SlideShare a Scribd company logo
CynergisTek has been recognized by KLAS in the
2016 and 2018 Cybersecurity report as a top
performing firm in healthcare cybersecurity.
CynergisTek won the 2017
Best in KLAS Award for Cyber
Security Advisory Services
CAPP Conference Survey
Cybersecurity & Privacy Threat Landscape
60%
40%
How Involved Is Your Board with
Privacy & Cybersecurity Versus the
Past Few Years ?
More Involved Less Involved About the Same Don't Know
While it is heartening to see that Boards
are paying more attention, it is alarming
that 40% don’t even know if the Board is
more or less involved than they were
previously.
That means CIOs, CISOs, Privacy Officers,
etc., don’t know what their Boards are
hearing, saying, or talking about regarding
privacy and security.
Even though IT budgets and job openings are increasing across the industry, 54% of respondents report
that resources are their biggest barrier to meeting their organization’s privacy and security needs.
Finding the right skillsets at the right price is the issue – that’s what can’t be found in healthcare
security. This, at its root, is a cultural issue for CISOs and security staff: “They don’t give me the tools or
support I need, they pay me less than I could make somewhere else, the organization doesn’t value
security or me. And I’m carrying an awesome responsibility.”
13%
29%
54%
4%
Sr. Managamgent/Buy-In
Accountability
Resources (People, Money, Etc.)
Governance
What Is the Biggest Challenge to Meeting
Your Privacy and Security Needs?
29%
14%
50%
7%
Compensation
Training
Culture
Interesting Assignments
What Is the Most Important Factor for
Retaining Cybersecurity Staff?
Although 40% or respondents indicated that third-party vendors are their biggest risk,
only 60% of the same survey population, are doing both pre- and post- acquisition
evaluations of vendors. This is either a reflection that evaluations of vendors are
inadequate or there is a disconnect between what is being evaluated and the security
team. We believe it is both.
27%
7%
27%
40%
Insiders
Hacking
Social Engineering & Phishing
Third-Party Vendors
What Threat Concerns You the Most?
27%
60%
13%
How Often Do You Review Vendor
Security Evaluations?
Pre-Acq Only Post-Acq Only Both Never
39%
4%
18%
39%
Old Habbits Die Hard
Executive Support
Lack of Resources
Accountablitiy
Biggest Barrier to Changing Culture Is…We’ve already discussed culture in terms of retaining
skilled security staff. Experts in the field agree that
creating a “culture of privacy and security” is critical and
that security and privacy must be both top-down and
bottom-up. This response indicates an equal weight on
the biggest barrier to changing culture between
“Accountability” and “Old Habits Die Hard.”
Accountability, though, is really about changing habits
and empowering people to act - that is culture. Executive
support requires a shift in the habit of downplaying
security at the executive level. That would bring “Old
Habits” to 82%, making it the biggest barrier by far. If
change isn’t in the air, it needs to be. The old ways don’t
protect you adequately.
74%
26%
Medical Device Strategy
Effective Process
Strategy In Place, Not Sure if it's Effective
We Don't Have a Process in Place
Medical devices were one of the top
security concerns and was one of the top
five concerns of the Health Industry
Cybersecurity Practices [the primary
publication of the Cybersecurity Act of
2015, Section 405(d) Task Group prepared
under the auspices of the Dept. of Health
& Human Services].
Additionally no one reported to have an
effective medical device strategy in place
and 26% don’t even have a process in
place.
Never, 28%
Once, 20%
Mutliple Times
Per Year, 28%
Varies, 24%
How Often Do You Conduct
Incident Response Exercises?
How is that in an industry that regularly conducts drills
for airplane crashes, chemical spills, and weather events,
doesn’t include the event much more likely to occur at
the organization and without the warning of weather
forecast?
In 2018, a study found that 77% do not have a formal
cybersecurity incident response plan (CSIRP) applied
consistently across their organization. Nearly half
reported that their incident response plan is either
informal/ad hoc or completely non-existent.*
It’s time to change our habits. Despite the growing
number and type of security threats, only 28% are
conducting routine incident response exercises.
*
Ponemon Institute and sponsored by IBM Resilient, “The 2018 Cyber
Resilient Organization.” March, 2018,
0
48%
41%
11%
Very Prepared
Moderately Prepared
Not Prepared
Unaware
How Prepared Is Your Organization for the New Privacy Rules & Regulations?
The increasing interest in protecting the privacy of individuals’ personal information promises
to impact healthcare systems and warrant robust privacy and security programs in the near
future. Multiple states have passed or have pending privacy legislation. There is growing talk
at the Federal level national privacy legislation. More than half of respondents aren’t sure of
or are not prepared for new privacy regulations. No one was “very” prepared.
11%
67%
11%
11%
Sr. Management/Buy-In
Resources Required to Mature the Program
Effective Analytics
Cost/Budget
What Is the Biggest Barrier to Maturing Your User Access Monitoring
Program?
89% say they can’t get tools, money, or resources for user access monitoring, yet only 11%
indicate the issue is executive level buy-in. If executives were committed to access
monitoring, there would be money, tools, and people. This is a clear indicator that user access
monitoring is not being effectively communicated to senior leadership as a business issue that
has operational and patient care impacts. And it does.
AI
22%
5G
4%
Supply
Chain
22%
IoT
52%
Which Emerging Threat Worries
You the Most?
Beyond the all-too-common attacks on healthcare,
we are already seeing accelerated threat activity
from new quarters.
So, what can we expect on the cybersecurity front
looking ahead? These are some of the trends and
activities most likely to affect healthcare in 2019
and beyond.
• Attackers will exploit artificial intelligence (AI)
systems and use AI to aid assaults
• Among the most troubling will be attacks against IoT
devices that bridge the digital and physical worlds
(security, medical devices, sensors)
• Attackers will find new and more sophisticated
opportunities to infiltrate the supply chain of
organizations they are targeting
11
Questions?
info@cynergistek.com
512.402-8550

More Related Content

What's hot

2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
IDG
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
Advent IM Ltd
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax Technology
 
2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey
Adobe
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
IDG
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
LexisNexis Risk Solutions
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
Bee_Ware
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
Haystax Technology
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
Booz Allen Hamilton
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
IBM Security
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
Jeremiah Grossman
 
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019
ValentinGarcia32
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
Symantec
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Jeremiah Grossman
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
Booz Allen Hamilton
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
IDG
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Marcello Marchesini
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
CMR WORLD TECH
 

What's hot (18)

2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
 
2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey2018 Adobe Cybersecurity Survey
2018 Adobe Cybersecurity Survey
 
2018 Security Priorities
2018 Security Priorities 2018 Security Priorities
2018 Security Priorities
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
Website Security Statistics Report 2013
Website Security Statistics Report 2013Website Security Statistics Report 2013
Website Security Statistics Report 2013
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Strengthening Security with Continuous Monitoring
Strengthening Security with Continuous MonitoringStrengthening Security with Continuous Monitoring
Strengthening Security with Continuous Monitoring
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019Telindus cybersecurity survey_report_2019
Telindus cybersecurity survey_report_2019
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
2018 Global State of Information Security Survey
2018 Global State of Information Security Survey2018 Global State of Information Security Survey
2018 Global State of Information Security Survey
 
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
 
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
Sans survey - maturing - specializing-incident-response-capabilities-needed-p...
 

Similar to CAPP Conference Survey

2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
patmisasi
 
2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report
Hewlett Packard Enterprise Business Value Exchange
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016
Bryan Smith
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
Symantec
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
Fiona Lew
 
2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey
Rob Raleigh
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
Accenture Operations
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
Joseph DeFever
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
LeilaniPoolsy
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2
Stephanie Crates
 
Achieving Holistic Cybersecurity: 2016 Progress Report
Achieving Holistic Cybersecurity: 2016 Progress ReportAchieving Holistic Cybersecurity: 2016 Progress Report
Achieving Holistic Cybersecurity: 2016 Progress Report
Gov BizCouncil
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
Abhishek Sood
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
Gartner Peer Insights
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
FERMA
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
Precisely
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
Capgemini
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 

Similar to CAPP Conference Survey (20)

2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary2016 Scalar Security Study Executive Summary
2016 Scalar Security Study Executive Summary
 
2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report2014 Executive Breach Preparedness Research Report
2014 Executive Breach Preparedness Research Report
 
Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016Harvey Nash UK & IRE Cyber Security Survey 2016
Harvey Nash UK & IRE Cyber Security Survey 2016
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Please read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docxPlease read the instructions and source that provided, then decide.docx
Please read the instructions and source that provided, then decide.docx
 
Cyber_security_survey201415_2
Cyber_security_survey201415_2Cyber_security_survey201415_2
Cyber_security_survey201415_2
 
Achieving Holistic Cybersecurity: 2016 Progress Report
Achieving Holistic Cybersecurity: 2016 Progress ReportAchieving Holistic Cybersecurity: 2016 Progress Report
Achieving Holistic Cybersecurity: 2016 Progress Report
 
VIPRE --Responding to Cyberattacks
VIPRE --Responding to CyberattacksVIPRE --Responding to Cyberattacks
VIPRE --Responding to Cyberattacks
 
Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022Cybersecurity Quarterly Benchmarks Q1 2022
Cybersecurity Quarterly Benchmarks Q1 2022
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
The Currency of Trust: Why Banks and Insurers Must Make Customer Data Safer a...
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 

Recently uploaded

Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
AndrzejJarynowski
 
Enhancing Hip and Knee Arthroplasty Precision with Preoperative CT and MRI Im...
Enhancing Hip and Knee Arthroplasty Precision with Preoperative CT and MRI Im...Enhancing Hip and Knee Arthroplasty Precision with Preoperative CT and MRI Im...
Enhancing Hip and Knee Arthroplasty Precision with Preoperative CT and MRI Im...
Pristyn Care Reviews
 
Test bank clinical nursing skills a concept based approach 4e pearson educati...
Test bank clinical nursing skills a concept based approach 4e pearson educati...Test bank clinical nursing skills a concept based approach 4e pearson educati...
Test bank clinical nursing skills a concept based approach 4e pearson educati...
rightmanforbloodline
 
EXAMINATION OF HUMAN URINE AND FAECES.pdf
EXAMINATION OF HUMAN URINE AND FAECES.pdfEXAMINATION OF HUMAN URINE AND FAECES.pdf
EXAMINATION OF HUMAN URINE AND FAECES.pdf
Madhusmita Sahoo
 
National Rural Health Mission(NRHM).pptx
National Rural Health Mission(NRHM).pptxNational Rural Health Mission(NRHM).pptx
National Rural Health Mission(NRHM).pptx
Jyoti Chand
 
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
Kumar Satyam
 
English Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptxEnglish Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptx
MatSouthwell1
 
The Importance of Black Women Understanding the Chemicals in Their Personal C...
The Importance of Black Women Understanding the Chemicals in Their Personal C...The Importance of Black Women Understanding the Chemicals in Their Personal C...
The Importance of Black Women Understanding the Chemicals in Their Personal C...
bkling
 
Fit to Fly PCR Covid Testing at our Clinic Near You
Fit to Fly PCR Covid Testing at our Clinic Near YouFit to Fly PCR Covid Testing at our Clinic Near You
Fit to Fly PCR Covid Testing at our Clinic Near You
NX Healthcare
 
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
Kumar Satyam
 
Monopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in TripuraMonopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in Tripura
SKG Internationals
 
Health Tech Market Intelligence Prelim Questions -
Health Tech Market Intelligence Prelim Questions -Health Tech Market Intelligence Prelim Questions -
Health Tech Market Intelligence Prelim Questions -
Gokul Rangarajan
 
FACIAL NERVE
FACIAL NERVEFACIAL NERVE
FACIAL NERVE
aditigupta1117
 
Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.
Vishal kr Thakur
 
Daughter's of Dr Ranjit Jagtap (Poulami & Aditi)
Daughter's of Dr Ranjit Jagtap (Poulami & Aditi)Daughter's of Dr Ranjit Jagtap (Poulami & Aditi)
Daughter's of Dr Ranjit Jagtap (Poulami & Aditi)
Aditi Jagtap Pune
 
Sectional dentures for microstomia patients.pptx
Sectional dentures for microstomia patients.pptxSectional dentures for microstomia patients.pptx
Sectional dentures for microstomia patients.pptx
SatvikaPrasad
 
Know Latest Hiranandani Hospital Powai News.pdf
Know Latest Hiranandani Hospital Powai News.pdfKnow Latest Hiranandani Hospital Powai News.pdf
Know Latest Hiranandani Hospital Powai News.pdf
Dr. Sujit Chatterjee CEO Hiranandani Hospital
 
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
DrDevTaneja1
 
Data-Driven Dispensing- Rise of AI in Pharmacies.pdf
Data-Driven Dispensing- Rise of AI in Pharmacies.pdfData-Driven Dispensing- Rise of AI in Pharmacies.pdf
Data-Driven Dispensing- Rise of AI in Pharmacies.pdf
Jasper Colin
 
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdfchatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
marynayjun112024
 

Recently uploaded (20)

Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
 
Enhancing Hip and Knee Arthroplasty Precision with Preoperative CT and MRI Im...
Enhancing Hip and Knee Arthroplasty Precision with Preoperative CT and MRI Im...Enhancing Hip and Knee Arthroplasty Precision with Preoperative CT and MRI Im...
Enhancing Hip and Knee Arthroplasty Precision with Preoperative CT and MRI Im...
 
Test bank clinical nursing skills a concept based approach 4e pearson educati...
Test bank clinical nursing skills a concept based approach 4e pearson educati...Test bank clinical nursing skills a concept based approach 4e pearson educati...
Test bank clinical nursing skills a concept based approach 4e pearson educati...
 
EXAMINATION OF HUMAN URINE AND FAECES.pdf
EXAMINATION OF HUMAN URINE AND FAECES.pdfEXAMINATION OF HUMAN URINE AND FAECES.pdf
EXAMINATION OF HUMAN URINE AND FAECES.pdf
 
National Rural Health Mission(NRHM).pptx
National Rural Health Mission(NRHM).pptxNational Rural Health Mission(NRHM).pptx
National Rural Health Mission(NRHM).pptx
 
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
 
English Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptxEnglish Drug and Alcohol Commissioners June 2024.pptx
English Drug and Alcohol Commissioners June 2024.pptx
 
The Importance of Black Women Understanding the Chemicals in Their Personal C...
The Importance of Black Women Understanding the Chemicals in Their Personal C...The Importance of Black Women Understanding the Chemicals in Their Personal C...
The Importance of Black Women Understanding the Chemicals in Their Personal C...
 
Fit to Fly PCR Covid Testing at our Clinic Near You
Fit to Fly PCR Covid Testing at our Clinic Near YouFit to Fly PCR Covid Testing at our Clinic Near You
Fit to Fly PCR Covid Testing at our Clinic Near You
 
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
 
Monopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in TripuraMonopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in Tripura
 
Health Tech Market Intelligence Prelim Questions -
Health Tech Market Intelligence Prelim Questions -Health Tech Market Intelligence Prelim Questions -
Health Tech Market Intelligence Prelim Questions -
 
FACIAL NERVE
FACIAL NERVEFACIAL NERVE
FACIAL NERVE
 
Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.Hypertension and it's role of physiotherapy in it.
Hypertension and it's role of physiotherapy in it.
 
Daughter's of Dr Ranjit Jagtap (Poulami & Aditi)
Daughter's of Dr Ranjit Jagtap (Poulami & Aditi)Daughter's of Dr Ranjit Jagtap (Poulami & Aditi)
Daughter's of Dr Ranjit Jagtap (Poulami & Aditi)
 
Sectional dentures for microstomia patients.pptx
Sectional dentures for microstomia patients.pptxSectional dentures for microstomia patients.pptx
Sectional dentures for microstomia patients.pptx
 
Know Latest Hiranandani Hospital Powai News.pdf
Know Latest Hiranandani Hospital Powai News.pdfKnow Latest Hiranandani Hospital Powai News.pdf
Know Latest Hiranandani Hospital Powai News.pdf
 
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
Digital Health in India_Health Informatics Trained Manpower _DrDevTaneja_15.0...
 
Data-Driven Dispensing- Rise of AI in Pharmacies.pdf
Data-Driven Dispensing- Rise of AI in Pharmacies.pdfData-Driven Dispensing- Rise of AI in Pharmacies.pdf
Data-Driven Dispensing- Rise of AI in Pharmacies.pdf
 
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdfchatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
 

CAPP Conference Survey

  • 1. CynergisTek has been recognized by KLAS in the 2016 and 2018 Cybersecurity report as a top performing firm in healthcare cybersecurity. CynergisTek won the 2017 Best in KLAS Award for Cyber Security Advisory Services CAPP Conference Survey Cybersecurity & Privacy Threat Landscape
  • 2. 60% 40% How Involved Is Your Board with Privacy & Cybersecurity Versus the Past Few Years ? More Involved Less Involved About the Same Don't Know While it is heartening to see that Boards are paying more attention, it is alarming that 40% don’t even know if the Board is more or less involved than they were previously. That means CIOs, CISOs, Privacy Officers, etc., don’t know what their Boards are hearing, saying, or talking about regarding privacy and security.
  • 3. Even though IT budgets and job openings are increasing across the industry, 54% of respondents report that resources are their biggest barrier to meeting their organization’s privacy and security needs. Finding the right skillsets at the right price is the issue – that’s what can’t be found in healthcare security. This, at its root, is a cultural issue for CISOs and security staff: “They don’t give me the tools or support I need, they pay me less than I could make somewhere else, the organization doesn’t value security or me. And I’m carrying an awesome responsibility.” 13% 29% 54% 4% Sr. Managamgent/Buy-In Accountability Resources (People, Money, Etc.) Governance What Is the Biggest Challenge to Meeting Your Privacy and Security Needs? 29% 14% 50% 7% Compensation Training Culture Interesting Assignments What Is the Most Important Factor for Retaining Cybersecurity Staff?
  • 4. Although 40% or respondents indicated that third-party vendors are their biggest risk, only 60% of the same survey population, are doing both pre- and post- acquisition evaluations of vendors. This is either a reflection that evaluations of vendors are inadequate or there is a disconnect between what is being evaluated and the security team. We believe it is both. 27% 7% 27% 40% Insiders Hacking Social Engineering & Phishing Third-Party Vendors What Threat Concerns You the Most? 27% 60% 13% How Often Do You Review Vendor Security Evaluations? Pre-Acq Only Post-Acq Only Both Never
  • 5. 39% 4% 18% 39% Old Habbits Die Hard Executive Support Lack of Resources Accountablitiy Biggest Barrier to Changing Culture Is…We’ve already discussed culture in terms of retaining skilled security staff. Experts in the field agree that creating a “culture of privacy and security” is critical and that security and privacy must be both top-down and bottom-up. This response indicates an equal weight on the biggest barrier to changing culture between “Accountability” and “Old Habits Die Hard.” Accountability, though, is really about changing habits and empowering people to act - that is culture. Executive support requires a shift in the habit of downplaying security at the executive level. That would bring “Old Habits” to 82%, making it the biggest barrier by far. If change isn’t in the air, it needs to be. The old ways don’t protect you adequately.
  • 6. 74% 26% Medical Device Strategy Effective Process Strategy In Place, Not Sure if it's Effective We Don't Have a Process in Place Medical devices were one of the top security concerns and was one of the top five concerns of the Health Industry Cybersecurity Practices [the primary publication of the Cybersecurity Act of 2015, Section 405(d) Task Group prepared under the auspices of the Dept. of Health & Human Services]. Additionally no one reported to have an effective medical device strategy in place and 26% don’t even have a process in place.
  • 7. Never, 28% Once, 20% Mutliple Times Per Year, 28% Varies, 24% How Often Do You Conduct Incident Response Exercises? How is that in an industry that regularly conducts drills for airplane crashes, chemical spills, and weather events, doesn’t include the event much more likely to occur at the organization and without the warning of weather forecast? In 2018, a study found that 77% do not have a formal cybersecurity incident response plan (CSIRP) applied consistently across their organization. Nearly half reported that their incident response plan is either informal/ad hoc or completely non-existent.* It’s time to change our habits. Despite the growing number and type of security threats, only 28% are conducting routine incident response exercises. * Ponemon Institute and sponsored by IBM Resilient, “The 2018 Cyber Resilient Organization.” March, 2018,
  • 8. 0 48% 41% 11% Very Prepared Moderately Prepared Not Prepared Unaware How Prepared Is Your Organization for the New Privacy Rules & Regulations? The increasing interest in protecting the privacy of individuals’ personal information promises to impact healthcare systems and warrant robust privacy and security programs in the near future. Multiple states have passed or have pending privacy legislation. There is growing talk at the Federal level national privacy legislation. More than half of respondents aren’t sure of or are not prepared for new privacy regulations. No one was “very” prepared.
  • 9. 11% 67% 11% 11% Sr. Management/Buy-In Resources Required to Mature the Program Effective Analytics Cost/Budget What Is the Biggest Barrier to Maturing Your User Access Monitoring Program? 89% say they can’t get tools, money, or resources for user access monitoring, yet only 11% indicate the issue is executive level buy-in. If executives were committed to access monitoring, there would be money, tools, and people. This is a clear indicator that user access monitoring is not being effectively communicated to senior leadership as a business issue that has operational and patient care impacts. And it does.
  • 10. AI 22% 5G 4% Supply Chain 22% IoT 52% Which Emerging Threat Worries You the Most? Beyond the all-too-common attacks on healthcare, we are already seeing accelerated threat activity from new quarters. So, what can we expect on the cybersecurity front looking ahead? These are some of the trends and activities most likely to affect healthcare in 2019 and beyond. • Attackers will exploit artificial intelligence (AI) systems and use AI to aid assaults • Among the most troubling will be attacks against IoT devices that bridge the digital and physical worlds (security, medical devices, sensors) • Attackers will find new and more sophisticated opportunities to infiltrate the supply chain of organizations they are targeting