.st0{fill:#FFFFFF;}

CISA Interview – Ep 327 

 October 22, 2021

By  Donna Grindle

'CISA Interview with Josh Corman

In today’s episode, we talk with Josh Corman, Chief Strategist Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security. We will learn about CISA and what information and freely available services they provide to help healthcare businesses and other organizations within the nation’s 16 critical infrastructure sectors from cyber attacks.

A 5 star review is all we ask from our listeners.
1x
Free HIPAA Training
Subscribe to the weekly email update from HMWH

I have read and agreed to your Privacy Policy

In this episode:

CISA Interview – Ep 327

Today’s Episode is brought to you by:

Kardon

and

HIPAA for MSPs with Security First IT

 Subscribe on Apple Podcast. Share us on Social Media. Rate us wherever you find the opportunity. 

Great idea! Share Help Me With HIPAA with one person this week!

Thanks to our donors. We appreciate your support!

If you would like to donate to the cause you can do that at HelpMeWithHIPAA.com

Like us and leave a review on our Facebook page: www.Facebook.com/HelpMeWithHIPAA

If you see a couple of numbers on the left side you can click that and go directly to that part of the audio. Get the best of both worlds from the show notes to the audio and back!


CISA Interview

Meet Josh Corman

[06:44] Today, we talked with Josh Corman, the Chief Strategist for the CISA Covid task force. CISA is the Cybersecurity and Infrastructure Security Agency under the Department of Homeland Security. As Josh explains it, CISA was…

…born to really rise to meet the moment on our overdependence on undependable things and critical infrastructure. And as the newest federal agency, we try to be the nation’s risk management advisor. But as our new confirmed Director Jenny Steering likes to say, we don’t want to just be the nation’s risk advisor. We want to be the risk reducer, so we’re trying to identify and buy down risk for our nation’s critical infrastructure and attacks against the federal government agencies as well. Josh Corman, CISA

This is not the only hat that Josh wears. He teaches CISA programs for the Carnegie Mellon University Graduate School and serves as a CTO, CISO, CSO type in public and private companies. He served on a Congressional task force for healthcare industry cybersecurity. He is also a founder of IAmTheCavalry.org which is a volunteer group of over a thousand helpful hackers trying to save lives through security research.

We just try to make the world a safer place. We say it’s wherever bits and bites meet flesh and blood.

And, if that’s not enough, Josh also serves on the 405d task force along with the two of us.

CISA is not a regulator and it’s not law enforcement. It exists to help identify and reduce risk, both cybersecurity and physical security, to our nation’s interest in our critical infrastructure sectors. Their services are taxpayer funded and are FREE to anyone in one of the 16 critical infrastructure sectors. Here are a few links that can give you a better understanding of what CISA does and what they specifically do in healthcare.

Healthcare and Public Health Sector

Critical Infrastructure Partnership Advisory Council

Health Sector Cybersecurity Coordination Center (HC3)

Provide Medical Care is in Critical Condition: Analysis and Stakeholder Decision Support to Minimize Further Harm

Josh Corman is a catch phrase machine

Josh’s terms and catchphrases are now taking hold at Kardon and elsewhere. You’ll hear these throughout our conversation with him.

  • Target rich and cyber poor.
  • A call to one is a call to all.
  • Left of boom and right of boom (before harm and after harm)
  • Incident response exercises to create muscle memory.
  • Forming. Storming. Norming. Performing.
  • CyHy (Cyber Hygiene)
[13:51] The motto of CISA is Defend today. Secure tomorrow. The goal is to ensure that the future is more defensible and resilient and recoverable. To do this, CISA has brought in people from the public and private sectors from tons of different disciplines, including a hacker philosopher CISO healthcare type (Josh), a physician and CEO of the largest healthcare networks in the country, a Texas disease expert who worked for the NIH, systemic risk people, data scientists, industrial control folks, pharmaceutical manufacturing experts, supply chain people, and many more.

Resources available

[26:33] Several years ago CISA released a report that included a graphic that lists five uncomfortable truths about the state of cybersecurity.

  1. There is a severe talent shortage of cybersecurity professionals in the healthcare industry. It was estimated, at the time, that 85% of US hospitals lacked a single qualified professional on staff. Many of the medium, small and rural hospital systems had none.
  2. There was a legacy technology epidemic as it wasn’t uncommon to find Windows XP, for example, machines still running in the clinical environment. At that time, Windows XP was an unsupported end of life operating system and therefore very hard to defend against its vulnerabilities.
  3. Premature and hyperconnectivity – In the race to tie reimbursement to the ability to receive and transmit electronic health records, companies were in a hurry to take existing medical devices that were never designed or intended to be connected to a computer network and forced them to connect to everything. This led to flat, unsegmented networks that created a greater risk that an attack on insufficiently secured devices could take down an entire network or hospital.
  4. It’s not just privacy that is affected by a cyber attack, but also patient care. A single flaw on a single device that is exploited can affect patient care.
  5. A single device that is not secure due to outdated software, technology or connection protocols connected to a network could give a thousand or more chances to be exploited and take a network down and affect patient care. It only takes one, though.

These are just the top 5 uncomfortable truths of many about cybersecurity and this is not a good thing.

So, we were always prone. We were always prey. We just lacked sufficient predator interest, and that changed. That’s all changed.Josh Corman, CISA
[40:28] So, out of this effort to secure healthcare systems and medical devices, among other efforts by many others, came some freely available Cyber Hygiene Services to organizations within the 16 critical infrastructure sectors. These services are really a suite of offerings designed “to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors.” Organizations can sign up for the following scanning and testing services.

  1. Vulnerability Scanning – A free external perimeter vulnerability scan performed daily of public, static IPs to identify any low hanging fruit available to the world. You will receive weekly vulnerability reports and ad-hoc alerts.
  2. Web Application Scanning – Assesses publicly-accessible websites for potential bugs and weak configuration and provides recommendations to mitigate any vulnerabilities.
  3. Phishing Campaign Assessment – An opportunity to assess the potential susceptibility of staff to phishing attacks. It can help measure the effectiveness of your security awareness training.
  4. Remote Penetration Test – Tests perimeter defenses and security using tactics and techniques that cyber attackers use.

Donna 2 cents: I had clients test out the process to request Cy Hy vulnerability scans and it seems to have gone through fine for the two entities I checked. One was a private practice and the other was a county health agency.

To get started, send an email to vulnerability@cisa.dhs.gov with the subject line “Requesting Cyber Hygiene Services” or follow the instructions below. These instructions are from the response received after sending the email mentioned above:

All kinds of other resources out there… for everyone.

There are a number of other resources available to help keep your organization safe.

Bad Practices[47:54] CISA has created a catalog of bad practices that are exceptionally risky for organizations, especially those supporting the critical infrastructure sector. The list will continue to grow as with the common, yet dangerous security practices.

Stuff Off Search[53:33] This is a resource to help you understand what is viewable on the internet and how you can reduce your attack surface.

4 Things You Can Do To Keep Yourself Cyber Safe[55:18] There are four basic cyber hygiene tasks you can do to protect yourself online.

When you look at the adversary landscape, some of them are targeted. If they want to get you, they’re going to get you. But many of them are targets of opportunity. It’s wholesale. It’s indiscriminate and they land where they land and they monetize where they’re successful. Make yourself slightly less accessible. Josh Corman, CISA

Ransomware is the big one.

[56:42] Not only does CISA give special attention to the 16 critical infrastructure sectors, but there is also a different way they slice these sectors. They have broken them into the 55 National Critical Functions (NCFs). Providing Medical Care is one of them, hence the title of the Provide Medical Care is in Critical Condition: Analysis and Stakeholder Decision Support to Minimize Further Harm report CISA recently published.

CISA has three main focuses for this report:

  1. As Provide Medical Care is under severe stress and strain, cyber attacks can make it much worse.
  2. As Provide Medical Care continues to struggle, its impacts are not isolated to citizens in health care. All 55 NCFs are experiencing impacts on their workforce.
  3. CISA is targeting state, local, tribal and territorial leaders to help them with decision support so that they can measure, track and mitigate risk.
But, we continue to say no one’s ever died from cyberattacks. The math just suggests that that’s not true anymore.Josh Corman, CISA

Josh explains very well how stressed our healthcare systems were/are strained by COVID and the impact of cyber attacks just exacerbates the strain and has a negative impact on the 55 NCFs. Some of the points he makes, and that are in the report, are tough to hear/read, but they are important for us to understand in order to come together and work on solutions to minimize the risks and impacts. Listen to this section of the podcast to hear why CISA has renewed their push to engage IT professionals and leadership in hospitals across the nation to help make sure the preventable disruptions are prevented until the end of the pandemic.

[01:14:39] The October 5, 2021 405d Spotlight Webinar for Cybersecurity Awareness Month includes an excellent discussion about the impact of a ransomware attack on Vermont Univ Medical Center during the height of the pandemic. Also, it featured Josh and his Captain America shield. Watch the full recording here. You can also download the slide deck from the talk here.

[01:17:05] The number one cyber attack that really brings folks down to their knees is ransomware. Recently, an article was released stating that Mandiant researchers have noticed the FIN12 ransomware gang are aggressively targeting healthcare.

FIN12 Ransomware Attackers Target Medical Facilities | Decipher

Ransomware has become an important topic of the federal government. So, CISA has created a single location for ransomware information for the whole federal government, so that there is no competing information or partial information. It’s a site called StopRansomware.gov. It incorporates some of the best information from the FBI, Secret Service, HHS, the different cybersecurity risk management agencies and, of course, CISA themselves to try to make the topic of ransomware clearer. It separates ransomware information in three main focuses:

  1. What is ransomware?
  2. Have you been hit by ransomware?
  3. Avoiding being hit by ransomware.

CISA is also providing more actionable advice on ransomware with its CISA Summit, which happens each week during National Cybersecurity Awareness Month. The weekly (recorded) summits include public talks with world class speakers from inside and outside of government and includes findings from a huge ransomware task force

And I think maybe this is a good, catalytic moment to talk to your stakeholders, your executive stakeholders, because this is long looked at as an It issue or a cybersecurity. And while these attacks start in it, they very quickly become business and business level impact.

One way to get attention of stakeholders is this is now a patient care, patient safety, patient life issue.

We now stand on the cusp of really understanding the next wave of how to reduce loss of life and provide better patient care in the future.Josh Corman, CISA

Our conversation with Josh just reiterates our Help Me With HIPAA tagline: HIPAA is not about compliance, it’s about patient care. We appreciate Josh spending some much time talking with us today and educating us all on all the things CISA and their partners are doing to help defend us against cyber threats. It is reiterating that cybersecurity is no longer only an IT issue.

Remember to follow us and share us on your favorite social media site. Rate us on your podcasting apps, we need your help to keep spreading the word. As always, send in your questions and ideas!

HIPAA is not about compliance,

it’s about patient care.TM

Special thanks to our sponsors Security First IT and Kardon.

HelpMeWithHIPAA.com Is A
Collaborative Project

Created & Sponsored By: