Much
  • 31. Future Shock • Msoft/U of Rochester (NY) • GPS + vehicle data • Where you will be 80 weeks from now – 80% confidence http://www.cs.rochester.edu/~sadilek/publications/Sadilek-Krumm_Far-Out_AAAI-12.pdf
  • 32. Security Challenges Exposure of data Leakage of data – sold, donated, tossed, repaired drives Poor Design/Protocols Malware Integrity Availability But don’t we have all this now???
  • 33.
  • 35. At Work • Wearable = portable = stealable • What data • How stored – device, phone, computer, component, cloud • How backed up (cloud) • Encryption available? • Location • Medical, health info on staff • Additional info exposure – opportunities for social engineering
  • 36. For Work? • BYOW? • Employer-provided? − Badge − Smartphone − Glass? − RTLS? − Health/fitness monitoring? − Time – Desk, Meetings, Bathroom, Break, Lunch or Coffee time?
  • 37. Additional Attack Vectors • Glasses or camera-enabled − Video/pictures − IP disclosure? − Glass-jacking? • Info disclosure and “Bio- Social Engineering” © − AccelerometerTempest − Negotiation biomarker disclosure – never let them see you sweat! − Human pattern mapping − Biomarker manipulation − Augmented Reality distortion − Group Movement/Behavior
  • 38.
  • 40. • Primary mechanism is… Obscurity • Focus is on − Function − Aesthetics − Communication − Cost − Speed to Market • Testing? • Patching? • Design? Security
  • 43.
  • 44. CISOs are from Mars CIOs are from Venus Secure360 Tues. May 12, 2015 1:30P bcaplin1@fairview.org bc@bjb.org @bcaplin http://about.me/barrycaplin http://securityandcoffee.blogspot.com Barry Caplin VP, Chief Information Security Officer Fairview Health Services

Notas do Editor

  1. Talk based on 7 parts of 5 part blog series (blog link, twitter link) Check out my about.me, with links to twitter feed and Security and Coffee blog.
  2. https://www.ftc.gov/news-events/press-releases/2014/05/ftc-recommends-congress-require-data-broker-industry-be-more
  3. AppleWatch 2015; iPad 2010; iPhone 2007; Android/Youtube 2005 In 2004, the ACLU produced a satiric video called “Ordering Pizza in 2015” that has become the single most-downloaded piece of content we’ve ever produced (at least we believe in the absence of complete stats). I won’t describe it—you can watch it here if you haven’t seen it—but like many successful viral products, it combined humor with a biting commentary on an all-too-real set of trends.  https://www.aclu.org/blog/aclus-pizza-video-10-years-later
  4. http://thedatamap.org/
  5. http://thedatamap.org/
  6. https://www.fitbit.com/terms
  7. https://www.fitbit.com/privacy
  8. https://www.fitbit.com/privacy
  9. 2.8 zettabytes in 2012; predicted >5.6zb in 2015 http://www.technologyreview.com/news/514351/has-big-data-made-anonymity-impossible/
  10. https://www.ftc.gov/news-events/press-releases/2014/05/ftc-recommends-congress-require-data-broker-industry-be-more
  11. http://www.techrepublic.com/article/the-scary-truth-about-data-security-with-wearables/
  12. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006 Latanya Sweeney, Uniqueness of Simple Demographics in the U.S. Population (Laboratory for Int’l Data Privacy, Working Paper LIDAP-WP4, 2000). For more on this study, see infra Part I.B.1.b. More recently, Philippe Golle revisited Dr. Sweeney’s study, and recalculated the statistics based on year 2000 census data. Dr. Golle could not replicate the earlier 87 percent statistic, but he did calculate that 61 percent of the population in 1990 and 63 percent in 2000 were uniquely identified by ZIP, birth date, and sex. Philippe Golle, Revisiting the Uniqueness of Simple Demographics in the US Population, 5 ACM W ORKSHOP ON P RIVACY IN THE E LEC . S OC ’ Y 77, 78 (2006) http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=4531148 We apply our de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's largest online movie rental service. We demonstrate that an adversary who knows only a little bit about an individual subscriber can easily identify this subscriber's record in the dataset. Arvind Narayanan & Vitaly Shmatikov, Robust De-Anonymization of Large Sparse Datasets, in PROC. OF THE 2008 IEEE SYMP. ON SECURITY AND PRIVACY 111, 121 [hereinafter Netflix Prize Study]. For more on this study, see infra Part I.B.1.c. MIT researchers Yves-Alexandre de Montjoye and César A. Hidalgo http://www.technologyreview.com/news/514351/has-big-data-made-anonymity-impossible/
  13. http://aboutmyinfo.org/index.html
  14. Analyzed 32K days worth of GPS data http://www.cs.rochester.edu/~sadilek/publications/Sadilek-Krumm_Far-Out_AAAI-12.pdf
  15. Real-Time Location Service
  16. http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html http://www.secure-medicine.org/public/publications/icd-study.pdf http://www.forbes.com/sites/singularity/2012/12/06/yes-you-can-hack-a-pacemaker-and-other-medical-devices-too/ Before 2006, all pacemaker programming and interrogation was performed using inductive telemetry. Programming using inductive telemetry requires very close skin contact. The programming wand is held up to the chest, a magnetic reed switch is opened on the implant, and the device is then open for programming and/or interrogation. Communication is near field (sub 1MHZ), and data rates are less than 50KHZ.The obvious drawback to inductive telemetry is the extremely close range required. To remedy this, manufacturers began implementing radiofrequency (RF) communication on their devices and utilized the MICS (Medical Implant Communication Service) frequency band. MICS operates in the 402-405MHZ band and offers interrogation and programming from greater distances, with faster transfer speeds. In 2006, the FDA began approving fully wireless-5based pacemakers and ICDs.Recent remote monitors/bedside transmitters and pacemaker/ICD programmers support both inductive telemetry as well as RF communication. When communicating with RF implantable devices, the devices typically pair with the programmer or transmitter by using the serial number, or the serial number and model number. It's important to note that currently the bedside transmitters do not allow a physician to dial into the devices and reprogram the devices. The transmitter can only dial out. http://arstechnica.com/security/2012/08/medical-device-hack-attacks/ http://www.telegraph.co.uk/news/science/science-news/11212777/Terrorists-could-hack-pacemakers-like-in-Homeland-say-security-experts.html