Large health care systems have thousands of interconnected endpoints, from computers to monitors and patient medical devices, creating a potential attack surface area that health care providers need to be able to monitor and protect.
“A strong cyber defense program should proactively monitor for signals of a threat and quickly respond to suspicious activity to contain cyber incidents before business-critical functions are disrupted,” says Jennifer Pope, Ernst & Young LLP Partner and account lead. “Working together, we were able to optimize cyber investments to improve this organization’s detection and response to cyber attacks.”
Endpoint detection and response (EDR) tools enable a behavior-based approach to identify and observe potential cyber threats occurring on user endpoints and servers. The behavior-based EDR tool implemented by EY and the provider organization helps them distinguish malignant attacker activity from benign, but risky, behaviors.
“We also added EY custom detection logic and proactive, intelligence-driven threat hunting capabilities leveraging our EY Alliance partners. And we collaborated on the development of 24/7 real-time reporting dashboards,” said Vivek Ashar, Ernst & Young LLP Senior Manager. “Now the health care center has customized, instantaneous information at their fingertips that provides their CISO and cyber teams with increased line of sight into threats.”
EY teams helped the health care provider extend threat detection visibility using Splunk, a versatile cybersecurity tool that enables extensive log source integration, analytics and dashboarding, providing an effective and efficient way to sift through large data sets in search of possible threats. The EY Managed Threat Detection and Response service configures and deploys its detection logic from its Attack Intelligence Lab to cyber technologies, providing the hospital with 24x7x365 monitoring, alert triage, and attack disruption.
“Our experienced health care cyber professionals sit shoulder-to-shoulder with our clients,” adds Pope. “We don’t apply a one-size-fits-all approach. Our EY team is a member of your team, and we work to understand your organization so we can deliver personalized support and tailored solutions.”
In addition to teaming with the medical provider to optimize the cyber tech stack, EY teams also helped reduce manual efforts related to incident response and expedited attack disruption using Splunk’s Security, Orchestration, Automation and Response (SOAR) tool. SOAR enables faster incident response times while reducing administrative burden on the internal cyber response team to complete routine tasks such as resetting passwords, phishing analysis, disabling accounts, and malware removal, thereby allowing them to focus on more long-term, strategic cyber initiatives.
“It’s no secret there’s a shortage of cyber talent in the marketplace, and that puts a huge burden on in-house teams to fight escalating cyber threats with limited resources,” says Tapan Shah, EY US Cybersecurity Managed Services Leader and the lead Principal on the collaboration. “Managed services can offer experienced professionals without the cost of hiring a large team of full-time employees. We can help our clients implement automation and optimize commercial technology investments — expediting and sustaining transformative and mature cyber defenses in a cost-effective manner.”
By proactively taking steps to reduce the organization’s cyber risk exposure and ramping up its response systems, the health care center is demonstrating its commitment to patient care and data privacy. Leveraging the right mix and application of technology and cyber expertise, the provider can make more informed, data-driven decisions to better safeguard its patients, network and data.