SlideShare a Scribd company logo
Dogs and Masks:
The Challenges of Deidentifying
and Masking data
Sandy Dunn,CISO Blue Cross of Idaho
August 2, 2018
*** Disclaimer ***
This presentation views and opinions are my own, and do not represent the views or endorsement of my
employer Blue Cross of Idaho.All the information is publicly available.
https://www.pbs.org/newshour/show/lifestyle-choices-could-raise-your-health-insurance-rates
Last Presentation Summary
My job as CISO Data is the NewOil
Leverage similar
historical problems
Don’t Do Security
Stuff without
looking at the
problem holistically
Data Governance
Roles and
Responsibilities
CISO
Topics
Capturing
requirements
Example
methodology
Definitions and
terminology
Open discussion
Expand on Data
Governance Roles
and Responsibilities
Resources for
deidentification and
masking
1. Names
2. All geographical subdivisions smaller than a State
3. All elements of dates (except year) for dates directly related to an individual, including birth date,
admission date, discharge date, date of death;
4. Phone numbers
5. Fax numbers
6. Electronic mail addresses
7. Social Security numbers
8. Medical record numbers
9. Health plan beneficiary numbers
HIPAA PHI: List of 18 Identifiers
Capturing Requirements
10. Account numbers
11. Certificate/license numbers
12. Vehicle identifiers and serial numbers, including license plate numbers
13. Device identifiers and serial numbers
14. Web Universal Resource Locators (URLs)
15. Internet Protocol (IP) address numbers
16. Biometric identifiers, including finger and voice prints
17. Full face photographic images and any comparable images and
18. Any other unique identifying number, characteristic, or code
(note this does not mean the unique code assigned by the investigator to code the data)
State Data Breach
Federal laws related to cybersecurity are sector-specific, meaning
they apply only to a particular industry such as financial or healthcare.
Idaho Data Breach Laws:
Notification Requirements and Penalties
Idaho state law requires businesses to notify affected individuals of a breach as soon as possible, unless a
“good-faith, reasonable, and prompt” investigation reveals that the personal information has not and
will not be misused.
This law also applies to businesses that maintain personal data for another entity.
Businesses that fail to notify can be fined up to $25,000 per breach.
Definition of Protected Information :Combination of (1) name or other identifying info, PLUS (2) one or
more of these "data" elements: SSN; driver's license number; or account number, credit card number,
debit card number if accompanied by PIN, password, or access codes
Notification required only if breaches “materially compromise the security, confidentiality, or integrity
of” PI.
Notification can be written, phone, or electronic
https://hitrustalliance.net/documents/hitrust2017/presentations/May-11-1130am-HITRUST-DeID-Framework_FINAL.pdf
Terms
Data masking or data obfuscation is the process of hiding original data with random or altered characters that
makes the resulting data un-traceable to the original.
• Static data tables are loaded to a separate environment. Data masking rules are applied to stable (inactive) data . Dev / test
• On-the-fly data is transferred from environment to environment without data touching a disk on its way. The same technique is applied to
"Dynamic Data Masking" but one record at a time. Most useful for CI/D environments. It sends small subsets of masked testing data from
production to development / test.
• Dynamic happens at runtime, on-demand. It is attribute-based and policy-driven
Techniques
• Substitution another authentic looking value is substituted for the existing value
• Shuffling similar to the substitution method but it derives the substitution set from the same column of data that is being masked. In very
simple terms, the data is randomly shuffled within the column
• Number and date variance – If the overall data set needs to retain demographic and actuarial data integrity applying a random numeric
variance of +/- 120 days to date fields would preserve the date distribution but still prevent traceability back to a known entity based on their
known actual date or birth or a known date value of whatever record is being masked
• Encryption key used to grant visibility to the data
• Masking out character scrambling or masking out of certain fields
Synthetic or hypothetical data completely made up data
https://en.wikipedia.org/wiki/Data_masking
DiscussionTopics
How do we get started in driving the importance of Data Security throughout the company?
What does leadership need to do to drive Data Security effectiveness and ensure that Data Security is moving forward?
What is the most important Data Security item we should focus on today?
How do you recommend setting up and managing system access?
What is your process to identify, track and classify data?
How do you work around “Shadow IT” when it comes to Data Security?
Network Segmentation
License issues
Structured vs Unstructured
Information Classification
Data goverance two_8.2.18 - copy
Data Governance
BusinessOwner Legal /
Compliance /
Enterprise Risk
Data
Governance
Cybersecurity
Data
Stewardship
Identify data
roles &
responsibility
Define Requirements SME Audit / Enforce
Structured /
Unstructured
Own process /
workflow
Requirements How Find / Enforce
Data
Classification
Public
Restricted
Confidential
Do Define Monitor use Enforce
Implement
Controls
Data Quality Only Good Data Enforce Requirements How
Data
Management
Building the full
data lifecycle
Do Requirements How Protect
Links toTools and Papers
NISTIR 8053 De_Identification of Personal Information https://nvlpubs.nist.gov/nistpubs/ir/2015/nist.ir.8053.pdf
HiTrust De-Identification Framework https://ecfsapi.fcc.gov/file/60001569792.pdf
A BeginnersGuide to Data Masking - Imperva HTTP://www.poer.ro/wp-
content/uploads/2018/01/Camouflage_Data_Masking_Beginners.pdf
Practical Implications of Sharing Data: A Primer on Data
Privacy,Anonymization, and De-Identification
https://support.sas.com/resources/papers/proceedings15/1884-2015.pdf
Securing Sensitive Data in Databases & Datalakes Using Cirro
Data Puppy
https://s3.amazonaws.com/cirro.com/downloads/cirro-data-migrator-
whitepaper.pdf

More Related Content

PDF
Where in the world is your PII and other sensitive data? by @druva inc
PPTX
WebShield eP3 Network Overview (02-04-2017)
PDF
Managing Personally Identifiable Information (PII)
PDF
Data Sovereignty and the Cloud
PPTX
Personally Identifiable Information – FTC: Identity theft is the most common ...
PDF
Responding to a Data Breach, Communications Guidelines for Merchants
PPTX
Eight principles of consumer data privacy
PPTX
Dealing with 3rd parties under gdpr
Where in the world is your PII and other sensitive data? by @druva inc
WebShield eP3 Network Overview (02-04-2017)
Managing Personally Identifiable Information (PII)
Data Sovereignty and the Cloud
Personally Identifiable Information – FTC: Identity theft is the most common ...
Responding to a Data Breach, Communications Guidelines for Merchants
Eight principles of consumer data privacy
Dealing with 3rd parties under gdpr

What's hot (20)

PPTX
2017-01-24 Introduction of PCI and HIPAA Compliance
PDF
The Most Wonderful Time of the Year for Health-IT...NOT
PDF
2016 02-23 Is it time for a Security and Compliance Assessment?
PPT
Data Protection: Process Information
PDF
Looking Forward - Regulators and Data Incidents
PDF
BRG_TAP_IG_20150826_WEB
PDF
Solutions for privacy, disclosure and encryption
PPT
Data protection process information
PDF
Data Privacy
PDF
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
PDF
2015 09-22 Is it time for a Security and Compliance Assessment?
PDF
Big Data: Beyond the Hype - Why Big Data Matters to You
PDF
Protecting Data Privacy Beyond the Trusted System of Record
PDF
Privacy & Data Protection in the Digital World
PDF
Urgensi RUU Perlindungan Data Pribadi
PDF
Jelecos: Achieving Compliance with Axcient
PPTX
2018 01-25 Introduction to PCI and HIPAA Compliance
PDF
Pci dss scoping and segmentation with links converted-converted
PPT
The impact of regulatory compliance on DBA(latest)
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
2017-01-24 Introduction of PCI and HIPAA Compliance
The Most Wonderful Time of the Year for Health-IT...NOT
2016 02-23 Is it time for a Security and Compliance Assessment?
Data Protection: Process Information
Looking Forward - Regulators and Data Incidents
BRG_TAP_IG_20150826_WEB
Solutions for privacy, disclosure and encryption
Data protection process information
Data Privacy
Are you prepared for eu gdpr indirect identifiers? what are indirect identifi...
2015 09-22 Is it time for a Security and Compliance Assessment?
Big Data: Beyond the Hype - Why Big Data Matters to You
Protecting Data Privacy Beyond the Trusted System of Record
Privacy & Data Protection in the Digital World
Urgensi RUU Perlindungan Data Pribadi
Jelecos: Achieving Compliance with Axcient
2018 01-25 Introduction to PCI and HIPAA Compliance
Pci dss scoping and segmentation with links converted-converted
The impact of regulatory compliance on DBA(latest)
Where data security and value of data meet in the cloud brighttalk webinar ...
Ad

Similar to Data goverance two_8.2.18 - copy (20)

PPTX
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
PPTX
Protecting phi and pii - hipaa challenges and solutions - privacy vs cost
PDF
Where In The World Is Your Sensitive Data?
PDF
DAMA Webinar: The Data Governance of Personal (PII) Data
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PDF
Opteamix_whitepaper_Data Masking Strategy.pdf
PDF
Dataguise hortonworks insurance_feb25
PDF
Bridging the Data Security Gap
PPTX
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
PDF
Acc 675 control audit final project
PDF
Secure channels inc. basic rules for data protection compliance
PDF
CDP_Engagement_Team_Training_BRADESCO.pdf
PDF
Data Anonymization Process Challenges and Context Missions
PDF
Data Anonymization Process Challenges and Context Missions
PDF
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
PPTX
Understanding Data Anonymization- Protecting Privacy in the Age of Informatio...
PPTX
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
PDF
Privacy Management System: Protect Data or Perish
PPTX
What is PII Data Masking - Surekha Tech
PPTX
Cybersecurity Seminar March 2015
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
Protecting phi and pii - hipaa challenges and solutions - privacy vs cost
Where In The World Is Your Sensitive Data?
DAMA Webinar: The Data Governance of Personal (PII) Data
Protecting the Crown Jewels – Enlist the Beefeaters
Opteamix_whitepaper_Data Masking Strategy.pdf
Dataguise hortonworks insurance_feb25
Bridging the Data Security Gap
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Acc 675 control audit final project
Secure channels inc. basic rules for data protection compliance
CDP_Engagement_Team_Training_BRADESCO.pdf
Data Anonymization Process Challenges and Context Missions
Data Anonymization Process Challenges and Context Missions
Anonos NIST Comment Letter – De–Identification Of Personally Identifiable Inf...
Understanding Data Anonymization- Protecting Privacy in the Age of Informatio...
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Privacy Management System: Protect Data or Perish
What is PII Data Masking - Surekha Tech
Cybersecurity Seminar March 2015
Ad

More from Sandra (Sandy) Dunn (7)

PDF
Osint part 1_personal_privacy
PDF
Your're Special (But Not That Special)
PDF
Bsu skills and_careers_in_cybersecurity
PDF
Step by-step-guide risk-security-dunn_firth_v.1.8
PDF
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
DOC
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
PPTX
Presentation2 certificate farce
Osint part 1_personal_privacy
Your're Special (But Not That Special)
Bsu skills and_careers_in_cybersecurity
Step by-step-guide risk-security-dunn_firth_v.1.8
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Transformational Leadership: Inspiring Motivation Utilizing Advances in Posit...
Presentation2 certificate farce

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Big Data Technologies - Introduction.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
A Presentation on Artificial Intelligence
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
NewMind AI Monthly Chronicles - July 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Mobile App Security Testing_ A Comprehensive Guide.pdf
Big Data Technologies - Introduction.pptx
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
MYSQL Presentation for SQL database connectivity
A Presentation on Artificial Intelligence
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Data goverance two_8.2.18 - copy

  • 1. Dogs and Masks: The Challenges of Deidentifying and Masking data Sandy Dunn,CISO Blue Cross of Idaho August 2, 2018 *** Disclaimer *** This presentation views and opinions are my own, and do not represent the views or endorsement of my employer Blue Cross of Idaho.All the information is publicly available.
  • 3. Last Presentation Summary My job as CISO Data is the NewOil Leverage similar historical problems Don’t Do Security Stuff without looking at the problem holistically Data Governance Roles and Responsibilities CISO
  • 4. Topics Capturing requirements Example methodology Definitions and terminology Open discussion Expand on Data Governance Roles and Responsibilities Resources for deidentification and masking
  • 5. 1. Names 2. All geographical subdivisions smaller than a State 3. All elements of dates (except year) for dates directly related to an individual, including birth date, admission date, discharge date, date of death; 4. Phone numbers 5. Fax numbers 6. Electronic mail addresses 7. Social Security numbers 8. Medical record numbers 9. Health plan beneficiary numbers HIPAA PHI: List of 18 Identifiers Capturing Requirements 10. Account numbers 11. Certificate/license numbers 12. Vehicle identifiers and serial numbers, including license plate numbers 13. Device identifiers and serial numbers 14. Web Universal Resource Locators (URLs) 15. Internet Protocol (IP) address numbers 16. Biometric identifiers, including finger and voice prints 17. Full face photographic images and any comparable images and 18. Any other unique identifying number, characteristic, or code (note this does not mean the unique code assigned by the investigator to code the data)
  • 6. State Data Breach Federal laws related to cybersecurity are sector-specific, meaning they apply only to a particular industry such as financial or healthcare.
  • 7. Idaho Data Breach Laws: Notification Requirements and Penalties Idaho state law requires businesses to notify affected individuals of a breach as soon as possible, unless a “good-faith, reasonable, and prompt” investigation reveals that the personal information has not and will not be misused. This law also applies to businesses that maintain personal data for another entity. Businesses that fail to notify can be fined up to $25,000 per breach. Definition of Protected Information :Combination of (1) name or other identifying info, PLUS (2) one or more of these "data" elements: SSN; driver's license number; or account number, credit card number, debit card number if accompanied by PIN, password, or access codes Notification required only if breaches “materially compromise the security, confidentiality, or integrity of” PI. Notification can be written, phone, or electronic
  • 9. Terms Data masking or data obfuscation is the process of hiding original data with random or altered characters that makes the resulting data un-traceable to the original. • Static data tables are loaded to a separate environment. Data masking rules are applied to stable (inactive) data . Dev / test • On-the-fly data is transferred from environment to environment without data touching a disk on its way. The same technique is applied to "Dynamic Data Masking" but one record at a time. Most useful for CI/D environments. It sends small subsets of masked testing data from production to development / test. • Dynamic happens at runtime, on-demand. It is attribute-based and policy-driven Techniques • Substitution another authentic looking value is substituted for the existing value • Shuffling similar to the substitution method but it derives the substitution set from the same column of data that is being masked. In very simple terms, the data is randomly shuffled within the column • Number and date variance – If the overall data set needs to retain demographic and actuarial data integrity applying a random numeric variance of +/- 120 days to date fields would preserve the date distribution but still prevent traceability back to a known entity based on their known actual date or birth or a known date value of whatever record is being masked • Encryption key used to grant visibility to the data • Masking out character scrambling or masking out of certain fields Synthetic or hypothetical data completely made up data https://en.wikipedia.org/wiki/Data_masking
  • 10. DiscussionTopics How do we get started in driving the importance of Data Security throughout the company? What does leadership need to do to drive Data Security effectiveness and ensure that Data Security is moving forward? What is the most important Data Security item we should focus on today? How do you recommend setting up and managing system access? What is your process to identify, track and classify data? How do you work around “Shadow IT” when it comes to Data Security? Network Segmentation License issues Structured vs Unstructured Information Classification
  • 12. Data Governance BusinessOwner Legal / Compliance / Enterprise Risk Data Governance Cybersecurity Data Stewardship Identify data roles & responsibility Define Requirements SME Audit / Enforce Structured / Unstructured Own process / workflow Requirements How Find / Enforce Data Classification Public Restricted Confidential Do Define Monitor use Enforce Implement Controls Data Quality Only Good Data Enforce Requirements How Data Management Building the full data lifecycle Do Requirements How Protect
  • 13. Links toTools and Papers NISTIR 8053 De_Identification of Personal Information https://nvlpubs.nist.gov/nistpubs/ir/2015/nist.ir.8053.pdf HiTrust De-Identification Framework https://ecfsapi.fcc.gov/file/60001569792.pdf A BeginnersGuide to Data Masking - Imperva HTTP://www.poer.ro/wp- content/uploads/2018/01/Camouflage_Data_Masking_Beginners.pdf Practical Implications of Sharing Data: A Primer on Data Privacy,Anonymization, and De-Identification https://support.sas.com/resources/papers/proceedings15/1884-2015.pdf Securing Sensitive Data in Databases & Datalakes Using Cirro Data Puppy https://s3.amazonaws.com/cirro.com/downloads/cirro-data-migrator- whitepaper.pdf