Trend Micro The Game - Recorded Video on Decisions

Nikolai Montinola
28 Sept 202315:36

Summary

TLDRIn a high-stakes scenario, a hospital faces a life-threatening crisis when a ransomware attack cripples its systems during a mass casualty event. Mark Jefferson, the hospital's CISO, must navigate a series of critical decisions to prevent a catastrophe. From investing in central security management to addressing compliance breaches and enhancing staff security awareness, Mark's choices determine the hospital's ability to save lives and protect sensitive patient data.

Takeaways

  • 🚑 The script revolves around a critical situation in a hospital where a 45-year-old female patient is in a life-threatening condition due to high-speed trauma.
  • 💡 The hospital's vital systems go down, including the computer system, which is essential for patient care and treatment, highlighting the importance of reliable IT infrastructure in healthcare.
  • 🔒 The hospital is hit by a ransomware attack, which is a form of cyberattack that encrypts data and demands payment for its release, causing chaos and putting patients' lives at risk.
  • 🛠 Mark Jefferson, the hospital's Chief Information Security Officer (CISO), is introduced as the person responsible for preventing such attacks but has made wrong decisions leading to the current crisis.
  • 🔄 The concept of going back in time to correct past mistakes is presented as a hypothetical way to help Mark make the right decisions to prevent the cyberattack.
  • 🏥 The hospital has a large clinic with a virtualized data center and cloud solutions, but there are security concerns due to the removal of some security measures for performance reasons.
  • 🔑 Mark identifies the need for central management of security across all virtual and cloud servers, suggesting the investment in a versatile security solution with minimal performance impact.
  • 📋 A compliance breach is discovered involving patient clinical data, indicating a lack of proper security and privacy measures in handling sensitive information.
  • 🤔 The script reveals a common practice of sending patient data to personal emails, which is a significant security risk and a violation of compliance standards.
  • 🛑 The hospital staff's lack of IT security training is exposed, showing the need for better security awareness and practices among all employees, not just the IT team.
  • 🛡️ The importance of implementing and enforcing security policies and procedures is emphasized, as is the need for training to address the human element in cybersecurity.

Q & A

  • What was the critical situation faced by the hospital in the script?

    -The hospital faced a critical situation where a 45-year-old female patient was in a life-threatening condition with unstable vital signs, and the hospital's computer system was down due to a ransomware attack, which affected patient care and treatment.

  • Who is Mark and what role does he play in the script?

    -Mark is the hospital's Chief Information Security Officer (CISO). He was responsible for preventing such cyber attacks but initially made the wrong decisions. The script suggests going back in time to have Mark make the right decisions to prevent the catastrophe.

  • What was the initial security setup of the hospital's network as described in the script?

    -The hospital had a fully virtualized data center with failover and hot standby setups, along with cloud solutions for lab analytics and home healthcare products. However, some security measures were removed from the virtual and cloud environments due to performance overhead concerns.

  • What was Mark's suggestion for improving the hospital's security?

    -Mark suggested investing in a solution that provides central management for all security and works across all virtual and cloud servers, which would have an immediate impact on the hospital's security.

  • What compliance issue was the hospital facing in the script?

    -The hospital was facing a compliance issue related to patient clinical data. There was a registered complaint that former patients received unsolicited sales approaches from a third party, which indicated a potential data breach.

  • What was the nature of the data breach mentioned in the script?

    -The data breach involved patients' clinical data, where a specific condition was targeted by a third party for unsolicited sales approaches. The hospital had only one patient with this condition in the past two years, suggesting a possible inside leak.

  • How did the hospital staff handle the situation when the ransomware attack occurred?

    -The hospital staff had to resort to manual processes and workarounds, such as sending manual orders for patient care and attempting to troubleshoot the computer systems while dealing with the influx of emergency patients.

  • What was the security awareness level among the hospital staff as depicted in the script?

    -The security awareness level among the hospital staff was low. Practices such as sending confidential patient data to personal email addresses and lack of IT security training were common.

  • What steps did Mark take to address the security and compliance issues?

    -Mark initiated an inquiry into the data leak, planned to meet with operations to ensure no further compliance issues, and proposed organizing training sessions for the staff to improve their security awareness.

  • What was the outcome of the security training and anti-ransomware measures implemented by Mark?

    -The security training and anti-ransomware measures helped prevent a potential breach and the ransomware from crippling the hospital's operations. The staff became more vigilant in reporting phishing emails, contributing to the overall security of the hospital.

Outlines

00:00

🚑 Hospital Crisis: Ransomware Attack and System Failure

The script opens with a chaotic scene in a hospital where a 45-year-old female patient is in critical condition. The medical staff is unable to access the computer system due to a ransomware attack, which has frozen all computers and tablets. This crisis is exacerbated by a multi-vehicle accident that brings in numerous patients requiring immediate care. Mark Jefferson, the hospital's Chief Information Security Officer (CISO), is introduced as someone who was supposed to prevent such attacks but failed. The narrative suggests that the only way to help Mark is to go back in time and make the right decisions regarding security measures.

05:00

🛠️ Security Improvements and Compliance Breach

The narrative shifts to Mark's first day at Golden Oaks Clinic, where he discusses network improvements with David, the IT manager. They talk about the clinic's virtualized data center and security measures, which Mark identifies as lacking due to the removal of some security from virtual and cloud environments. Mark proposes investing in central management for security across all platforms. Later, Mark learns of a compliance breach involving patient clinical data, which has led to an investigation. He is tasked with finding out how the data leaked and ensuring no further compliance issues.

10:02

📚 Inadequate Security Practices and Training

Mark discovers that the clinic's security policies are being ignored, with staff using personal email addresses for work-related communications, including sending patient data. He learns that there has been no IT security training for the staff, and existing policies are not well understood or enforced. Mark decides that training sessions for the staff are necessary and plans to implement them with the help of David. Meanwhile, the hospital is dealing with a potential breach and the upcoming compliance investigation.

15:03

🛡️ Preventing a Breach and Strengthening Security

The script concludes with Mark taking action to prevent a breach and strengthen the hospital's security. He enables anti-ransomware functionality in deep security and ensures that staff are trained on security awareness. This proactive approach helps the hospital to avoid the ransomware attack and maintain operations during a critical situation. The doctors are able to save patients' lives, and Mark reflects on the importance of making informed decisions about security investments and staff training.

Mindmap

Keywords

💡Pneumothorax

Pneumothorax refers to a medical condition where air leaks into the space between the lungs and the chest wall, causing the lung to collapse. In the video, it is a critical condition that requires immediate decompression, illustrating the urgency and high stakes in the healthcare environment.

💡Vital Signs

Vital signs are a group of clinical measures that determine the body's basic functions, including blood pressure, heart rate, respiratory rate, and body temperature. In the script, the vital signs of the patient are unstable, indicating a life-threatening situation that needs immediate medical attention.

💡Ransomware

Ransomware is a type of malicious software that encrypts a victim's data and demands payment to restore access. In the video, the hospital is hit by a ransomware attack, which disrupts the operation and puts patients' lives at risk, highlighting the severity of cyber threats in healthcare.

💡Compliance

Compliance refers to the act of conforming to a set of rules, regulations, or standards. In the context of the video, the hospital is in breach of compliance regarding patient data, which leads to an investigation and underscores the importance of adhering to data protection regulations.

💡CISO

CISO stands for Chief Information Security Officer, a senior-level executive responsible for an organization's information and data security. Mark, the character in the video, is the hospital's CISO, emphasizing the role of leadership in preventing and responding to cyber attacks.

💡Failover

Failover is a redundancy technique used in data centers to switch to a redundant or standby system upon the failure of the current system. The script mentions a fully virtualized data center set up for failover, which is crucial for maintaining operations during a system failure.

💡Security Awareness

Security awareness refers to the knowledge and understanding of the importance of security practices within an organization. The video script reveals a lack of security awareness among staff, which is a key factor contributing to the hospital's vulnerability to cyber attacks.

💡Phishing

Phishing is a form of cyber attack where attackers attempt to acquire sensitive information through deceptive emails that appear to be from a trustworthy source. In the video, the hospital staff receive phishing emails, which is a common method used by cybercriminals to gain unauthorized access to systems.

💡Anti-Ransomware Functionality

Anti-ransomware functionality refers to security measures designed to prevent, detect, and mitigate ransomware attacks. In the script, enabling this functionality in deep security is a critical decision that helps the hospital avoid a crippling ransomware attack.

💡Data Breach

A data breach occurs when unauthorized individuals gain access to sensitive information. The video script mentions a potential data breach involving patient clinical data, which is a serious concern as it can lead to legal consequences and damage the hospital's reputation.

💡IT Security Training

IT security training involves educating staff on best practices for protecting an organization's information and systems. The lack of IT security training among the hospital staff in the video is a contributing factor to their poor security practices, emphasizing the need for regular training to prevent security incidents.

Highlights

A 45-year-old female patient with critical vital signs requires immediate medical attention.

The hospital faces a potential pneumothorax case, necessitating urgent decompression.

An unexpected system failure occurs, impeding the medical staff's ability to access patient files and place orders.

The hospital's IT infrastructure, including Scarlet, is down, causing a crisis in patient care.

Mark Jefferson, the hospital's CISO, is introduced, highlighting the need for improved security measures.

A discussion about the hospital's network architecture reveals vulnerabilities in the virtual and cloud environments.

Mark suggests investing in central management for security across all servers to enhance protection with minimal performance impact.

A compliance breach is discovered, with patient clinical data being misused for unsolicited sales approaches.

The hospital initiates an internal inquiry to trace the data leak and prevent further compliance issues.

Mark discovers that staff members are using personal emails for work-related communications, risking data security.

There is an evident lack of IT security training among the hospital staff, leading to poor security practices.

An investigation into the hospital's patient health data compliance is launched by the authorities.

Mark and the team prioritize making the network compliant and implementing security policies to prevent future breaches.

A multi-vehicle accident brings a surge of patients to the hospital, testing the staff's crisis management and security measures.

The hospital staff successfully manage the influx of patients, demonstrating the effectiveness of recent security training.

Mark's proactive decisions, including enabling anti-ransomware functionality, prevent a potential ransomware attack.

The story concludes with a reflection on the importance of IT security training and the impact of Mark's decisions on the hospital's operations.

Transcripts

play00:08

45-year-old female P struck at high

play00:10

speed responsive but unstable Vital

play00:12

Signs BP 85 over 60 heart rate 120

play00:16

respiratory rate 30 prepare for

play00:17

decompression of pneumothorax right

play00:20

away 1 2 3 stat abdominal andex CT scan

play00:27

I I can't access our system for some

play00:29

reason send in manual order now

play00:33

pressure's falling she stopped breathing

play00:36

what the hell is this my computer is

play00:38

frozen

play00:39

up where's it call them now can anyone

play00:43

tell me what's going on with our

play00:44

computer system right now Scarlet is

play00:46

down we can't access any

play00:50

files Mark all computers all tablets are

play00:54

just not working you have to help us I

play00:57

don't know what's going on here hi M I

play00:59

need you here right now stand there

play01:01

don't you see what is happening here we

play01:03

have tons of

play01:04

patients because any idea what this

play01:07

means job and let us do ours people are

play01:10

dying here and we can't even place a

play01:11

simple order you are supposed to be

play01:13

responsible for security stand there

play01:15

don't

play01:17

you go there do you

play01:25

see do

play01:28

something

play01:30

[Music]

play01:44

when every second is a matter of life

play01:46

and death this is not just a problem

play01:48

it's a catastrophe while the hospital

play01:50

staff were dealing with victims of a

play01:52

multi- vehicle accident the hospital was

play01:53

hit by ransomware the chaos that

play01:55

overcame the clinic has put patients

play01:57

lives at

play01:58

risk Mark is the hospital ciso he was

play02:01

hired to prevent such attacks

play02:03

unfortunately he made the wrong calls

play02:04

and failed the only way to help him now

play02:06

is to go back in time and have Mark make

play02:08

the right decisions it's all on you are

play02:11

you

play02:13

[Music]

play02:19

ready okay good

play02:21

[Music]

play02:28

luck

play02:38

[Music]

play02:43

hey Mark good to see you David meet Mark

play02:45

Jefferson and new SE so this is David

play02:47

our Ox manager welcome to Golden Oaks

play02:49

how's the first day not bad at all it's

play02:52

a pretty big Clinic you got here I

play02:54

almost got lost in the corridors happens

play02:57

to everyone anyway it came at the right

play02:59

time we were just talking about possible

play03:01

improvements to the network would' love

play03:03

to hear your opinion gladly I'd like to

play03:06

go through the architecture schematics

play03:08

first as you see we have a fully

play03:10

virtualized data center set up for a

play03:12

failover with a hot standby and a few

play03:14

Cloud solutions for our lab analytics

play03:16

and Home Healthcare

play03:18

products what kind of security are you

play03:19

running standard model strong perimeter

play03:22

DMZ content filtering that kind of stuff

play03:24

of course we have AV on the endpoints

play03:26

but we had to remove some of the

play03:28

security from the virtual end and Cloud

play03:30

environments because of the overhead I

play03:32

do know that there's a black hole as far

play03:34

as mobile devices go though and what do

play03:37

you think Mark well I appreciate what

play03:41

you do here David but frankly I see some

play03:44

room for

play03:45

improvement do you have anything

play03:47

specific in mind actually I

play03:49

[Music]

play03:58

do

play04:02

I appreciate your effort

play04:04

David and although I'm suggesting

play04:06

enhancing our security I think we should

play04:08

use the infrastructure as the foundation

play04:10

for it it's pretty solid in my opinion

play04:13

thanks uh I'm open to your suggestions

play04:17

I'm glad to hear that I have an idea

play04:20

that will almost have immediate impact

play04:22

on our security but there is a cash

play04:26

we'll need to expedite spending of the

play04:28

next quarter's budget now

play04:30

now I'm ready to consider it if the

play04:32

costs are reasonable okay here's what I

play04:36

[Music]

play04:46

think well we need something versatile

play04:50

that covers our basic security needs but

play04:52

at the same time has minimal impact on

play04:55

performance we should invest in

play04:57

something that gives us Central

play04:58

management for all security and also

play05:00

works across all our virtual and Cloud

play05:03

servers do you have any specifics there

play05:06

are a couple on the market right now

play05:08

I'll find the best cost benefit ratio

play05:10

and make a proposal sounds good let's

play05:13

make it

play05:26

[Music]

play05:28

happen

play05:31

hello hi Mark Logan sorry to bother you

play05:34

so early it's okay I'm already up what's

play05:36

going on I've just got word that we're

play05:38

in breach of compliance and an

play05:40

investigation's being kicked

play05:42

off what kind of datb are we talking

play05:44

about I'm forwarding it to you right now

play05:47

looks like patients clinical data talks

play05:49

about a registered complaint that former

play05:51

patients have received unsolicited sales

play05:54

approaches the complaint refers to a

play05:56

third party that tried to sell Medical

play05:57

Treatments for a very specific condition

play05:59

I

play06:00

condition and we didn't have many

play06:02

patients that suffered from it in the

play06:03

past 2 years we only had one around half

play06:07

a year ago how do you want to handle

play06:09

this we'll need to take on our own

play06:10

inquiry of course to prepare

play06:12

documentation investigators might

play06:14

require and want you to meet with Ops

play06:16

and find out how that data leaked and

play06:19

make sure there are no more compliance

play06:20

issues okay I'll be there in 15

play06:26

[Music]

play06:28

minutes

play06:33

can you email me the record and the

play06:35

latest test results on this new patient

play06:37

um oh what's his name gosh uh he suffers

play06:41

from intermittent cramping pain and

play06:43

diarrhea Mr Garcia room 151 yeah exactly

play06:46

that's the one just send it to my

play06:48

personal email and I'll look at the

play06:49

records when I get home oh Dr Allan are

play06:52

you working from home again don't you

play06:54

have any social life no I don't have

play06:56

time for that unfortunately yeah thanks

play06:58

uh excuse me oh I'm Mark Jefferson I'm

play07:01

Mia Sam I know who you are you're the uh

play07:04

cyber security guy oh yeah that's me uh

play07:07

can I ask you something

play07:09

[Music]

play07:24

sure what was that all

play07:27

about what

play07:30

I overheard your conversation since it

play07:33

was email related it's kind of in my

play07:36

ballpark oh Dr Allen works a lot from

play07:39

home I send him patients data whenever

play07:41

he requests

play07:43

it does he use his personal email

play07:46

address for work related Communications

play07:49

yeah we all do it sometimes it's just

play07:51

easier for all of

play07:53

[Music]

play07:58

us

play08:02

what kind of data are you sending him

play08:04

well usually information about his

play08:06

patience like test

play08:09

results full patient records with names

play08:12

and addresses and other patient

play08:14

information sometimes the doctor needs

play08:17

to keep track of his patients otherwise

play08:19

he just get lost in a pile of documents

play08:20

and

play08:22

[Music]

play08:28

emails

play08:30

is that standard practice in this Clinic

play08:33

what sending patients data to doctors

play08:35

and their personal email addresses I

play08:37

wouldn't say it's a standard but a lot

play08:39

of the doctors ask us to do

play08:41

it so Dr Allen isn't the only one who

play08:45

uses his personal email address for work

play08:47

stuff and keeps patients medical data in

play08:50

his personal

play08:51

device no it happens quite

play08:58

often

play09:06

I get the impression that throughout

play09:07

your years here no one has actually

play09:09

taken the time to train the staff on it

play09:11

security issues have you ever had an IT

play09:15

security training at all not as far as I

play09:18

can remember there is this policy that

play09:20

they make everybody sign when they're

play09:22

hired do you by any chance remember the

play09:24

details of this policy no it's a long

play09:27

time ago

play09:31

[Music]

play09:37

thank you for the chat that was really

play09:40

helpful see you around Mr Jefferson now

play09:43

you take

play09:50

[Music]

play09:56

care oh hey Mark what's up

play09:59

you want to C no thanks listen we have a

play10:02

situation I just got word the

play10:04

authorities have launched an

play10:05

investigation into the hospital's

play10:06

patient Health Data compliance that's

play10:09

unexpected not really when you know how

play10:12

security policies have been ignored in

play10:14

the clinic anyway we have to do

play10:16

something about it there is a possible

play10:18

breach we have to take care of someone

play10:20

make sure the whole infrastructure is

play10:21

compliant can we do both that's the

play10:25

problem how do you want to

play10:28

proceed

play10:33

[Music]

play10:46

with the upcoming investigation we have

play10:48

to make sure our network is more

play10:49

compliant let's focus on that I agree

play10:52

but what about the brege what's done is

play10:55

done but we have to prioritize in my

play10:58

opinion making our Network compliant is

play11:00

more critical right now when that's done

play11:03

we can look for the breach well all

play11:06

right any

play11:07

[Music]

play11:23

ideas I don't think any Tech solution

play11:26

will fix our problems totally it's

play11:29

obvious that something is not working

play11:30

with the implementation of security

play11:31

policies and procedures in our hospital

play11:34

I think we are all aware of how it

play11:36

security Works David I don't mean you or

play11:38

your guys I'm talking about regular

play11:41

staff I'm talking about doctors nurses

play11:45

janitors

play11:46

even before I came here I overheard a

play11:49

doctor Ask a Nurse to send him

play11:51

confidential patient data to his private

play11:53

email I talked to the nurse about it and

play11:56

it seems this is standard practice here

play11:59

I think there is a lot of work to be

play12:00

done here so what do you want to do

play12:02

about

play12:04

[Music]

play12:16

it well I'll need your help on this we

play12:20

need to do training sessions for the

play12:22

staff I'll run this by Logan we would

play12:24

have to organize this quickly not

play12:26

telling what might happen next I'll try

play12:28

to set it up this week and make sure you

play12:29

enable the anti-ransomware functionality

play12:31

in deep security just in case can I

play12:34

count on your help sure

play12:43

thanks all Personnel please report to ER

play12:46

we have incoming wounded from a highway

play12:48

collision at least 10 injured ETA 5

play12:55

[Music]

play12:57

minutes hello hello what's going on we

play13:01

may have a big problem uh we're getting

play13:03

swamp by reports from all of our Network

play13:04

that people are receiving fishing emails

play13:07

it's uh seems that they are almost

play13:08

identical but look credible and relevant

play13:12

what's the status everything seems to be

play13:14

okay we're monitoring external traffic

play13:17

as well as lateral

play13:19

movement I don't want to jinx it but it

play13:23

looks like no one has fallen for the

play13:25

bait they're just reporting the emails

play13:27

to us the security training seems to be

play13:30

working all right let's hope so I'll

play13:33

keep you

play13:41

posted year-old male head on collision

play13:44

visible bleeding the fast now prep him

play13:46

for surgery you hear me stay with us I'm

play13:49

Dr Miller I'm going to help

play13:53

you hey is everything all right a lot of

play13:57

new patients but we've got everything on

play13:58

under

play14:06

control well done you prevented the

play14:08

breach and the ransomware from crippling

play14:10

the hospital's operations in the end the

play14:12

doctors were able to save patient lives

play14:14

now let's take a closer look at some of

play14:16

the decisions that you

play14:24

made we'll need to experise spending of

play14:28

the next quarters budget

play14:30

now we need something versatile that

play14:34

covers our basic

play14:38

security needs but at the same time has

play14:41

minimal impact on performance having

play14:43

realized that some basic security

play14:45

measures were not in place in the data

play14:47

center you inherited you decided to

play14:48

scour the market for an integrated

play14:50

solution that offered Central management

play14:52

and visibility for all your different

play14:54

server infrastructure a quick win to

play14:56

resolve a pressing issue

play15:02

have you ever had an IT security

play15:04

training at all not as far as I can

play15:07

remember and make sure you enable the

play15:09

anti-ransomware functionality in deep

play15:11

security just in case you did great by

play15:14

digging a little deeper in your

play15:15

conversation with members of staff and

play15:17

uncovered their lack of security

play15:18

awareness this prompted you to enable

play15:20

the anti-ransomware functionality in

play15:21

deep security and avoid the

play15:27

attack

play15:29

[Music]

Rate This

5.0 / 5 (0 votes)

関連タグ
CybersecurityHospitalRansomwareData BreachComplianceIT SecurityStaff TrainingPolicy NegligenceMedical DataCrisis Management
英語で要約が必要ですか?