Skip to main content

tv   Aspen Institute Discussion on COVID-19 Vaccine Distribution  CSPAN  December 4, 2020 1:49am-2:34am EST

1:49 am
the key decisions in the transition from a trump to a bidenion administration. and house speaker nancy pelosi holds her weekly briefing with supporters. ♪ >> you're watching c-span, your unfiltered view of government, created by america's television companies as a public service, and brought to you today by your television provider. company pharmaceutical advisors discussed the distribution of covid-19 vaccines. this panel was part of the 2020 aspen cyber summit. >> now i'm pleased to introduce speaking, who will be with the fbi deputy assistant director, j&j chief information security officer, and eli lilly,
1:50 am
chief information security officer, meredith harper. welcome, and over to you. thanks very much, john. it's nice to see you, even virtually. so, today, you have everyone's bio. so, i don't think i need to reintroduce our panel. but what they're going to offer us, i think, is a way to look at the year, and back at the year in a context of cyber and health care, and give us a little bit different way to look at the latest efforts to get the vaccine out to the public. we actually have some news on this today, by the way. we'll get to that a little later. basically, "the new york times" reported that cyber attacks related to cold storage of the vaccine have been going on since august. it's unclear whether this is about ransomware or something more sinister. but we'll get to that in a minute. what i thought we'd do is divide the discussion basically into
1:51 am
three parts. we're going to look at the broader issue of cyberthreats and attacks of the health care sector as we sort of wrestle through a pandemic. we're going to look at the security and protection of intellectual property related to the vaccine. and then finally, as related to today's news about hacking the cold chain, we'll talk about the security protection and defense of the supply chain for the vaccine. so, what i'd like to do -- oh, and if you have questions, i'll try and field those as we go along. and we may have time for questions at the end, as well. there's a q&a function, i think, the team at aspen will explain how you guys need to put those questions in. and with that, i just wanted to start, maybe with meredith, i thought i would start with you, as the ciso at eli lilly, having to deal with all that we're
1:52 am
dealing with, but in a laboratory setting, with laboratory people either having to be in pods or working remotely. are you dealing with more attack services because people aren't all over the same building? they're spread out. >> the answer is yes. we do have an unique footprint as relates to our service because we made a decision quite early in the pandemic around the march 8 time frame to send all of our team globally home to work. now, there were a subset of individuals that need to touch specific equipment in our labs and places like that so we put some measures in place to be able to protect their safety while they were actually interacting with that specific lab equipment that we could not pick up and take to someone's home. so, we did have an opportunity to still have a small portion of our team still going into our physical location. but it was far and few between. over 16,000, 17,000 of our team
1:53 am
members were deciding to work from home based off of the concerns about their health and safety. so, yeah, the attack surface now has incrementally grown over that period of time. continuously,to as an organization, ensure when our team members are at homeworking, they're still putting those security principles in practice even if they're sitting in their own home offices. i think sometimes we can get a little lax at home and we don't always think the same way when we're in our physical work location. but i think we've done a really good job of rolling out a robust education awareness program of how to protect those secure spaces within your home environment. so yes, we have seen an increase in that and attacks as well because the pandemic. >> so, it goes beyond just don't double click on that weird phishing email. it may have to do with
1:54 am
authentication of routers, things like that. is that what you're talking all -- talking about? >> all of that, yes. we put together a packet with our team members to say now that you're in your home environments, here's the technical controls you need to have to operate and carry out the business of lily. we have a vpn. we need to access the data you that need in order to perform your role without you putting that information on your local device and things of that nature. so, we gave them a toolkit to follow, say here's the questions you may be asking. here's our recommendations for how to deal with that. and then we work with those things together to make sure we're not seeing increased exposure. one of the other things that we talked about, initially, i can say, we didn't really think through i think at the beginning was around the idea of printing. so, we get so comfortable printing in our physical locations at work. but now you're starting to print
1:55 am
things that may be confidential at home. so, how do you support those printouts? how do you destroy them appropriately? we tried to pick it up on what a home worker would need to know to make sure they make themselves and their devices and data and the things that they print are protected. >> so, you were sending out shredders and safes? >> so, we didn't do that. we did give opportunity to say if you have a home shredder, here's the ones we recommend if you do that. one of the other things that i recommend that i really appreciate our leadership going down this road. we knew that people now working in these home environments and from an ergonomic and security perspective, we gave each member of the team to say i need to outfit my workplace differently now that i'm working 100% from home. so that meant you needed to get a recommended shredder so that you could now destroy documentation appropriately.
1:56 am
if you needed to get -- even a new chair so you can get functionally careful as you're working every day. there was an allowance offered to every team member who needed to make adjustments. so, we offered the recommendations. we gave them options and said here's what you can pick from. and then you chose what you can bring to your work space to make it comfortable, but also make it secure. >> yeah, npr gave us chairs, so that's clearly on this. so, are your concerns -- and i'll get to the other panelists , as well, but have your concerns changed since march? i mean, have you seen things -- when we think about ransomware or phishing attacks, are you seeing things, is this progressing or evolving? >> what we're seeing is, and i know maureen and i had this conversation before. some of the activity, most of the activity that we see is standard for us. this is typically what we see in our environments in terms of exposure attacks, interest in our organization. those things are happening every day. and that's no different.
1:57 am
what i have found, though, is, i think, the use of social engineering, to be able to get a foothold in san organization by way of credential stealing and things of that nature, i think we've seen more of those attacks and they've become a little more sophisticated than we probably have seen in the past. but that doesn't mean that the volume, in terms of what we're seeing, is shocking to us. it's common at this stage of the game. but i think there is this turnup on the sophistication of it all. and if we're not training our team members appropriately to look for those indications of whether something doesn't look quite right from the message, we can find ourselves in a world of hurt. so, we try to focus a lot on our training and awareness of our team members at this time. and specifically, as it relates to the individuals working in the development and research space, because we know that they will be a target. they're the ones who are actually working on our response to covid. so, from that perperspective, we tried to use training education
1:58 am
to thwart some of those attacks. >> do you think some of the social engineering is working better now because people are lonely and by themselves in their home -- -- their home? >> i don't know if it's the loneliness. i don't know if that's what makes them susceptible to it. i know i've done it myself. i feel like i'm working more now that i am at home. >> right. >> being able to shut off and being able to disconnect is harder now because i'm sitting here in my office and i get a chance to get things done. but i think because we're moving past and we're moving to really tick those things off of our list, sometimes we can move a little too big quick. and then we click and open or expose our organization that way. i don't know if it's the loneliness, but i do believe that we are moving quicker, probably, in some instances,
1:59 am
that creates problems for us. >> maybe journalists just get lonely. maureen, let me move to you. one of the things we know from public reports is that there was a hack, a number of different medical -- or health care companies, including johnson & johnson, with north korea. those complaints came earlier this month. and they were trying to steal , allegedly, sensitive covid information from johnson & johnson and others. can you walk us through what that kind of experience is like? >> first of all, dina, thank you very much for the question. but i would say, what's called -- let's call it an attempted hack, not a hack. >> fair enough. >> clearly, it was a cyber security organization and they're clearly different items. health care companies literally have seen an onslaught since march 2010. that is the day that the chinese actually started a hard knock of
2:00 am
most of the health care in the united states. and there was a lot of talk at the time, those who knew that they had seen attacks or had seen that stand by a nation state. and those who hadn't. there was a great outreach and a great pouring out, working with the fbi and homeland security, what was this all about? especially in health care. i and everyone in health care are seeing attempted penetrations by nation state actors, not just north korea, every single minute of every single day. primary threats i tried to categorize in health care.
2:01 am
one of them is nationstates. the other is a criminal element looking for anything they can monetize. we have something called hacktivists, people who are trying to through social media attempt to sway pharma companies on the pricing or other items, as well as insiders. developmentcine in and therapeutics, what we have seen is we are on a grander stage where people thought, wait a minute, there is a company i should be looking at, what should i do there? we have seen that rise. we don't know, and i see many different attempted assertions. malware is just code. it is just binary somebody is going to try to put in my network.
2:02 am
they are going to use things like email and links and social media to get someone in my company to click on it and bring it into my house. just coming in the door. industry, we care department ofth homeland security so we find information. we found this code. i don't have the resources to or, where it came from where they actually going after? our federal agencies, government agencies, we provide that information, which then tells us, wait a minute. that code came from north korea. then, warnings are going out. companies have the skill and security organizations
2:03 am
to be able to detect this malicious code and protect. not everybody has that in the health care industry. >> any indication there is a focus on trying to get something covid related because everybody wants it right now? is there a bigger appetite? >> there is only going to be so many people who can get information and turn it into a vaccine. then we are going to have the people who just decide i don't want the world to have a vaccine. there is not much of a difference. we have the protection capability we have built and then, in this instance, looking at the vaccine production, and , johnson & johnson has a plant in wuhan, china. we were able to see what was happening all along.
2:04 am
we saw with the virus about a 30% uptick in what i will call vist or criminal activity trying to monetize anything they could. again, large companies, secured companies, have defenses against and are able to defend very easily, but in general, about a 30% uptick. was it going for virus? it would be hard to tell. people will try to come in one -- the ability to detect it is what helped us.
2:05 am
we took a concerted effort. anyone who was working on vaccine production, anybody who was going to be working on , tollectual property provide minimum necessary access, those are terms we use to protected. we did that. the social media, about june time frame we saw one of the other companies having issues with social media which we talked about at the board meeting and one of the things that happened was we had all started to see some of that, so we informed our people to be aware of it. ,on't go and click on anything giving people some guidelines to
2:06 am
make sure they were secure. >> do you have a little cybersecurity moat around covid stuff or is it everything? moat.have a huge honkin that's what we do. we create moats. sounds like we close ourselves off. is, is that we provide the ability for the business to operate in an insecure environment, giving the right controls and the right risks. >> that was excellent in terms of the example you showed. one of the things we also showed on our end was that our third-party we partner with to carry out the mission here, we did see an increase in terms of
2:07 am
ford parties being impacted attack. inrd parties who are close the development research arm of getwork we do, when they attacked it becomes a problem for lily. we have to spring into action to ensure our value chain is projected and that we are -- is protected and that we are able to deliver life-saving medicines. we did see an increase. this year we have done way more around our third parties that have seen the last couple years. attacks generally are coming through some other vector. that is why i ask you about routers. i wanted to bring you in -- nice to see you -- and talk about the security components of operation warp speed.
2:08 am
eli lilly and johnson & johnson are among the players. we don't know very much about the cybersecurity side, what it looks like. maybe just because geeky people ask those questions. can you give us an idea how that works in practice? can speak to the unique role the fbi plays. there are a lot of different players across the federal government and the health care sector as well. from the fbi's perspective, we have the advantage of being a domestic law enforcement and intelligence agency. int that helps us to do service of this mission of protecting the vaccine research use ourly chain is to role having access to classified intelligence to understand what adversary plans and intentions are to see threats as they are forming.
2:09 am
our domestic presence with 56 field offices and satellite agencies, we are really embedded in communities and we have enduring partnerships, research institutions, companies, etc., where we can have that information downgraded which effectively means at a level that we can share it, ideally before something occurs. we can actually act on what we see and that is where the types of direct engagement these organizations is so important. one organization like a university or a company sees this type of threatening cyber , it can be used not only to investigate but to share that information with the intelligence community with networked offenders, share it
2:10 am
across, and help everyone strengthen their networks. >> are you getting in this current environment, more back-and-forth than you were in the past? i think companies are more reticent to let dhhs know they have been compromised. >> we have been proactive and the has been a combined effort. that is a maturation in the federal government over the past few years. some of that was in response to well-deserved feedback we would sector,from the private not appreciating having several federal agencies knocking at their door or sharing the same threat information with them. increasingly that is a partnership and that has been simplified by warp speed and even months before speed started. as early as march, when we were
2:11 am
starting to see the indication not only of cyber criminals, but also of nationstates targeting covid research. we very quickly formed up with the department of health and human services on a couple different fronts to warn those who were being directly targeted and to do some research and expand that circle out to sea, of if we know these types entities are being targeted, who is likely next? thirdly, we did something unusual for us in may, which is that we issued a public service announcement with cisa about the chinese cyber actors targeting covid research. that was for two purposes. one, to warn, but also to let china know we have an understanding of what they are doing.
2:12 am
there would be some risk and consequences to them for that activity. by virtue of that extended -- that sustained engagement, we are seeing collaboration with the health care sector, even on issues that are not specifically related to covid research, for example, recent credible threat with ransomware against hospitals and other health care providers. we got tremendous feedback from the health care sector organizations like the american hospital association in response to that because, again, with cisa and hhs we put out those indicators, we had video calls and ways of engaging directly cisa to let him know we were taking this seriously and as a result, we were advising that they do, too. and then keeping up that contact
2:13 am
because we know that is a real resource strain when we are advising a threat like that. resourcess a shift in and that is only sustainable for so long given that continued communication is important so we can keep them updated on what we are seeing. >> one of the strategies that has been used in the past is to actually bring charges against people. i am thinking of the pla hackers that were brought charges against. effectat seem to have an ? however long it did, it had some knock on effect. did the psa have a knock on effect? >> we are aiming at a number of different audiences when we do things like that. there are many different tools being used, not only by the fbi, but across the federal government and the private sector partners, too. there is the psa, but that was
2:14 am
also followed by an indictment shortly thereafter that did identify chinese cyber actors responsible for targeting covid research. increasingly, this is part of our new fbi cyber strategy that director wray announced a few months ago. it is not so much about an indictment. that is one means to an end. because of the unique role in the art i described that fbi has, we want to make sure we are sharing the information and relationships we have with our partners in the federal government, overseas, in the , whatever steps we can, whether that is fbi sanctions,asury publicly outing some more covert action you might not see, and to do that in a joint sequence coordinated way to have a maximum impact, because for too
2:15 am
long, adversaries had acted with what they think is impunity. we want to change the risk calculus for them. >> let me talk about intellectual property and how difficult it is to be a health care company. time to do open and cooperative research and the need to protect ip against hackers. what are you doing in that respect? >> one of the things is making sure we know where all of our ip's. we have that network and we have that area where we can store in-house that information. there are protections we have wrapped around those repositories where intellectual property sits. as it relates to the research, dealing with collaborations we may have with external resource organizations, we are also ensuring that we are helping to assess the security posture of the organizations as well.
2:16 am
they are collaborating with us as it relates to that specific research which is going to start to create ip. that are have controls wrapped around those repositories to ensure we are monitoring any exposure to that data. we know how to monitor that on our end. >> do you have something tapped to that? your -- and what they are dealing with, what you have been handling something for some period of time, you lose sight of the importance. at j&j, we continually talk about the importance of the data to our patients and to health care and health care to humanity. it really well
2:17 am
about the third parties. no one company creates the vaccine or a drug by itself. there are multiple third parties, legal entities, patent filings, patent offices, as well and youranufacturer distribution that you are going through. you are continually looking at those. the covidthe road to vaccine did show my organization in a very quick period of time is look at the data flow. when you look at the data flow for intellectual properties, for something specific like vaccine production, we learned a lot and looking at helping the business in other ways, that we would not have known existed if we had not done it during the short period of time. us, we worked
2:18 am
with the fbi and a special agent who came and talked to all our ,ntellectual property attorneys regulatory attorneys, to talk about the threats. that education and using our government entities to be able tremendouswas a resource for people to understand how important intellectual property is and how to protect it. example of protection, i am just guessing here, data at risk being encrypted? >> that is one. think about databases and big networks. i need to look at the date on my computer. is that encrypted? i need to send it. is that encrypted? what do you do? there are a lot of elements of
2:19 am
how things are in making sure you have appropriate repositories and ability to encrypt that data from the beginning all the way to the end. i thought i would do is save the news for last, which is very un-journalistic for me. for those who may not have seen it, i will bring you a quick look, there is an article that reports on cyber attacks on vaccine distribution, which goes to our next subject, supply chains. ibm researchers and cisa said the attack seemed to be intended to sterile -- to steal network credentials of officials at global organizations. these were officials who were very focused on the refrigeration process necessary for these vaccines.
2:20 am
question.ask you this in terms of the supply chain, meredith, what is the thing that worries you most about the vulnerability in distribution? awarenesses there is by those organizations that provide a critical part of our value chain and our development cycle -- they may not have the same level of concern around security of their areas as we may because they think about it, i'm not really delivering ip. i am offering cold storage. should i be worried if i am just housing something? that is my biggest concern, is them being aware that they are targets when they are partnering with us and providing that service for us to be able to get the vaccines where they need to be. that would be my one biggest concern. target. they are a
2:21 am
they may not have the same controls we have within our larger organizations because they may be smaller. they may not have that. that exposure is real. i would assume if you have therapeutics you have a regular flu vaccine, you have not had to take -- think as much about getting it from a to b. >> correct. >> because there is a finite .mount of vaccine this is a hotter commodity. >> when we think about the intent behind that, we look at what the hackers and the bad guys are doing, it is twofold. one of them is disruption. i want to disrupt the flow or the cycle. some may have a different take on that where they may want to damage vaccines, so once they are delivered, the efficacy is not there.
2:22 am
i think you have multiple intent behind why there is an interest in cold chain or any other supportive supply chain we have -- the development of our >> are you looking at this any other way because it is covid? >> we have a robust supply chain. j&j does not say have the temperature requirements other vaccines do. deal not that is not a big . it is the overall security of getting the vaccine from point of manufacture into somebody's arm. >> twice in some cases. >> j&j it is only one.
2:23 am
one of my good friends at a company that is going to help operation warp speed make sure the vaccine is given out, and is --o in pharmaceutical retail i had come from a pharmacy company and we did mail order delivery of drugs. aeat the vaccine like it is c2 drug. from the beginning have to have a signoff, there are security requirements around. there are a lot of requirements for storing it. all of those things should be replicated for the vaccine. wheel.ry to reinvent the use what you already have.
2:24 am
it is a great practice. it is approved for c2. just use it. >> for those of us who are not in health care, can you explain what a c2 drug is, what an example would be? >> a c2 drug would be something like coding or morphine. something highly addictive or highly controlled. it is a controlled substance. substance,rolled there is a whole chain of how they must be dispensed. even organizations like ups or those type they have theydrug in their purview, actually have protocols that are already set up. say the general, you
2:25 am
were talking about -- >> no, general -- >> you did not need to reinvent the wheel. there are systems in place. a c2 drug may not be as hot a commodity as covid but you could deal with it. requiring the extreme temperature or the sensitivity of how the drug must be dispensed is not something new. protocols in health care are already there. just utilize them. capitalize on them and modify them as necessary for this. i do not have any visibility to what was done or going on in that area. but that was my recommendation. >> does that mean -- i don't
2:26 am
want to go all the way to the word relaxed. but you do not have huge concerns with respect to the distribution of the vaccine? >> i don't. in healthl confidence care organizations in the united , leveraging what was already there. i was in the industry for 10 years. , and we have shift a lot of c2 drugs in the company i worked with. a tractor trailer load went out every day from the warehouse to a distribution center. working with, state police, monitoring, all of those things are already and have been in place. utilizing those and leveraging them will make the job easier. is there an opportunity to provide better communication, better visibility with digital
2:27 am
technology, absolutely. -- i have a lot of confidence in the u.s. health care system, what has already been put in place. >> sorry to keep harping on this, but i think the average person thinks this distribution, all we have been hearing is how this is going to be the most enormous and complicated and bound to fail or bound to have problems. you do not think it is as complicated as people are saying? that we have done this in different levels in the past? >> don't get me wrong. the distribution of controlled substances or substances that require low temperature efficacy isn't complicated. it is extreme we complicated. complicated. it is a problem the u.s. has already solved and can leverage
2:28 am
those learnings to be able to make this done in a secure manner. have there been people who have tried to steal c2 drugs in shipment before? absolutely. will there likely be some type of attempt made? maybe. the question is what do you accomplish? >> thank you. has law enforcement, what are you gearing up for in terms of distribution of a vaccine? perspective,er there's obviously a number of motivations for these actors trying to disrupt the supply chain. our biggest concern would be a distracted attack to launch into that chain. we certainly see cyber
2:29 am
adversaries move to targeting third parties to try to move into the targets they're trying to reach. thatotivations go beyond type of destructive or disruptive attack. it could be trying to steal intellectual property, for beancial purposes, it could to undermine confidence in the u.s. efforts to provide an or toive vaccine advantage another country's developments. i think the other thing we try to keep in mind is that while this discussion is focused on the cyber-related threats, we see are most determined nationstate adversaries not just relying on one method to target the supply chain, but to combine using more traditional forces to
2:30 am
try to penetrate organizations and through diplomatic means to treaties and create relationships that might put them in a better position to disrupt or influence information. our focus is looking across all of those. working with our cyber and counterintelligence programs. >> is there something in particular that worries you about this next phase? >> i think the complexity of it potentially. hearing they are thinking about it. this is work they do all the time. they have the support of additional entities from the federal government focused on protecting research. that gives me confidence.
2:31 am
end ofave come to the our time. i tried to focus questions i found in the human day channel. -- q and a channel. i was quite concerned about the cyber aspect of the sand -- of this and the distribution aspect and it is fascinating to know how you have thought this through. who are goingou to stay for our next session, stay tuned. we are going to be right with the next session about emerging technology with some fascinating people, some of my favorite people in this arena. i thank you so much for being with us today for this session. stay safe and healthy. thanks for being with us. >> with coronavirus cases increasing across the country, use our website,
2:32 am, to follow the trends, track the spread with interactive maps, and watch updates on demand anytime at coronavirus. >> c-span's "washington journal." every day we take your calls on the news of the day and discuss policy issues that impact you. friday morning we will talk about the planned house vote on the more act which would decriminalize marijuana. then stephanie murphy on the future of the democratic party and the priorities of the blue dawn coalition in the new congress. on then tom mcclintock decriminalizing marijuana at the federal level and other news of the day. journal"shington friday morning and joined the discussion with your phone calls, facebook comments, texts,
2:33 am
and tweets. >> coming up live on friday, the house returns at 9:00 am for debate on the marijuana decriminalization bill. that is 9:00 a.m. eastern. p.m., president obama will hold a virtual campaign rally for senate candidates facing runoff elections on january 5. a.m., johnat 8:30 boehner, joe crowley, and former transportation secretary rodney slater look at the key decisions in the transition from a trump bidenstration to a administration. at 1045 mam house speaker pelosi holds her weekly briefing with reporters. look at the strip reading covid-19 vaccines. the johns hopkins school of public


info Stream Only

Uploaded by TV Archive on