SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
Cyber-risk in Healthcare – Being Battle Ready
Mary Alice Annecharico
MS. RN, FHIMSS
Henry Ford Health System CIO, (Retired)
March 15, 2018
Henry Ford Innovations Series
Agenda
• Overview of HFHS
• Building a Culture of Confidentiality
• Executive leadership engagement
• Board of Director sponsorship
• Institutional Stressors encircle all cyber-risk issues – the Clinical
mission, CMS cuts, Revenue downturns, budget cuts, availability of
funding for priorities. Etc.
• Assessing and Managing Cyber-risk
, Dialysis, and Hospice
Who Makes up the Security Business?
A Recent CIO’s Perspectives
• We have created a culture of confidentiality, transparency, collaboration,
and improvement.
• A Traverse City, Michigan based research group concluded that the average
cost of a healthcare breach, worldwide, is in excess of $363 per exposed
personally identifiable record. In the U.S. healthcare industry, the average
cost was $398.
• There is something inherent in the human condition that says health
information is some of our most private information. The other risk piece is
the damage that could be done with personal information for identity and
medical identity theft.
According to The Advisory Board– Major Threat Vectors
What Is Henry
Ford Health
System Doing
to Address
these
Threats?
Perceived Threats
• Breach or data leakage
• Ransomware
• Credential stealing malware
• Malicious insiders (trusted access by employees)
• Wiper malware
• Denial of service attacks
• Website backdoors
• Theft of hardware, devices, etc. (physical theft)
• Supply chain integrity of software, hardware, devices, etc.
• Patient Safety with Medical device data integrity
• Fire, flash flood, or natural hazard
Circle Square | Digital Health Trends |Source: Accenture; Taking the Pulse Report
2018 HIMSS Cybersecurity Survey Summary (1 of 3 HIMSS)
Threat actors responsible for recent significant security incidents have been
generally characterized as online scam artists (29.6%), negligent insiders (16.4%),
and hackers (15.9%)
Number /percent
• Online scam artist (e.g., phishing, spear phishing) 56 37.6%
• Negligent insider (well-meaning but negligent individuals with trusted access
who may facilitate or cause a data breach or other cyber incident)
31 20.8%
• Hacker (e.g., cybercriminal, script kiddie, or other bad actor)
30 20.1%
***
Initial point of compromise is most often e-mail (e.g., phishing e-mail) for recent
significant security incidents
HIMSS summary survey findings (2 of 3)
5 Biggest barriers for remediation and mitigation of cybersecurity
incidents: Personnel and financial resources
• lack of appropriate cybersecurity personnel (52.4%), ??
• lack of financial resources (46.6%),
• too many application vulnerabilities (28.6%),
• too many endpoints (27.5%), and
• too many emerging and new threats (27.0%)
Cyber Threat Intelligence Sources for Healthcare (3/3 HIMSS)
• Peers and Affiliated Security Advisories (word of mouth)
• US CERT alerts and bulletins
• HITRUST
• NIST National Vulnerability Database
• SANS resources
• Third party vendor (healthcare specific)
• FBI-DHS Joint Indicator Bulletins (JIBs)
• US DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
• US DHS and HHS National Cybersecurity and Communications Integration Center (NCCI
• National Health Information Sharing and Analysis Center (NH-ISAC)
• HIMSS resources (e.g., monthly healthcare and cross-sector cybersecurity reports, etc.)
Henry Ford’s Overall Approach
HFHS’ Comprehensive Approach to Managing Risk
• Centralized Network Security Services
• Security awareness and training program(s)
• Documented Cybersecurity policies and procedures
• Inventory of assets and access controls
• Physical security
• SOC Services * -Operating expense
• Engaging Leadership and the Board – an Imperative
• Monitoring evolving technologies that address security – e.g.,
blockchain
Service Organization – Team Processes
• Cybersecurity roles and responsibilities – members developed with core competencies and certification training
• Data Governance and Organization Structure
• Data Loss Prevention and Incident response -*
• Communication– Organizational website, departmental meetings and education, and Security Advisory;
annual mandatory education
• Risk Assessment, Planning and Management and Incident response
• Assess and Evaluate Risk: in Clinical (EHR and Medical devices), Business and Financial systems
• Third party risks – vendor assessments, contracts and internal threat posture prior to acquisitions
• Planned Penetration testing – servers, websites, databases, applications, workstations, mobile
devices, physical security
• Risk assessment and management with tabletop exercises
• Business continuity and disaster recovery
Assessment of Cyber Risk
Image from Novant Health
According to Deloitte’s Risk Assessment helped to
set the tone for managing risks.
Organizations Must:
Set risk appetite and drive focus purpose and
direction. Clearly articulate cyber risk appetite
and strategy.
Define the right balance between threat-centric
vs. compliance-centric programs. Fully integrate
cyber risk management into IT design, not
quality control.
Break down silos. Cyber risk is an enterprise-level
issue. Lack of information-sharing is a top
inhibitor for effective risk management.
Be creative about cyber risk awareness. Your
weakest link is the human factor. Prepare for
cyber attacks by conducting war games,
penetration tests, and exercising the cyber
incident response plans.
There is not enough talent to do everything in-
house, so take a strategic approach to sourcing
decisions.
Incentivize openness and collaboration. Build
strong relationships with partners, law
enforcement, regulators, and vendors.
CyberSecurity Health Plan Sector 2015
18
• Cyber incidents are serious business crises that impact broader
business objectives for organizations across industries.
• The ability to promptly respond to and recover from cyber incidents
is a top issue for senior executives and board members.
• The need for speed to react to cyber incidents is critical to
organizations.
• Cyber incidents impacting consumer confidentiality and economic
stability are drawing increased regulatory scrutiny.
• The complexity of corporate eco-systems, including suppliers and
partners, increases the difficulty of recovery following cyber
incidents.
• Accurate and timely information and intelligence is critical in
making time-sensitive decisions to recover essential business
functions.
• Having an Incident Response plan is not enough – the plan must
be understood and exercised across the entire organization,
including business leaders.
The need to detect, respond and recover has
never been greater
Cyber security is more than a
technology problem.
For many health care
organizations, cyber incident
occurrences aren’t a question
of "if,” but "when.”
This reality makes developing
effective response strategies a
critical imperative for any
business.
Deloitte LLP
Security Frameworks
• NIST
• HITRUST
• Critical Security Controls
• ISO 7
• COBIT
Security Program Objectives
• Acts as a single True North
• Acts as a translation layer
• Reduces complexity
• Enables a proactive approach
• Addresses “root cause”
• Adds context
• Enables efficient management of limited resources
• Provides a sustainable approach
• Enables systematic risk mitigation
• Enables alignment with the business
Customers
Exceptional
Experience
Affordable,
Efficient Care
Safest Care &
Best Outcomes
Compassionate,
Commited
People
From Circle Square | Digital Health Trends | Black Book Resources
RECOGNIZING GLOBAL INTERESTS TO DEVELOP SOLUTIONS:
Circle Square | Digital Health Trends / Source
Circle Square | Digital Health Trends/ Source: Logos are linked to company websites and text boxes linked to story sources |
Why Do Investment Decisions Take SO Long?
• Lots of perceived extra steps
• Small Start Up and Vendors willingness to bring ideas to the market
• End User desires
• Due Diligence
• Security risk assessments
• Supply Chain involvement
• Governance Protocols for decision making
• Legal – Contract and Risk Reviews
• Patient Safety and Quality outcomes Assessments
• Integration Assessments – workflow is KING
• ROI and degree of Impact considerations
• Investment priorities with no Discretionary local funds
MS, RN, CIO, Retired
Q&A

Más contenido relacionado

La actualidad más candente

Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingTony Martin-Vegue
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskSarah Clarke
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management Ersoy AKSOY
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Emily2014
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceJTLeekley
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk ManagementGoutama Bachtiar
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In ITpbhugenberg3
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0Vincent Toms
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30Ivanti
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Managementvikasraina
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 

La actualidad más candente (20)

Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat ModelingHow to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
How to Improve Your Risk Assessments with Attacker-Centric Threat Modeling
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities Identifying Your Agency's Vulnerabilities
Identifying Your Agency's Vulnerabilities
 
Remote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC ComplainceRemote Deposit Capture Risk Management & FFIEC Complaince
Remote Deposit Capture Risk Management & FFIEC Complaince
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
Mastering Information Technology Risk Management
Mastering Information Technology Risk ManagementMastering Information Technology Risk Management
Mastering Information Technology Risk Management
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
Linked in misti_rs_1.0
Linked in misti_rs_1.0Linked in misti_rs_1.0
Linked in misti_rs_1.0
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30
 
Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 VersionAccidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
 

Similar a mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford Health System

Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdframsetl
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summarypatmisasi
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Sri Bharadwaj
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey Rahul Neel Mani
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response ManagementDon Caeiro
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Matthew Rosenquist
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack SurvivalSkoda Minotti
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security GuidanceMeg Weber
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS GuidelinesMeg Weber
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...Health IT Conference – iHT2
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...Health IT Conference – iHT2
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...Health IT Conference – iHT2
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerSaraPia5
 

Similar a mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford Health System (20)

Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
 
Security Incident Response Readiness Survey
Security Incident Response Readiness Survey  Security Incident Response Readiness Survey
Security Incident Response Readiness Survey
 
Introduction to Incident Response Management
Introduction to Incident Response ManagementIntroduction to Incident Response Management
Introduction to Incident Response Management
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015Top 10 Cybersecurity Predictions for 2015
Top 10 Cybersecurity Predictions for 2015
 
Cyber Attack Survival
Cyber Attack SurvivalCyber Attack Survival
Cyber Attack Survival
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
CHIME LEAD New York 2014 Opening Keynote "What is Cyber Security and Why is i...
 
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
CHIME LEAD Forum Houston - Opening Keynote "What is Cyber Security and Why is...
 
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
CHIME LEAD DC 2014 - Opening Keynote "What is Cyber Security and Why is it Cr...
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique SingerLet's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
Let's TOC: Navigate the Cybersecurity Conversation with Dominique Singer
 

Más de Levi Shapiro

Version Bravo- The Springboard for Navy SEAL entrepreneurship, cohort 003
Version Bravo- The Springboard for Navy SEAL entrepreneurship, cohort 003Version Bravo- The Springboard for Navy SEAL entrepreneurship, cohort 003
Version Bravo- The Springboard for Navy SEAL entrepreneurship, cohort 003Levi Shapiro
 
Radical Life Extension_Dr. Leon Peshkin_Dec 2023
Radical Life Extension_Dr. Leon Peshkin_Dec 2023Radical Life Extension_Dr. Leon Peshkin_Dec 2023
Radical Life Extension_Dr. Leon Peshkin_Dec 2023Levi Shapiro
 
Israel’s Life Science Hub 2023 English Abstract.pdf
Israel’s Life Science Hub 2023 English Abstract.pdfIsrael’s Life Science Hub 2023 English Abstract.pdf
Israel’s Life Science Hub 2023 English Abstract.pdfLevi Shapiro
 
Gil Bashe FINN Partners: The Future of Digital Health – Nose Dive or Transfor...
Gil Bashe FINN Partners: The Future of Digital Health – Nose Dive or Transfor...Gil Bashe FINN Partners: The Future of Digital Health – Nose Dive or Transfor...
Gil Bashe FINN Partners: The Future of Digital Health – Nose Dive or Transfor...Levi Shapiro
 
Urgent Request and Call for Action for Ensuring Safety and Inclusivity at MIT
Urgent Request and Call for Action for Ensuring Safety and Inclusivity at MITUrgent Request and Call for Action for Ensuring Safety and Inclusivity at MIT
Urgent Request and Call for Action for Ensuring Safety and Inclusivity at MITLevi Shapiro
 
HLTH-2023-Digital-Catalouge.pdf
HLTH-2023-Digital-Catalouge.pdfHLTH-2023-Digital-Catalouge.pdf
HLTH-2023-Digital-Catalouge.pdfLevi Shapiro
 
Baptist Health- Engineering the Future of Healthcare
Baptist Health- Engineering the Future of HealthcareBaptist Health- Engineering the Future of Healthcare
Baptist Health- Engineering the Future of HealthcareLevi Shapiro
 
YEDA Techn Transfer at Weizmann Institute- Discord and Challenges in Academic...
YEDA Techn Transfer at Weizmann Institute- Discord and Challenges in Academic...YEDA Techn Transfer at Weizmann Institute- Discord and Challenges in Academic...
YEDA Techn Transfer at Weizmann Institute- Discord and Challenges in Academic...Levi Shapiro
 
HADASIT: Tech Transfer and More in Life Science
HADASIT: Tech Transfer and More in Life ScienceHADASIT: Tech Transfer and More in Life Science
HADASIT: Tech Transfer and More in Life ScienceLevi Shapiro
 
Presenting to Investors & the Media.pdf
Presenting to Investors & the Media.pdfPresenting to Investors & the Media.pdf
Presenting to Investors & the Media.pdfLevi Shapiro
 
Nissan Elimelech, Founder, Augmedics: How I Built the World's First XR Surgic...
Nissan Elimelech, Founder, Augmedics: How I Built the World's First XR Surgic...Nissan Elimelech, Founder, Augmedics: How I Built the World's First XR Surgic...
Nissan Elimelech, Founder, Augmedics: How I Built the World's First XR Surgic...Levi Shapiro
 
Beyeonics CEO, Ron Schneider, Advances in Medical XR
Beyeonics CEO, Ron Schneider, Advances in Medical XRBeyeonics CEO, Ron Schneider, Advances in Medical XR
Beyeonics CEO, Ron Schneider, Advances in Medical XRLevi Shapiro
 
XRHealth Founder, Miki Levy
XRHealth Founder, Miki LevyXRHealth Founder, Miki Levy
XRHealth Founder, Miki LevyLevi Shapiro
 
Digital Health in US Health Systems.pptx
Digital Health in US Health Systems.pptxDigital Health in US Health Systems.pptx
Digital Health in US Health Systems.pptxLevi Shapiro
 
Course Syllabus (Digital Rosh): The Future of Digital Medicine- Biology, Gene...
Course Syllabus (Digital Rosh): The Future of Digital Medicine- Biology, Gene...Course Syllabus (Digital Rosh): The Future of Digital Medicine- Biology, Gene...
Course Syllabus (Digital Rosh): The Future of Digital Medicine- Biology, Gene...Levi Shapiro
 
Alagene BioFoundry: Releasing the Genie Out of the Bottle
Alagene BioFoundry: Releasing the Genie Out of the Bottle Alagene BioFoundry: Releasing the Genie Out of the Bottle
Alagene BioFoundry: Releasing the Genie Out of the Bottle Levi Shapiro
 
Digital Health Ecosystem- 2022 3rd Quarter Report
Digital Health Ecosystem- 2022 3rd Quarter ReportDigital Health Ecosystem- 2022 3rd Quarter Report
Digital Health Ecosystem- 2022 3rd Quarter ReportLevi Shapiro
 
EU Medical Device Regulatory Framework_Dec, 2022
EU Medical Device Regulatory Framework_Dec, 2022EU Medical Device Regulatory Framework_Dec, 2022
EU Medical Device Regulatory Framework_Dec, 2022Levi Shapiro
 
FINN Partners Global State of Digital Health Q3 2022
FINN Partners Global State of Digital Health Q3 2022FINN Partners Global State of Digital Health Q3 2022
FINN Partners Global State of Digital Health Q3 2022Levi Shapiro
 
Digitally powered participant-directed studies- Strategy for Decentralized Ca...
Digitally powered participant-directed studies- Strategy for Decentralized Ca...Digitally powered participant-directed studies- Strategy for Decentralized Ca...
Digitally powered participant-directed studies- Strategy for Decentralized Ca...Levi Shapiro
 

Más de Levi Shapiro (20)

Version Bravo- The Springboard for Navy SEAL entrepreneurship, cohort 003
Version Bravo- The Springboard for Navy SEAL entrepreneurship, cohort 003Version Bravo- The Springboard for Navy SEAL entrepreneurship, cohort 003
Version Bravo- The Springboard for Navy SEAL entrepreneurship, cohort 003
 
Radical Life Extension_Dr. Leon Peshkin_Dec 2023
Radical Life Extension_Dr. Leon Peshkin_Dec 2023Radical Life Extension_Dr. Leon Peshkin_Dec 2023
Radical Life Extension_Dr. Leon Peshkin_Dec 2023
 
Israel’s Life Science Hub 2023 English Abstract.pdf
Israel’s Life Science Hub 2023 English Abstract.pdfIsrael’s Life Science Hub 2023 English Abstract.pdf
Israel’s Life Science Hub 2023 English Abstract.pdf
 
Gil Bashe FINN Partners: The Future of Digital Health – Nose Dive or Transfor...
Gil Bashe FINN Partners: The Future of Digital Health – Nose Dive or Transfor...Gil Bashe FINN Partners: The Future of Digital Health – Nose Dive or Transfor...
Gil Bashe FINN Partners: The Future of Digital Health – Nose Dive or Transfor...
 
Urgent Request and Call for Action for Ensuring Safety and Inclusivity at MIT
Urgent Request and Call for Action for Ensuring Safety and Inclusivity at MITUrgent Request and Call for Action for Ensuring Safety and Inclusivity at MIT
Urgent Request and Call for Action for Ensuring Safety and Inclusivity at MIT
 
HLTH-2023-Digital-Catalouge.pdf
HLTH-2023-Digital-Catalouge.pdfHLTH-2023-Digital-Catalouge.pdf
HLTH-2023-Digital-Catalouge.pdf
 
Baptist Health- Engineering the Future of Healthcare
Baptist Health- Engineering the Future of HealthcareBaptist Health- Engineering the Future of Healthcare
Baptist Health- Engineering the Future of Healthcare
 
YEDA Techn Transfer at Weizmann Institute- Discord and Challenges in Academic...
YEDA Techn Transfer at Weizmann Institute- Discord and Challenges in Academic...YEDA Techn Transfer at Weizmann Institute- Discord and Challenges in Academic...
YEDA Techn Transfer at Weizmann Institute- Discord and Challenges in Academic...
 
HADASIT: Tech Transfer and More in Life Science
HADASIT: Tech Transfer and More in Life ScienceHADASIT: Tech Transfer and More in Life Science
HADASIT: Tech Transfer and More in Life Science
 
Presenting to Investors & the Media.pdf
Presenting to Investors & the Media.pdfPresenting to Investors & the Media.pdf
Presenting to Investors & the Media.pdf
 
Nissan Elimelech, Founder, Augmedics: How I Built the World's First XR Surgic...
Nissan Elimelech, Founder, Augmedics: How I Built the World's First XR Surgic...Nissan Elimelech, Founder, Augmedics: How I Built the World's First XR Surgic...
Nissan Elimelech, Founder, Augmedics: How I Built the World's First XR Surgic...
 
Beyeonics CEO, Ron Schneider, Advances in Medical XR
Beyeonics CEO, Ron Schneider, Advances in Medical XRBeyeonics CEO, Ron Schneider, Advances in Medical XR
Beyeonics CEO, Ron Schneider, Advances in Medical XR
 
XRHealth Founder, Miki Levy
XRHealth Founder, Miki LevyXRHealth Founder, Miki Levy
XRHealth Founder, Miki Levy
 
Digital Health in US Health Systems.pptx
Digital Health in US Health Systems.pptxDigital Health in US Health Systems.pptx
Digital Health in US Health Systems.pptx
 
Course Syllabus (Digital Rosh): The Future of Digital Medicine- Biology, Gene...
Course Syllabus (Digital Rosh): The Future of Digital Medicine- Biology, Gene...Course Syllabus (Digital Rosh): The Future of Digital Medicine- Biology, Gene...
Course Syllabus (Digital Rosh): The Future of Digital Medicine- Biology, Gene...
 
Alagene BioFoundry: Releasing the Genie Out of the Bottle
Alagene BioFoundry: Releasing the Genie Out of the Bottle Alagene BioFoundry: Releasing the Genie Out of the Bottle
Alagene BioFoundry: Releasing the Genie Out of the Bottle
 
Digital Health Ecosystem- 2022 3rd Quarter Report
Digital Health Ecosystem- 2022 3rd Quarter ReportDigital Health Ecosystem- 2022 3rd Quarter Report
Digital Health Ecosystem- 2022 3rd Quarter Report
 
EU Medical Device Regulatory Framework_Dec, 2022
EU Medical Device Regulatory Framework_Dec, 2022EU Medical Device Regulatory Framework_Dec, 2022
EU Medical Device Regulatory Framework_Dec, 2022
 
FINN Partners Global State of Digital Health Q3 2022
FINN Partners Global State of Digital Health Q3 2022FINN Partners Global State of Digital Health Q3 2022
FINN Partners Global State of Digital Health Q3 2022
 
Digitally powered participant-directed studies- Strategy for Decentralized Ca...
Digitally powered participant-directed studies- Strategy for Decentralized Ca...Digitally powered participant-directed studies- Strategy for Decentralized Ca...
Digitally powered participant-directed studies- Strategy for Decentralized Ca...
 

Último

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford Health System

  • 1. Cyber-risk in Healthcare – Being Battle Ready Mary Alice Annecharico MS. RN, FHIMSS Henry Ford Health System CIO, (Retired) March 15, 2018 Henry Ford Innovations Series
  • 2. Agenda • Overview of HFHS • Building a Culture of Confidentiality • Executive leadership engagement • Board of Director sponsorship • Institutional Stressors encircle all cyber-risk issues – the Clinical mission, CMS cuts, Revenue downturns, budget cuts, availability of funding for priorities. Etc. • Assessing and Managing Cyber-risk
  • 3. , Dialysis, and Hospice
  • 4. Who Makes up the Security Business?
  • 5. A Recent CIO’s Perspectives • We have created a culture of confidentiality, transparency, collaboration, and improvement. • A Traverse City, Michigan based research group concluded that the average cost of a healthcare breach, worldwide, is in excess of $363 per exposed personally identifiable record. In the U.S. healthcare industry, the average cost was $398. • There is something inherent in the human condition that says health information is some of our most private information. The other risk piece is the damage that could be done with personal information for identity and medical identity theft.
  • 6.
  • 7. According to The Advisory Board– Major Threat Vectors What Is Henry Ford Health System Doing to Address these Threats?
  • 8. Perceived Threats • Breach or data leakage • Ransomware • Credential stealing malware • Malicious insiders (trusted access by employees) • Wiper malware • Denial of service attacks • Website backdoors • Theft of hardware, devices, etc. (physical theft) • Supply chain integrity of software, hardware, devices, etc. • Patient Safety with Medical device data integrity • Fire, flash flood, or natural hazard
  • 9. Circle Square | Digital Health Trends |Source: Accenture; Taking the Pulse Report
  • 10. 2018 HIMSS Cybersecurity Survey Summary (1 of 3 HIMSS) Threat actors responsible for recent significant security incidents have been generally characterized as online scam artists (29.6%), negligent insiders (16.4%), and hackers (15.9%) Number /percent • Online scam artist (e.g., phishing, spear phishing) 56 37.6% • Negligent insider (well-meaning but negligent individuals with trusted access who may facilitate or cause a data breach or other cyber incident) 31 20.8% • Hacker (e.g., cybercriminal, script kiddie, or other bad actor) 30 20.1% *** Initial point of compromise is most often e-mail (e.g., phishing e-mail) for recent significant security incidents
  • 11. HIMSS summary survey findings (2 of 3) 5 Biggest barriers for remediation and mitigation of cybersecurity incidents: Personnel and financial resources • lack of appropriate cybersecurity personnel (52.4%), ?? • lack of financial resources (46.6%), • too many application vulnerabilities (28.6%), • too many endpoints (27.5%), and • too many emerging and new threats (27.0%)
  • 12. Cyber Threat Intelligence Sources for Healthcare (3/3 HIMSS) • Peers and Affiliated Security Advisories (word of mouth) • US CERT alerts and bulletins • HITRUST • NIST National Vulnerability Database • SANS resources • Third party vendor (healthcare specific) • FBI-DHS Joint Indicator Bulletins (JIBs) • US DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) • US DHS and HHS National Cybersecurity and Communications Integration Center (NCCI • National Health Information Sharing and Analysis Center (NH-ISAC) • HIMSS resources (e.g., monthly healthcare and cross-sector cybersecurity reports, etc.)
  • 14. HFHS’ Comprehensive Approach to Managing Risk • Centralized Network Security Services • Security awareness and training program(s) • Documented Cybersecurity policies and procedures • Inventory of assets and access controls • Physical security • SOC Services * -Operating expense • Engaging Leadership and the Board – an Imperative • Monitoring evolving technologies that address security – e.g., blockchain
  • 15. Service Organization – Team Processes • Cybersecurity roles and responsibilities – members developed with core competencies and certification training • Data Governance and Organization Structure • Data Loss Prevention and Incident response -* • Communication– Organizational website, departmental meetings and education, and Security Advisory; annual mandatory education • Risk Assessment, Planning and Management and Incident response • Assess and Evaluate Risk: in Clinical (EHR and Medical devices), Business and Financial systems • Third party risks – vendor assessments, contracts and internal threat posture prior to acquisitions • Planned Penetration testing – servers, websites, databases, applications, workstations, mobile devices, physical security • Risk assessment and management with tabletop exercises • Business continuity and disaster recovery
  • 16. Assessment of Cyber Risk Image from Novant Health
  • 17. According to Deloitte’s Risk Assessment helped to set the tone for managing risks. Organizations Must: Set risk appetite and drive focus purpose and direction. Clearly articulate cyber risk appetite and strategy. Define the right balance between threat-centric vs. compliance-centric programs. Fully integrate cyber risk management into IT design, not quality control. Break down silos. Cyber risk is an enterprise-level issue. Lack of information-sharing is a top inhibitor for effective risk management. Be creative about cyber risk awareness. Your weakest link is the human factor. Prepare for cyber attacks by conducting war games, penetration tests, and exercising the cyber incident response plans. There is not enough talent to do everything in- house, so take a strategic approach to sourcing decisions. Incentivize openness and collaboration. Build strong relationships with partners, law enforcement, regulators, and vendors. CyberSecurity Health Plan Sector 2015
  • 18. 18 • Cyber incidents are serious business crises that impact broader business objectives for organizations across industries. • The ability to promptly respond to and recover from cyber incidents is a top issue for senior executives and board members. • The need for speed to react to cyber incidents is critical to organizations. • Cyber incidents impacting consumer confidentiality and economic stability are drawing increased regulatory scrutiny. • The complexity of corporate eco-systems, including suppliers and partners, increases the difficulty of recovery following cyber incidents. • Accurate and timely information and intelligence is critical in making time-sensitive decisions to recover essential business functions. • Having an Incident Response plan is not enough – the plan must be understood and exercised across the entire organization, including business leaders. The need to detect, respond and recover has never been greater Cyber security is more than a technology problem. For many health care organizations, cyber incident occurrences aren’t a question of "if,” but "when.” This reality makes developing effective response strategies a critical imperative for any business. Deloitte LLP
  • 19. Security Frameworks • NIST • HITRUST • Critical Security Controls • ISO 7 • COBIT
  • 20. Security Program Objectives • Acts as a single True North • Acts as a translation layer • Reduces complexity • Enables a proactive approach • Addresses “root cause” • Adds context • Enables efficient management of limited resources • Provides a sustainable approach • Enables systematic risk mitigation • Enables alignment with the business Customers Exceptional Experience Affordable, Efficient Care Safest Care & Best Outcomes Compassionate, Commited People
  • 21. From Circle Square | Digital Health Trends | Black Book Resources RECOGNIZING GLOBAL INTERESTS TO DEVELOP SOLUTIONS:
  • 22. Circle Square | Digital Health Trends / Source
  • 23. Circle Square | Digital Health Trends/ Source: Logos are linked to company websites and text boxes linked to story sources |
  • 24. Why Do Investment Decisions Take SO Long? • Lots of perceived extra steps • Small Start Up and Vendors willingness to bring ideas to the market • End User desires • Due Diligence • Security risk assessments • Supply Chain involvement • Governance Protocols for decision making • Legal – Contract and Risk Reviews • Patient Safety and Quality outcomes Assessments • Integration Assessments – workflow is KING • ROI and degree of Impact considerations • Investment priorities with no Discretionary local funds
  • 25. MS, RN, CIO, Retired Q&A