The challenge of building a secure and safe digital environment in healthcare

DefCamp
DefCampDefCamp
The challenge of building a secure and safe digital environment in healthcare
The challenge of building an secure
and safe digital environment in
the health care
Security isn’t just a tech, but
much much more …
The challenge of building a secure and safe digital environment in healthcare
Nurse
Mom
Researcher
Speaker
@womeninsecurity
@iamthecavalry
@_j3lena_
Why are the hospitals so interesting and
attractive for the criminals?
More victims at one place
Who wants the medical data ?
Everyone
What they can do ?
Too much
Discrimination private and at work
because of :
disease / chronical disease
gender
religion
race
sexual orientation
making a future profiles
Manipulating the price of insurance
Except stubborn medical professionals
• Marketing
• PR
• Phisical security
• Innovations
Sharing is caring
Connected but not protected
• ICT professionals
Phisical security
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
Personal experience
employee can download the documents from different links *
IT is giving the password to employee on phone without really checking whit
who they really talk. *
No limited access for temporary workers
PC with medical records connected to public internet
Insecure applications for medical records (why connected to the public
internet)
employee or visitor can use usb or phone charger and connect with PC from
the hospital etz
Old device & software
The contracts vendor-hospital
No patch
No update
No antivirus
No proxy
Required 24/7 online
Connected but not protected
#innovations
Infosec professional in healthcare
Security in the health care
What we think VS reality
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
The System
Same as medical professional need to
know and understand the system of human body,
infosec professionals need to understand the system in
healthcare,
so they can find real vulnerabilities and can solve them
The treatment, you make based on diagnostics
The diagnostics, you make based on the result and the
information’s
When criminals manipulate the results and the information’s
You will make wrong diagnostic and wrong treatment’s
Communication & Inside Organization of
Security department in organization
Inside organization
Awareness training
The challenge of building a secure and safe digital environment in healthcare
Security department in organization
• Security department independent department
• Giving the trainings and communicating with all departments
• Mandatory and regular consulting
Inside IT organization
• Enough security and IT professionals
• Mandatory and regular pen testing – independent company
• Mandatory and regular testing
1-2 x week using open tools – infosec employee
• Responsible disclosure & Bug bounty program
Responsible disclosure & Bugbounties
for hospital /vendor/manufacturer - digital and online safety
- almost 24/7 monitoring
- not expensive monitoring
- pay by founding or/and
repairing
- coordinate assist
for ethical hacker - passion
- no 9 – 17 work
- freedom = quality
- payed or possibility
The challenge of building a secure and safe digital environment in healthcare
• Training and building communication and teamwork with
departments
• Professionals for making the rules for & with departments
Awareness Training
• Simplicity and as less possible tech
• Making the connection between employees and IT
• With understanding, employees will easily accept the rules
work e-mail ≠ subscribe mail
check link
check e-mail
Oops spoofy e-mail
check on browser
check ….
Password
Password manager
Long
Personal
Funny +
be creative
The challenge of building a secure and safe digital environment in healthcare
Consulting infosecurity by default
All decision at all departments need to be made with consulting of
security department
Education & Security by design
Students & teachers/professors @ the conferences
Extra Workshops & lessons at schools by infosecurity
Practicing at Hackerspaces and using CTF
CTF competitions
The challenge of building a secure and safe digital environment in healthcare
Situation now
The vendor make conditions
that hospital must accept
Should be
The Hospital make conditions
and vendor/everyone must accept
The healthcare
The security /privacy
Supported by
IT/Manufacturer/developer
backed by the government
The policy made by the professionals from:
Being complain,
doesn’t mean that you are safe and secure
Health care without (basic) security
is like surgery without sterile instruments
The operation was (technically) a success, but the
patient died from sepsis …
Thank you 
The challenge of building a secure and safe digital environment in healthcare
1 of 41

Recommended

Differences In Critical Success Factors For Traditional And by
Differences In Critical Success Factors For Traditional AndDifferences In Critical Success Factors For Traditional And
Differences In Critical Success Factors For Traditional AndAmber Epps
270 views11 slides
Expectations and Class Survey by
Expectations and Class SurveyExpectations and Class Survey
Expectations and Class Surveywildman099
226 views6 slides
Evaluating software project by
Evaluating software projectEvaluating software project
Evaluating software projectHeather Addington
75 views6 slides
Add6 by
Add6Add6
Add6Technogroovy
323 views1 slide
The importance of information security nowadays by
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
2.3K views4 slides
The Rights And Ethics Of Employees With Respect To Privacy... by
The Rights And Ethics Of Employees With Respect To Privacy...The Rights And Ethics Of Employees With Respect To Privacy...
The Rights And Ethics Of Employees With Respect To Privacy...Angela Hays
3 views77 slides

More Related Content

Similar to The challenge of building a secure and safe digital environment in healthcare

Cyber Security 101: Training, awareness, strategies for small to medium sized... by
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
21.6K views41 slides
Materi 11 - ETHICS AND TECHNOLOGY.ppt by
Materi 11 -  ETHICS AND TECHNOLOGY.pptMateri 11 -  ETHICS AND TECHNOLOGY.ppt
Materi 11 - ETHICS AND TECHNOLOGY.pptHMToha1
23 views42 slides
Aetna information security assurance program by
Aetna information security assurance programAetna information security assurance program
Aetna information security assurance programSiddharth Janakiram
2.3K views18 slides
Team black by
Team blackTeam black
Team blackhetvi naik
27 views13 slides
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ... by
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...Health IT Conference – iHT2
914 views19 slides
Information Technology in CA Educatation by
Information Technology in CA EducatationInformation Technology in CA Educatation
Information Technology in CA EducatationGaurav Rathi
210 views14 slides

Similar to The challenge of building a secure and safe digital environment in healthcare(20)

Cyber Security 101: Training, awareness, strategies for small to medium sized... by Stephen Cobb
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb21.6K views
Materi 11 - ETHICS AND TECHNOLOGY.ppt by HMToha1
Materi 11 -  ETHICS AND TECHNOLOGY.pptMateri 11 -  ETHICS AND TECHNOLOGY.ppt
Materi 11 - ETHICS AND TECHNOLOGY.ppt
HMToha123 views
Information Technology in CA Educatation by Gaurav Rathi
Information Technology in CA EducatationInformation Technology in CA Educatation
Information Technology in CA Educatation
Gaurav Rathi210 views
Safe and Responsible Use of ICT by Rolly Franco
Safe and Responsible Use of ICTSafe and Responsible Use of ICT
Safe and Responsible Use of ICT
Rolly Franco20.2K views
Securing people that don't look like you, yet by Laura Bell
Securing people that don't look like you, yetSecuring people that don't look like you, yet
Securing people that don't look like you, yet
Laura Bell387 views
Securing the digital front door by Ryan Coleman
Securing the digital front doorSecuring the digital front door
Securing the digital front door
Ryan Coleman129 views
IT Security Awarenesss by Northern Virginia Community College by Atlantic Training, LLC.
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Cyber security and mobile devices by Umer Saeed
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
Umer Saeed79 views
ISMS Awareness Training (2) (1).pptx by vasidharta
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
vasidharta100 views
Information Security Awareness by Net at Work
Information Security Awareness Information Security Awareness
Information Security Awareness
Net at Work269 views
Best Practices for Security Awareness and Training by Kimberly Hood
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
Kimberly Hood874 views
Counseling & technology by tanyafhinson
Counseling & technologyCounseling & technology
Counseling & technology
tanyafhinson1.3K views
Call centers for the provision of independent living services by BabakFarshchian
Call centers for the provision of independent living servicesCall centers for the provision of independent living services
Call centers for the provision of independent living services
BabakFarshchian468 views
Hospital Internal Communication with SnapComms by SnapComms
Hospital Internal Communication with SnapCommsHospital Internal Communication with SnapComms
Hospital Internal Communication with SnapComms
SnapComms11.4K views
Information Security Awareness Training by Randy Bowman
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman24.1K views

More from DefCamp

Remote Yacht Hacking by
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
1.7K views89 slides
Mobile, IoT, Clouds… It’s time to hire your own risk manager! by
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
974 views167 slides
The Charter of Trust by
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
560 views24 slides
Internet Balkanization: Why Are We Raising Borders Online? by
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
309 views22 slides
Bridging the gap between CyberSecurity R&D and UX by
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
260 views13 slides
Secure and privacy-preserving data transmission and processing using homomorp... by
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
470 views102 slides

More from DefCamp(20)

Remote Yacht Hacking by DefCamp
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
DefCamp1.7K views
Mobile, IoT, Clouds… It’s time to hire your own risk manager! by DefCamp
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
DefCamp974 views
The Charter of Trust by DefCamp
The Charter of TrustThe Charter of Trust
The Charter of Trust
DefCamp560 views
Internet Balkanization: Why Are We Raising Borders Online? by DefCamp
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
DefCamp309 views
Bridging the gap between CyberSecurity R&D and UX by DefCamp
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
DefCamp260 views
Secure and privacy-preserving data transmission and processing using homomorp... by DefCamp
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
DefCamp470 views
Drupalgeddon 2 – Yet Another Weapon for the Attacker by DefCamp
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
DefCamp269 views
Economical Denial of Sustainability in the Cloud (EDOS) by DefCamp
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
DefCamp254 views
Trust, but verify – Bypassing MFA by DefCamp
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
DefCamp323 views
Threat Hunting: From Platitudes to Practical Application by DefCamp
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
DefCamp218 views
Building application security with 0 money down by DefCamp
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
DefCamp179 views
Implementation of information security techniques on modern android based Kio... by DefCamp
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
DefCamp215 views
Lattice based Merkle for post-quantum epoch by DefCamp
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
DefCamp241 views
Timing attacks against web applications: Are they still practical? by DefCamp
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
DefCamp258 views
Tor .onions: The Good, The Rotten and The Misconfigured by DefCamp
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
DefCamp817 views
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t... by DefCamp
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
DefCamp294 views
We will charge you. How to [b]reach vendor’s network using EV charging station. by DefCamp
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
DefCamp443 views
Connect & Inspire Cyber Security by DefCamp
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
DefCamp290 views
The lions and the watering hole by DefCamp
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
DefCamp225 views
Catch Me If You Can - Finding APTs in your network by DefCamp
Catch Me If You Can - Finding APTs in your networkCatch Me If You Can - Finding APTs in your network
Catch Me If You Can - Finding APTs in your network
DefCamp304 views

Recently uploaded

Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...ShapeBlue
59 views13 slides
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
48 views17 slides
Data Integrity for Banking and Financial Services by
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial ServicesPrecisely
76 views26 slides
Future of AR - Facebook Presentation by
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook PresentationRob McCarty
54 views27 slides
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
130 views29 slides
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
113 views18 slides

Recently uploaded(20)

Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... by ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue59 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... by ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue48 views
Data Integrity for Banking and Financial Services by Precisely
Data Integrity for Banking and Financial ServicesData Integrity for Banking and Financial Services
Data Integrity for Banking and Financial Services
Precisely76 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty54 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc130 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue113 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu287 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue by ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue191 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue114 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue172 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software373 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue149 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue93 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue128 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue134 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue120 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue178 views

The challenge of building a secure and safe digital environment in healthcare

  • 2. The challenge of building an secure and safe digital environment in the health care Security isn’t just a tech, but much much more …
  • 5. Why are the hospitals so interesting and attractive for the criminals? More victims at one place Who wants the medical data ? Everyone What they can do ? Too much
  • 6. Discrimination private and at work because of : disease / chronical disease gender religion race sexual orientation making a future profiles Manipulating the price of insurance
  • 7. Except stubborn medical professionals • Marketing • PR • Phisical security • Innovations Sharing is caring Connected but not protected • ICT professionals
  • 14. Personal experience employee can download the documents from different links * IT is giving the password to employee on phone without really checking whit who they really talk. * No limited access for temporary workers PC with medical records connected to public internet Insecure applications for medical records (why connected to the public internet) employee or visitor can use usb or phone charger and connect with PC from the hospital etz
  • 15. Old device & software The contracts vendor-hospital No patch No update No antivirus No proxy Required 24/7 online Connected but not protected #innovations
  • 17. Security in the health care What we think VS reality
  • 20. The System Same as medical professional need to know and understand the system of human body, infosec professionals need to understand the system in healthcare, so they can find real vulnerabilities and can solve them
  • 21. The treatment, you make based on diagnostics The diagnostics, you make based on the result and the information’s When criminals manipulate the results and the information’s You will make wrong diagnostic and wrong treatment’s
  • 22. Communication & Inside Organization of Security department in organization Inside organization Awareness training
  • 24. Security department in organization • Security department independent department • Giving the trainings and communicating with all departments • Mandatory and regular consulting
  • 25. Inside IT organization • Enough security and IT professionals • Mandatory and regular pen testing – independent company • Mandatory and regular testing 1-2 x week using open tools – infosec employee • Responsible disclosure & Bug bounty program
  • 27. for hospital /vendor/manufacturer - digital and online safety - almost 24/7 monitoring - not expensive monitoring - pay by founding or/and repairing - coordinate assist for ethical hacker - passion - no 9 – 17 work - freedom = quality - payed or possibility
  • 29. • Training and building communication and teamwork with departments • Professionals for making the rules for & with departments
  • 30. Awareness Training • Simplicity and as less possible tech • Making the connection between employees and IT • With understanding, employees will easily accept the rules
  • 31. work e-mail ≠ subscribe mail check link check e-mail Oops spoofy e-mail check on browser check ….
  • 34. Consulting infosecurity by default All decision at all departments need to be made with consulting of security department
  • 35. Education & Security by design Students & teachers/professors @ the conferences Extra Workshops & lessons at schools by infosecurity Practicing at Hackerspaces and using CTF CTF competitions
  • 37. Situation now The vendor make conditions that hospital must accept Should be The Hospital make conditions and vendor/everyone must accept
  • 38. The healthcare The security /privacy Supported by IT/Manufacturer/developer backed by the government The policy made by the professionals from:
  • 39. Being complain, doesn’t mean that you are safe and secure
  • 40. Health care without (basic) security is like surgery without sterile instruments The operation was (technically) a success, but the patient died from sepsis … Thank you 

Editor's Notes

  1. You ask ur self why nurse but my colleague more surprised we have best security ever, but that hard truth is ….
  2. More victims at one place the patient the employee the visitor/ third side The data online The targeted assignment the patient the employee the hospital
  3. Talk about the problems there marketing and pr putting fotos sharing info no need innovation data collectors + no one have idea how it works
  4. Even phisicaly security wasn’t good
  5. The problems : Passwords, awareness, connections, informations devices
  6. employee can download the documents from different links * IT is giving the password to employee on phone without really checking whit who they really talk. * No limited access for temporary workers PC with medical records connected to public internet Insecure applications for medical records (why connected to the public internet) employee or visitor can use usb or phone charger and connect with PC from the hospital etz
  7. No infosec professional Even if they are there
  8. About, what we’re thinking , smthng like this –(next slide)
  9. Talk about system patinets – administration/medical staf, different lab for analyzis , rontgen
  10. Conection medical patients, Go to department ask them how they work, CISO Same as Chris said – learn their waya of communication
  11. Training - about
  12. One of the last messages in my previous presentation was Build
  13. Organisation Ppl for testing Ppl for training
  14. What may happen or not
  15. Blaming user while maybe it was spoofy email – almost not one hospital have good email configuration DMARC on reject
  16. You can’t expect that everyone have enough money to have 2fa Password messenger or expect hospital to pay all of it If use mobile phone, need to be secuere phone No money for it – but then not connect evrthng you don’t need
  17. Including teachers and IT schools/universities at the conferences Workshops /lesson at schools Use CTF school and companies CTF competitions between schools / companies
  18. Build security that fit with the system of the company