UHG Presentation Study Deck Flashcards
(219 cards)
When did the Change Healthcare breach begin?
February 12, 2024
What was the initial attack vector for the Change Healthcare breach?
Compromised credentials to access Citrix remote portal without MFA
How much sensitive data was exfiltrated in the breach?
6TB
What was the ransom amount paid to ALPHV/BlackCat?
350 BTC ($22M)
What was the estimated total cost of the breach?
$1B ($22M ransom + $870M cyber impact + other costs)
How many patients were impacted by the breach?
100 million
How many healthcare providers were impacted?
1.6 million
What percentage of all U.S. health claims were affected?
~40%
When was ransomware detected and contained?
February 21, 2024
What major vulnerability was published related to the breach?
CVE 2024-1709
What is UHG’s current NIST CSF score according to the assessment?
2.1
What is UHG’s target NIST CSF score by end of FY2026?
2.5
What function had the lowest score in the NIST assessment?
Govern (particularly Roles, Responsibilities, and Authorities at 1.1)
What was the score for Incident Recovery Plan?
1.3
Which NIST function scored highest in the assessment?
Respond (Incident Management at 3.5)
What are the five strategic initiatives proposed?
1) Strengthening Governance and Risk Alignment
2) Advancing Asset, Data, and Access Visibility
3) Modernizing Detection and Continuous Monitoring
4) Building Cyber Resilience and Recovery Readiness
5) Fostering a Culture of Cybersecurity Readiness
What is the total proposed budget over three years?
$31.8 million
What is the CAPEX portion of the budget?
$4.5 million
What is the OPEX portion of the budget?
$27.4 million
What percentage increase does this represent over current cybersecurity budget?
9.10%
What compounding issue contributed to the breach?
Incomplete integration post-acquisition and misconfigured IAM tools
Why was lateral movement easy for attackers?
Inadequate network segmentation
What is the healthcare industry average for cybersecurity spending as % of IT budget?
7% (up from 5-6% in previous years)
What are the five key risks of not funding the proposed initiatives?
1) Catastrophic breaches
2) Prolonged operational disruptions
3) Regulatory fines
4) Loss of stakeholder trust
5) Long-term financial instability
2) Implementing modern security architectures
3) Enhancing incident response capabilities
4) Strengthening third-party risk management
2) Advancing Asset, Data, and Access Visibility
3) Modernizing Detection and Continuous Monitoring
4) Building Cyber Resilience and Recovery Readiness
5) Fostering a Culture of Cybersecurity Readiness
2) Prolonged operational disruptions
3) Regulatory fines
4) Loss of stakeholder trust
5) Long-term financial instability