SlideShare a Scribd company logo
1 of 28
Download to read offline
MAJOR CYBER ATTACKS IN HEALTHCARE INDUSTRY
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly
Prohibited. Compliant Resilient Competitive
AvMed, Inc.
1,2 M victims
2009, U.S.
BlueCross
BlueShield of Tennessee
1 M victims
2009, U.S.
North Bronx
Healthcare Network
1,7 M victims
2010, U.S.
The Nemours
Foundation
1 M victims
2011, U.S.
TRICARE
Management
Activity
4,9 M victims
2011, U.S.
Health Net, Inc.
1,9 M victims
2011, U.S.
Advocate
Medical Group
4 M victims
2013, U.S.
Community Health
Systems
4,5 M victims
2014, U.S.
Anthem, Inc.
80 M victims
2015, U.S.
Banner Health
3,62 M victims
2016, U.S.
Newkirk Products
Inc
3,47 M victims
2016, U.S.
21 Century
Oncology Holdings
2,21 M victims
2016, U.S.
More than 150,000*
victims of cyber
breaches in healthcare
sector in January 2017,
U.S. (*HHS)
25 breaches affecting
500+ individuals were
recorded by HHS in
January 2017 in U.S.
Partnering With
EC-Council
World’s Largest Cyber Security Consulting, Professional Training &
Certification Body
CYBER RISK IN HEALTHCARE INDUSTRY
is an estimated cost for cyberattacks against
hospitals, clinics and doctors in the U.S. healthcare
industry (Ponemon Institute).
$6
billion
$200-400
83%
It has already been two years since hackers shifted their main focus from BFSI
sector to healthcare industry aggressively targeting hospitals all over the world,
while U.S. is experiencing the most severe threat.
The FBI warned
the healthcare industry
that cyber-criminals would be
directing more attention
their way.
News.security-intelligence,
2015
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Compliant Resilient Competitive
of recorded breaches in 2016 were in the medical and
healthcare industries (Identity Theft Resource Center).
6
The healthcare sector
is the most vulnerable
industry to cyber-attacks
and data breaches.
ICO, Data security incident
trends, 2016
of the U.S. population (143+ M people) have become
victims of cyber breaches in healthcare industry in 5 years
(U.S. Department of Health and Human Services, 2015).
45%
per one record (client profile) is an estimates cost to
remediate a healthcare breach (Vasco).
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Compliant Resilient Competitive
• Inability to operate
• Financial losses
• Damage to reputation
3. SYSTEMS’ BREAKDOWN
• Health risk
• Identity theft
• Financial fraud
2. UNAUTHORISED CHANGES IN DATA BASES
OUTCOME OF CYBER ATTACKS IN HEALTHCARE INDUSTRY
1. LOSS OF CUSTOMERS’ DATA
(Security number, insurance ID, credit card
number, passport, address, biometric data,
medical history, etc.)
FOR HOSPITALS:FOR PATIENTS:
65%
of people would avoid
healthcare provides that
experience a data breach.
Among adults below 35 years
the statistic is 73%.
(TransUnionHealthcare, 2015)
It is a primary responsibility of
the management to prevent
the industry from cyber breaches
and to protect its patients from
physical, financial and mental
damages caused
by cyber attacks.
(Cancelled operations, outpatient appointments
and diagnostic procedures, etc.)
(Prescription of wrong medications and treatments, etc.)
HEALTHCARE DATA BREACHES - IMPACT
~90% of healthcare organizations had a data
breach in the past 2 years according to Ponemon’s
research.
45% of them had more than 5 data breaches.
(Ponemon Institute LLC Ponemon Institute
Research Report. Sixth Annual Benchmark Study
on Privacy & Security of Healthcare Data, 2016).
$3,7M
$1,1M
$0,9M
$0,6M
$0,6M
$0,5M
$0,4M
Lost brand
value
Breach
notification
Forensics
Lawsuits
HIPPA
settlement
fine
Lost revenue
Post-breach
clean-up
AVERAGE COSTS OF A DATA BREACH
IN THE U.S. HEALTHCARE INDUSRTY*
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Compliant Resilient Competitive
*Protenus ‘Cost of a Breach: A Business Case for Proactive Privacy Analytics”
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
WHERE CYBER RISKS LIE FOR HEALTHCARE INDUSTRY
Compliant Resilient Competitive
9
SaaS
Insider
Threats
Data
Bases
File
Server
Compliance
Patient Data
Applications
Network IntrusionSocial Engineering
Unauthorized Access
Espionage
Malware
Phishing Attacks
Ransomware
Network Attack
Hospital
The healthcare industry is holding
the #1 spot in a lack of qualified
cyber security professionals.
Job Market Intelligence:
Cybersecurity Jobs, 2015
Ensuring that the healthcare C-suites have necessary cybersecurity skills is the
only way to create a strong data security approach. It is vital for a healthcare
provider to maintain cyber security awareness and most up-to-date cyber
security skills among all employees.
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Last year the Department of
Health and Human Services
awarded $87 million to 1,310
health centers across the U.S. to
upgrade their IT systems and
cyber security skills.
Compliant Resilient Competitive
13
of healthcare providers have no human resources dedicated
to cyber security (Healthcare Information & Management
Systems Society, 2016).
58%
‘’There is a rising demand for
cybersecurity professionals with
skills pertinent to healthcare’’
(Healthcare-informatics.com, 2015).
‘’A cybersecurity skills shortage
may eventually affect the healthcare
industry’’ (McAfee’s Hacking the
Skills Shortage, 2016).
CYBER SECURITY SKILL GAP IN THE HEALTHCARE SECTOR
Cyber Security
Awareness,
Upskilling and
Training
Compliance with
Regulations
(HIPPA and PCI)
Coverage of Cyber
Security Gaps in the
Infrastructure
Cyber Security
Risk Assessment
EC-COUNCIL APPROACH FOR HEALTHCARE INDUSTRIES
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Compliant Resilient Competitive
WE BUILD CORE HANDS-ON ON INFORMATION SECURITY
SKILLS FOR ALL LEVELS AND DEPARTMENTS
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive
CyberSecurityexperience,knowledgeandskills
For Information security Officers,
Information Security Decision Makers
For various specialties, Computer Forensics, Pen
Testing, Mobile Forensics
For Information Security Officers, Pen Testers, Information
System Security Auditors, Information Security Auditors,
Incidents Handlers, Persons responsible for defending
systems, networks and application
For various specialties, Forensics Investigators,
Incident Handlers, Disaster Recovery Professional
For Network Administrator, Network Engineer, CND
Analyst, Network Defense Technician, Network Security
Analyst, Security Operators, anyone who is in network
operations
For end-users: anyone who uses the
Internet extensively to work
EC-Council Global Services (EGS) is the
consultation arm of the EC-Council
Group.
• EGS is an advisory firm that provides
customized and tailored solutions to
complex challenges in Corporate
Information Security.
• EGS is vendor-agnostic and
technology-solutions market
independent entity.
• EGS is based in Malaysia and has
an outstanding local team supported
globally.
IDENTIFY
1.Cyber
Security Posture
Assessment
2.Security
Strategy and
Transformation
3.Vendor Risk
Management
PROTECT
IT Governance
IT Risk
Assessment
ISO 27001
Advisory
PCI-DSS
Advisory
Managed
Security
Services
Identity &
Access
Management
Training
Data Privacy
DETECT
Vulnerability
Assessment &
Penetration
Testing
Secure Code
Review
Secure
Software
Development
Lifecycle
Cloud Security
Software
License
Compliance
Revenue
Assurance
RESPOND
Security
Incident and
Event
Management
(SIEM)
Security
Operations
(SOC)
RECOVER
Business
Continuity
Management
Disaster
Recovery
Planning
Forensics
Services
Compliant Resilient Competitive
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
OUR INFORMATION SECURITY CONSULTING AND
ADVISORY SERVICES
HIPAA SECURITY AND PRIVACY
 HIPAA is the Health Insurance Portability and Accountability
Act, a federal law that…
• Protects the privacy of a patient’s personal and health
information (PII & PHI)
• Provides for electronic and physical security of personal and
health information
• Simplifies billing and other transactions
 Covered entities must protect an individual’s personal and
health information that:
• Is created, kept, filed, used or shared
• Is written, spoken, or electronic
EC-COUNCIL’S DETAILED
HIPAA METHODOLGY AND
OFFERING IS PROVIDED IN
APPENDIX A TOWARDS THE
END OF THE DOCUMENT
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive
ABOUT
EC-COUNCIL
World’s Largest Cyber Security Consulting, Professional Training &
Certification Body
ICECC
International Council of E-Commerce
Consultants
EC-Council Group
ECCU
EC-Council University
Division of Academic Education
ECC
EC-Council Training & Certification
Division of Professional Workforce Development
EGS
EC-Council Global Services
Division of Corporate Consulting & Advisory
Services
EGE
EC-Council Global Events
Division of Conferences, Forums, Summits,
Workshops & Industry Awards
ECF
EC-Council Foundation
Non-Profit Organization for Cyber Security
Awareness Increase.
16+ YEARS EXPERIENCE
40+ TRAINING & CERTIFICATION PROGRAMS
145+ COUNTRIES
350+ SUBJECT MATTER EXPERTS
700+ TRAINING PARTNERS WORLDWIDE
3000 TOOLS & TECHNOLOGIES
150,000 CERTIFIED MEMBERS
EC-Council is known as
worlds’ largest technical
certification body. It is also
famous for being a creator of
Certified Ethical Hacker and
LPT standards.
Some of the finest
organizations around the
world such as the U.S. Army,
U.S. Navy, DoD, the FBI,
Microsoft, IBM, and the United
Nations have trusted ECC to
develop and advance their
security infrastructure.
WE ARE
INFORMATION
SECURITY
EC-COUNCIL AT A GLANCE
WE WROTE
THE STANDARDS
Compliant Resilient CompetitiveCopyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
Critical Information Security
Skill Development Solutions
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
WE BUILD CORE HANDS-ON ON INFORMATION
SECURITY SKILLS FOR ALL LEVELS AND DEPARTMENTS
• Often 70% Of An Organization's InfoSec Challenges Are Addressed By Just Investing In Upskilling
Their Staff With The Information Security Hands-on Skills.
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive
EC-Council HIPAA Offering
Appendix A
HEALTHCARE BUSINESS CONCERNS
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
1. Protect patient records
2. Maintain compliance with HIPAA standards for retention, recoverability & security
3. Healthcare data is stored in cloud hosted SaaS solutions
4. Secure Communication about patient information
5. Business partner/vendor integration
6. Protect employee healthcare records
7. Provide training to employees
8. Avoid fines from the government
9. Maintain brand and reputation
10. Minimize customer loss
WHY HIPAA STANDARDS?
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
 Collaboration
Engage with business partners, suppliers, and customers
 Speed
Deploy faster by integrating with existing systems
 Agility
Adapt to changing business needs faster
 Accessibility
Data available and useable today, tomorrow,
years from now
 Cost
Reduce acquisition and operating costs
 Protection
Provide a standard level of protection around
protected health information (PHI)
HEALTHCARE – WHAT DO WE HAVE TO OFFER?
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
1. Training and development for IT, Risk, Compliance and Security teams.
2. HIPAA Security and Privacy Assessment
3. Hospital Physical Security Assessment
4. IT GAP Analysis
5. Employee Training
6. Data Loss Prevention
7. Policy Development
8. Healthcare Application Security Test
9. HIPAA HHS Audit Readiness Assessment
EXAMPLE USE CASES FOR DATA PROTECTION NEEDS
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
 Accounting departments needs to:
Share encrypted files with customers
 Legal departments needs to:
Block all staff from saving data to USB flash drives
Share encrypted data on CDs / DVDs
Shared cloud storage
 Retail organizations needs to:
Block unauthorized software from work computers
Prevent all data from being transferred via any port or
connection to customers over insecure channels
 Hospitals needs to:
Allow select usage of doctors’ smartphones
Log all data exchanged between devices and hospital network for compliance
WHERE IS YOUR CORPORATE PROTECTED DATA?
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
 Convenience and storage
USB flash drives, CDs, DVDs, Bluetooth-enabled devices, etc.
Devices used for transferring and storage of data, music, pictures, etc.
Everything is kept in email
 More mobile data, more data to lose
Users retain everything by default
Users transfer data between endpoint devices and corporate network
Mobility increases risk of theft and accidental loss of data
 Prevent a data breach
Monitor and enforce data loss prevention on removable media, mobile disks
and connections
Control device usage and log activity
COMPLIANCE: HISTORICALLY COSTLY & DIFFICULT
TO IMPLEMENT
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
 Enforcement
Policy compliance required manual user &
administrator intervention
 User Training
New deployments required additional training due
to significant user impact
 Administrative Burden
Differing management interfaces & demands for
enrollment administration
 Patch Management
Each application creates an additional patch
burden when updated
 Mobile / Online applications
Each application is a point solution without
common administration & policy
 Integration
Lack of common integration & configuration
with existing infrastructure
DATA PROTECTION IMPLEMENTATION CHALLENGES
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
 Corporate access to data
Employee dismissal cannot result in data loss
 Central deployment, management, & updates
How can thousands of distributed users be tracked and managed?
Software installation can be uncontrolled
 Initial & ongoing management cost
Constrained by existing IT resources
Can compliance grow with the business?
 User experience
What additional user processes are required?
Cannot rely on users to make security decisions
Non-disruptive implementation is essential
HIPAA SECURITY ASSESSMENTS
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
POLICY AND PROCESS
(Security Posture Creation)
ASSESSMENT
(Security Posture Maintenance)
SECURITY POLICY DEVELOPMENT VULNERABILITY
SECURITY STRATEGY
GAP ANALYSIS
(Where you are vs. Where you need to be)
TEMPORARY CSO
AUDIT & COMPLIANCE
(HIPPA, PCI, SOX, etc.)
ROADMAP STRATEGY WEB APPLICATION
EMPLOYEE AWARENESS TRAINING SUPPLIER SECURITY
QUESTIONS FOR YOUR HOSPITAL OR CLINIC
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
 Security architecture
Can the compliance framework provide an encryption
platform that can expand to accommodate additional
applications?
 Comprehensive protection
Can the compliance solution comprehensively protect
sensitive data without tremendous administrative overhead
or changes to user behavior?
 Security management
Can the compliance framework be efficiently managed by
using an integrated management processes?
 Application risk
What other applications / products will need to be installed /
deployed as part of the total enterprise framework strategy?
DO YOU NEED TO INVEST IN INFORMATION SECURITY
TRAINING, CONSULTING AND ADVISORY
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
 Does the organization allow removable devices such as CDs, USB drives, etc.?
 Is there a corporate policy on information security and HIPAA Privacy and Security?
 Do you want to keep track of where and how confidential data is transferred onto portable
media?
 Do you have a lot of users who work offline / are disconnected from the corporate
network?
 How do you protect data within/leaving your enterprise (laptops, email, servers, mobile)?
 What are the consequences if data is stolen or compromised?
Company brand damage?
Lost customers?
Regulatory fines?
 How do you control access to information based on the different roles within the
organization, for example across-departments, with contractors, etc?
CONTACT US
Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
MARK MERRILL
Executive Sales & Business Development
| Global Services
EC-Council Global Services:
An EC-Council Division
markm@altselli.com
Web:
http://www.eccouncil.org
http://www.eccgs.com
US Cell : +1.(817).821.4200
THANK YOU

More Related Content

What's hot

Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxRSAArcher
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringPrem Lamsal
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection PresentationMustafash79
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection schemeMussavir Shaikh
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Chapter 6: Social Media Metrics and Analytics
Chapter 6: Social Media Metrics and AnalyticsChapter 6: Social Media Metrics and Analytics
Chapter 6: Social Media Metrics and AnalyticsZakey Peterson
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident ResponsePECB
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementCA Technologies
 

What's hot (20)

Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Intrusion Detection Presentation
Intrusion Detection PresentationIntrusion Detection Presentation
Intrusion Detection Presentation
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Phishing detection & protection scheme
Phishing detection & protection schemePhishing detection & protection scheme
Phishing detection & protection scheme
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Insider threat v3
Insider threat v3Insider threat v3
Insider threat v3
 
Chapter 6: Social Media Metrics and Analytics
Chapter 6: Social Media Metrics and AnalyticsChapter 6: Social Media Metrics and Analytics
Chapter 6: Social Media Metrics and Analytics
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
 

Viewers also liked

Portföy Yönetiminde VİOP Ürünlerinin Kullanımı
Portföy Yönetiminde VİOP Ürünlerinin KullanımıPortföy Yönetiminde VİOP Ürünlerinin Kullanımı
Portföy Yönetiminde VİOP Ürünlerinin KullanımıBorsa İstanbul
 
Portföy Yönetiminde VİOP Ürünlerinin Kullanımı
Portföy Yönetiminde VİOP Ürünlerinin KullanımıPortföy Yönetiminde VİOP Ürünlerinin Kullanımı
Portföy Yönetiminde VİOP Ürünlerinin KullanımıBorsa İstanbul
 
Mha 690 confidentiality - peric
Mha 690   confidentiality - pericMha 690   confidentiality - peric
Mha 690 confidentiality - pericDMPeric72
 
Credentials
CredentialsCredentials
Credentialsdoorstep
 
DME Billing Services
DME Billing ServicesDME Billing Services
DME Billing ServicesKaran Jagwani
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber WorldEmil Tan
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Thomas Lee
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the CyberspaceEmil Tan
 
A Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on CybersecurityA Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on CybersecurityEmil Tan
 
Ram motivação de voluntários
Ram motivação de voluntáriosRam motivação de voluntários
Ram motivação de voluntáriosPsicologia_2015
 
Teoría de complejidad computacional (tcc).pptx
Teoría de complejidad computacional (tcc).pptxTeoría de complejidad computacional (tcc).pptx
Teoría de complejidad computacional (tcc).pptxYared Redman
 
Validadores Digitale.
Validadores Digitale.Validadores Digitale.
Validadores Digitale.Sara Camacho
 
How to be successful in engaging your workforce david keane
How to be successful in engaging your workforce   david keaneHow to be successful in engaging your workforce   david keane
How to be successful in engaging your workforce david keaneSukhia Tuimaleali'ifano Go
 

Viewers also liked (19)

I Jornadas sobre la responsabilidad penal de las empresas
I Jornadas sobre la responsabilidad penal de las empresas I Jornadas sobre la responsabilidad penal de las empresas
I Jornadas sobre la responsabilidad penal de las empresas
 
Portföy Yönetiminde VİOP Ürünlerinin Kullanımı
Portföy Yönetiminde VİOP Ürünlerinin KullanımıPortföy Yönetiminde VİOP Ürünlerinin Kullanımı
Portföy Yönetiminde VİOP Ürünlerinin Kullanımı
 
Portföy Yönetiminde VİOP Ürünlerinin Kullanımı
Portföy Yönetiminde VİOP Ürünlerinin KullanımıPortföy Yönetiminde VİOP Ürünlerinin Kullanımı
Portföy Yönetiminde VİOP Ürünlerinin Kullanımı
 
Mha 690 confidentiality - peric
Mha 690   confidentiality - pericMha 690   confidentiality - peric
Mha 690 confidentiality - peric
 
Credentials
CredentialsCredentials
Credentials
 
DME Billing Services
DME Billing ServicesDME Billing Services
DME Billing Services
 
Doorstep Health Services Pvt Ltd
Doorstep Health Services Pvt LtdDoorstep Health Services Pvt Ltd
Doorstep Health Services Pvt Ltd
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 
Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.Cyber Loss Model for the cost of a data breach.
Cyber Loss Model for the cost of a data breach.
 
Stalking in the Cyberspace
Stalking in the CyberspaceStalking in the Cyberspace
Stalking in the Cyberspace
 
A Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on CybersecurityA Multidisciplinary Perspective on Cybersecurity
A Multidisciplinary Perspective on Cybersecurity
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Doorstep Health Services Pvt Ltd
Doorstep Health Services Pvt Ltd Doorstep Health Services Pvt Ltd
Doorstep Health Services Pvt Ltd
 
Ram motivação de voluntários
Ram motivação de voluntáriosRam motivação de voluntários
Ram motivação de voluntários
 
Teoría de complejidad computacional (tcc).pptx
Teoría de complejidad computacional (tcc).pptxTeoría de complejidad computacional (tcc).pptx
Teoría de complejidad computacional (tcc).pptx
 
Validadores Digitale.
Validadores Digitale.Validadores Digitale.
Validadores Digitale.
 
Pfd Embotelladora en Scada
Pfd Embotelladora en ScadaPfd Embotelladora en Scada
Pfd Embotelladora en Scada
 
How to be successful in engaging your workforce david keane
How to be successful in engaging your workforce   david keaneHow to be successful in engaging your workforce   david keane
How to be successful in engaging your workforce david keane
 

Similar to Cyber Risk in Healthcare Industry- Are you Protected?

Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)U.S. News Healthcare of Tomorrow
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...mosmedicalreview
 
(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthcSilvaGraf83
 
(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthcMoseStaton39
 
Critical Success Factors in Leading Healthcare IT Projects
Critical Success Factors in Leading Healthcare IT ProjectsCritical Success Factors in Leading Healthcare IT Projects
Critical Success Factors in Leading Healthcare IT ProjectsKaali Dass PMP, PhD.
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesKapil Mehrotra
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )Tasha Holloway
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Privacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesPrivacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesZakCooper1
 
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...ijsptm
 
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Hybrid Cloud
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat PrognosisFireEye, Inc.
 
We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020Matthew Doyle
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoGlen Koskela
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkJames Deiotte
 

Similar to Cyber Risk in Healthcare Industry- Are you Protected? (20)

Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
Safeguarding Patient Privacy in a Digital Age (Brian Kalis)
 
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
 
(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc
 
(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc(Executive Summary)MedStar Health Inc, a leader in the healthc
(Executive Summary)MedStar Health Inc, a leader in the healthc
 
Critical Success Factors in Leading Healthcare IT Projects
Critical Success Factors in Leading Healthcare IT ProjectsCritical Success Factors in Leading Healthcare IT Projects
Critical Success Factors in Leading Healthcare IT Projects
 
Big data and cyber security legal risks and challenges
Big data and cyber security legal risks and challengesBig data and cyber security legal risks and challenges
Big data and cyber security legal risks and challenges
 
A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )A Personal Health Record ( Ehr )
A Personal Health Record ( Ehr )
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Privacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slidesPrivacy, Confidentiality, and Security_lecture 1_slides
Privacy, Confidentiality, and Security_lecture 1_slides
 
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
AVAILABILITY, ACCESSIBILITY, PRIVACY AND SAFETY ISSUES FACING ELECTRONIC MEDI...
 
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020We Need to Prioritize Cybersecurity in 2020
We Need to Prioritize Cybersecurity in 2020
 
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gkoIoT tietoturva terveydenhuollossa, 2017-03-21, gko
IoT tietoturva terveydenhuollossa, 2017-03-21, gko
 
Cyber risk reporting aicpa framework
Cyber risk reporting aicpa frameworkCyber risk reporting aicpa framework
Cyber risk reporting aicpa framework
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Digital Health Data
Digital Health DataDigital Health Data
Digital Health Data
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 
CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717CYVA_EMA3PageVentureSummaryAngelAM020150717
CYVA_EMA3PageVentureSummaryAngelAM020150717
 

Recently uploaded

Real Sex Provide In Goa ✂️ Call Girl (9316020077) Call Girl In Goa
Real Sex Provide In Goa ✂️ Call Girl   (9316020077) Call Girl In GoaReal Sex Provide In Goa ✂️ Call Girl   (9316020077) Call Girl In Goa
Real Sex Provide In Goa ✂️ Call Girl (9316020077) Call Girl In GoaReal Sex Provide In Goa
 
Spauldings classification ppt by Dr C P PRINCE
Spauldings classification ppt by Dr C P PRINCESpauldings classification ppt by Dr C P PRINCE
Spauldings classification ppt by Dr C P PRINCEDR.PRINCE C P
 
Leading large scale change: a life at the interface between theory and practice
Leading large scale change: a life at the interface between theory and practiceLeading large scale change: a life at the interface between theory and practice
Leading large scale change: a life at the interface between theory and practiceHelenBevan4
 
❤️ Chandigarh Call Girls ☎️99158-51334☎️ Escort service in Chandigarh ☎️ Chan...
❤️ Chandigarh Call Girls ☎️99158-51334☎️ Escort service in Chandigarh ☎️ Chan...❤️ Chandigarh Call Girls ☎️99158-51334☎️ Escort service in Chandigarh ☎️ Chan...
❤️ Chandigarh Call Girls ☎️99158-51334☎️ Escort service in Chandigarh ☎️ Chan...rajveerescorts2022
 
ACNE VULGARIS , ALLERGIES, ECZEMA, PEMPHIGUS.pdf
ACNE VULGARIS , ALLERGIES, ECZEMA, PEMPHIGUS.pdfACNE VULGARIS , ALLERGIES, ECZEMA, PEMPHIGUS.pdf
ACNE VULGARIS , ALLERGIES, ECZEMA, PEMPHIGUS.pdfDolisha Warbi
 
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North CarolinaTIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North CarolinaMebane Rash
 
CALCIUM - ELECTROLYTE IMBALANCE (HYPERCALCEMIA & HYPOCALCEMIA).pdf
CALCIUM - ELECTROLYTE IMBALANCE (HYPERCALCEMIA & HYPOCALCEMIA).pdfCALCIUM - ELECTROLYTE IMBALANCE (HYPERCALCEMIA & HYPOCALCEMIA).pdf
CALCIUM - ELECTROLYTE IMBALANCE (HYPERCALCEMIA & HYPOCALCEMIA).pdfDolisha Warbi
 
❤️ Chandigarh Call Girls Service ☎️99158-51334☎️ Escort service in Chandigarh...
❤️ Chandigarh Call Girls Service ☎️99158-51334☎️ Escort service in Chandigarh...❤️ Chandigarh Call Girls Service ☎️99158-51334☎️ Escort service in Chandigarh...
❤️ Chandigarh Call Girls Service ☎️99158-51334☎️ Escort service in Chandigarh...rajveerescorts2022
 
Test bank for community public health nursing evidence for practice 4TH editi...
Test bank for community public health nursing evidence for practice 4TH editi...Test bank for community public health nursing evidence for practice 4TH editi...
Test bank for community public health nursing evidence for practice 4TH editi...robinsonayot
 
Pathways to Equality: The Role of Men and Women in Gender Equity
Pathways to Equality:          The Role of Men and Women in Gender EquityPathways to Equality:          The Role of Men and Women in Gender Equity
Pathways to Equality: The Role of Men and Women in Gender EquityAtharv Kurhade
 
The Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's DiagramThe Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's DiagramMedicoseAcademics
 
Cash Payment 😋 +9316020077 Goa Call Girl No Advance *Full Service
Cash Payment 😋  +9316020077 Goa Call Girl No Advance *Full ServiceCash Payment 😋  +9316020077 Goa Call Girl No Advance *Full Service
Cash Payment 😋 +9316020077 Goa Call Girl No Advance *Full ServiceReal Sex Provide In Goa
 
Goa Call Girls Service +9316020077 Call GirlsGoa By Russian Call Girlsin Goa
Goa Call Girls Service  +9316020077 Call GirlsGoa By Russian Call Girlsin GoaGoa Call Girls Service  +9316020077 Call GirlsGoa By Russian Call Girlsin Goa
Goa Call Girls Service +9316020077 Call GirlsGoa By Russian Call Girlsin GoaReal Sex Provide In Goa
 
VIP Just Call 9548273370 Lucknow Top Class Call Girls Number | 8630512678 Esc...
VIP Just Call 9548273370 Lucknow Top Class Call Girls Number | 8630512678 Esc...VIP Just Call 9548273370 Lucknow Top Class Call Girls Number | 8630512678 Esc...
VIP Just Call 9548273370 Lucknow Top Class Call Girls Number | 8630512678 Esc...meghakumariji156
 
Nursing Care Plan for Surgery (Risk for Infection)
Nursing Care Plan for Surgery (Risk for Infection)Nursing Care Plan for Surgery (Risk for Infection)
Nursing Care Plan for Surgery (Risk for Infection)RoieteMillena3
 
Post marketing surveillance in Japan, legislation and.pptx
Post marketing surveillance in Japan, legislation and.pptxPost marketing surveillance in Japan, legislation and.pptx
Post marketing surveillance in Japan, legislation and.pptxDimple Marathe
 
TEST BANK For Little and Falace's Dental Management of the Medically Compromi...
TEST BANK For Little and Falace's Dental Management of the Medically Compromi...TEST BANK For Little and Falace's Dental Management of the Medically Compromi...
TEST BANK For Little and Falace's Dental Management of the Medically Compromi...rightmanforbloodline
 
Independent Call Girl in 😋 Goa +9316020077 Goa Call Girl
Independent Call Girl in 😋 Goa  +9316020077 Goa Call GirlIndependent Call Girl in 😋 Goa  +9316020077 Goa Call Girl
Independent Call Girl in 😋 Goa +9316020077 Goa Call GirlReal Sex Provide In Goa
 

Recently uploaded (20)

Abortion pills Buy Farwaniya (+918133066128) Cytotec 200mg tablets Al AHMEDI
Abortion pills Buy Farwaniya (+918133066128) Cytotec 200mg tablets Al AHMEDIAbortion pills Buy Farwaniya (+918133066128) Cytotec 200mg tablets Al AHMEDI
Abortion pills Buy Farwaniya (+918133066128) Cytotec 200mg tablets Al AHMEDI
 
Real Sex Provide In Goa ✂️ Call Girl (9316020077) Call Girl In Goa
Real Sex Provide In Goa ✂️ Call Girl   (9316020077) Call Girl In GoaReal Sex Provide In Goa ✂️ Call Girl   (9316020077) Call Girl In Goa
Real Sex Provide In Goa ✂️ Call Girl (9316020077) Call Girl In Goa
 
Spauldings classification ppt by Dr C P PRINCE
Spauldings classification ppt by Dr C P PRINCESpauldings classification ppt by Dr C P PRINCE
Spauldings classification ppt by Dr C P PRINCE
 
Leading large scale change: a life at the interface between theory and practice
Leading large scale change: a life at the interface between theory and practiceLeading large scale change: a life at the interface between theory and practice
Leading large scale change: a life at the interface between theory and practice
 
❤️ Chandigarh Call Girls ☎️99158-51334☎️ Escort service in Chandigarh ☎️ Chan...
❤️ Chandigarh Call Girls ☎️99158-51334☎️ Escort service in Chandigarh ☎️ Chan...❤️ Chandigarh Call Girls ☎️99158-51334☎️ Escort service in Chandigarh ☎️ Chan...
❤️ Chandigarh Call Girls ☎️99158-51334☎️ Escort service in Chandigarh ☎️ Chan...
 
ACNE VULGARIS , ALLERGIES, ECZEMA, PEMPHIGUS.pdf
ACNE VULGARIS , ALLERGIES, ECZEMA, PEMPHIGUS.pdfACNE VULGARIS , ALLERGIES, ECZEMA, PEMPHIGUS.pdf
ACNE VULGARIS , ALLERGIES, ECZEMA, PEMPHIGUS.pdf
 
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North CarolinaTIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
TIME FOR ACTION: MAY 2024 Securing A Strong Nursing Workforce for North Carolina
 
CALCIUM - ELECTROLYTE IMBALANCE (HYPERCALCEMIA & HYPOCALCEMIA).pdf
CALCIUM - ELECTROLYTE IMBALANCE (HYPERCALCEMIA & HYPOCALCEMIA).pdfCALCIUM - ELECTROLYTE IMBALANCE (HYPERCALCEMIA & HYPOCALCEMIA).pdf
CALCIUM - ELECTROLYTE IMBALANCE (HYPERCALCEMIA & HYPOCALCEMIA).pdf
 
❤️ Chandigarh Call Girls Service ☎️99158-51334☎️ Escort service in Chandigarh...
❤️ Chandigarh Call Girls Service ☎️99158-51334☎️ Escort service in Chandigarh...❤️ Chandigarh Call Girls Service ☎️99158-51334☎️ Escort service in Chandigarh...
❤️ Chandigarh Call Girls Service ☎️99158-51334☎️ Escort service in Chandigarh...
 
Test bank for community public health nursing evidence for practice 4TH editi...
Test bank for community public health nursing evidence for practice 4TH editi...Test bank for community public health nursing evidence for practice 4TH editi...
Test bank for community public health nursing evidence for practice 4TH editi...
 
Pathways to Equality: The Role of Men and Women in Gender Equity
Pathways to Equality:          The Role of Men and Women in Gender EquityPathways to Equality:          The Role of Men and Women in Gender Equity
Pathways to Equality: The Role of Men and Women in Gender Equity
 
The Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's DiagramThe Events of Cardiac Cycle - Wigger's Diagram
The Events of Cardiac Cycle - Wigger's Diagram
 
Cash Payment 😋 +9316020077 Goa Call Girl No Advance *Full Service
Cash Payment 😋  +9316020077 Goa Call Girl No Advance *Full ServiceCash Payment 😋  +9316020077 Goa Call Girl No Advance *Full Service
Cash Payment 😋 +9316020077 Goa Call Girl No Advance *Full Service
 
Goa Call Girls Service +9316020077 Call GirlsGoa By Russian Call Girlsin Goa
Goa Call Girls Service  +9316020077 Call GirlsGoa By Russian Call Girlsin GoaGoa Call Girls Service  +9316020077 Call GirlsGoa By Russian Call Girlsin Goa
Goa Call Girls Service +9316020077 Call GirlsGoa By Russian Call Girlsin Goa
 
VIP Just Call 9548273370 Lucknow Top Class Call Girls Number | 8630512678 Esc...
VIP Just Call 9548273370 Lucknow Top Class Call Girls Number | 8630512678 Esc...VIP Just Call 9548273370 Lucknow Top Class Call Girls Number | 8630512678 Esc...
VIP Just Call 9548273370 Lucknow Top Class Call Girls Number | 8630512678 Esc...
 
Cara Menggugurkan Kandungan Secara Alami 3 Jam Tuntas
Cara Menggugurkan Kandungan Secara Alami 3 Jam TuntasCara Menggugurkan Kandungan Secara Alami 3 Jam Tuntas
Cara Menggugurkan Kandungan Secara Alami 3 Jam Tuntas
 
Nursing Care Plan for Surgery (Risk for Infection)
Nursing Care Plan for Surgery (Risk for Infection)Nursing Care Plan for Surgery (Risk for Infection)
Nursing Care Plan for Surgery (Risk for Infection)
 
Post marketing surveillance in Japan, legislation and.pptx
Post marketing surveillance in Japan, legislation and.pptxPost marketing surveillance in Japan, legislation and.pptx
Post marketing surveillance in Japan, legislation and.pptx
 
TEST BANK For Little and Falace's Dental Management of the Medically Compromi...
TEST BANK For Little and Falace's Dental Management of the Medically Compromi...TEST BANK For Little and Falace's Dental Management of the Medically Compromi...
TEST BANK For Little and Falace's Dental Management of the Medically Compromi...
 
Independent Call Girl in 😋 Goa +9316020077 Goa Call Girl
Independent Call Girl in 😋 Goa  +9316020077 Goa Call GirlIndependent Call Girl in 😋 Goa  +9316020077 Goa Call Girl
Independent Call Girl in 😋 Goa +9316020077 Goa Call Girl
 

Cyber Risk in Healthcare Industry- Are you Protected?

  • 1. MAJOR CYBER ATTACKS IN HEALTHCARE INDUSTRY Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive AvMed, Inc. 1,2 M victims 2009, U.S. BlueCross BlueShield of Tennessee 1 M victims 2009, U.S. North Bronx Healthcare Network 1,7 M victims 2010, U.S. The Nemours Foundation 1 M victims 2011, U.S. TRICARE Management Activity 4,9 M victims 2011, U.S. Health Net, Inc. 1,9 M victims 2011, U.S. Advocate Medical Group 4 M victims 2013, U.S. Community Health Systems 4,5 M victims 2014, U.S. Anthem, Inc. 80 M victims 2015, U.S. Banner Health 3,62 M victims 2016, U.S. Newkirk Products Inc 3,47 M victims 2016, U.S. 21 Century Oncology Holdings 2,21 M victims 2016, U.S. More than 150,000* victims of cyber breaches in healthcare sector in January 2017, U.S. (*HHS) 25 breaches affecting 500+ individuals were recorded by HHS in January 2017 in U.S.
  • 2. Partnering With EC-Council World’s Largest Cyber Security Consulting, Professional Training & Certification Body
  • 3. CYBER RISK IN HEALTHCARE INDUSTRY is an estimated cost for cyberattacks against hospitals, clinics and doctors in the U.S. healthcare industry (Ponemon Institute). $6 billion $200-400 83% It has already been two years since hackers shifted their main focus from BFSI sector to healthcare industry aggressively targeting hospitals all over the world, while U.S. is experiencing the most severe threat. The FBI warned the healthcare industry that cyber-criminals would be directing more attention their way. News.security-intelligence, 2015 Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive of recorded breaches in 2016 were in the medical and healthcare industries (Identity Theft Resource Center). 6 The healthcare sector is the most vulnerable industry to cyber-attacks and data breaches. ICO, Data security incident trends, 2016 of the U.S. population (143+ M people) have become victims of cyber breaches in healthcare industry in 5 years (U.S. Department of Health and Human Services, 2015). 45% per one record (client profile) is an estimates cost to remediate a healthcare breach (Vasco).
  • 4. Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive • Inability to operate • Financial losses • Damage to reputation 3. SYSTEMS’ BREAKDOWN • Health risk • Identity theft • Financial fraud 2. UNAUTHORISED CHANGES IN DATA BASES OUTCOME OF CYBER ATTACKS IN HEALTHCARE INDUSTRY 1. LOSS OF CUSTOMERS’ DATA (Security number, insurance ID, credit card number, passport, address, biometric data, medical history, etc.) FOR HOSPITALS:FOR PATIENTS: 65% of people would avoid healthcare provides that experience a data breach. Among adults below 35 years the statistic is 73%. (TransUnionHealthcare, 2015) It is a primary responsibility of the management to prevent the industry from cyber breaches and to protect its patients from physical, financial and mental damages caused by cyber attacks. (Cancelled operations, outpatient appointments and diagnostic procedures, etc.) (Prescription of wrong medications and treatments, etc.)
  • 5. HEALTHCARE DATA BREACHES - IMPACT ~90% of healthcare organizations had a data breach in the past 2 years according to Ponemon’s research. 45% of them had more than 5 data breaches. (Ponemon Institute LLC Ponemon Institute Research Report. Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, 2016). $3,7M $1,1M $0,9M $0,6M $0,6M $0,5M $0,4M Lost brand value Breach notification Forensics Lawsuits HIPPA settlement fine Lost revenue Post-breach clean-up AVERAGE COSTS OF A DATA BREACH IN THE U.S. HEALTHCARE INDUSRTY* Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive *Protenus ‘Cost of a Breach: A Business Case for Proactive Privacy Analytics”
  • 6. Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. WHERE CYBER RISKS LIE FOR HEALTHCARE INDUSTRY Compliant Resilient Competitive 9 SaaS Insider Threats Data Bases File Server Compliance Patient Data Applications Network IntrusionSocial Engineering Unauthorized Access Espionage Malware Phishing Attacks Ransomware Network Attack Hospital
  • 7. The healthcare industry is holding the #1 spot in a lack of qualified cyber security professionals. Job Market Intelligence: Cybersecurity Jobs, 2015 Ensuring that the healthcare C-suites have necessary cybersecurity skills is the only way to create a strong data security approach. It is vital for a healthcare provider to maintain cyber security awareness and most up-to-date cyber security skills among all employees. Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Last year the Department of Health and Human Services awarded $87 million to 1,310 health centers across the U.S. to upgrade their IT systems and cyber security skills. Compliant Resilient Competitive 13 of healthcare providers have no human resources dedicated to cyber security (Healthcare Information & Management Systems Society, 2016). 58% ‘’There is a rising demand for cybersecurity professionals with skills pertinent to healthcare’’ (Healthcare-informatics.com, 2015). ‘’A cybersecurity skills shortage may eventually affect the healthcare industry’’ (McAfee’s Hacking the Skills Shortage, 2016). CYBER SECURITY SKILL GAP IN THE HEALTHCARE SECTOR
  • 8. Cyber Security Awareness, Upskilling and Training Compliance with Regulations (HIPPA and PCI) Coverage of Cyber Security Gaps in the Infrastructure Cyber Security Risk Assessment EC-COUNCIL APPROACH FOR HEALTHCARE INDUSTRIES Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive
  • 9. WE BUILD CORE HANDS-ON ON INFORMATION SECURITY SKILLS FOR ALL LEVELS AND DEPARTMENTS Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive CyberSecurityexperience,knowledgeandskills For Information security Officers, Information Security Decision Makers For various specialties, Computer Forensics, Pen Testing, Mobile Forensics For Information Security Officers, Pen Testers, Information System Security Auditors, Information Security Auditors, Incidents Handlers, Persons responsible for defending systems, networks and application For various specialties, Forensics Investigators, Incident Handlers, Disaster Recovery Professional For Network Administrator, Network Engineer, CND Analyst, Network Defense Technician, Network Security Analyst, Security Operators, anyone who is in network operations For end-users: anyone who uses the Internet extensively to work
  • 10. EC-Council Global Services (EGS) is the consultation arm of the EC-Council Group. • EGS is an advisory firm that provides customized and tailored solutions to complex challenges in Corporate Information Security. • EGS is vendor-agnostic and technology-solutions market independent entity. • EGS is based in Malaysia and has an outstanding local team supported globally. IDENTIFY 1.Cyber Security Posture Assessment 2.Security Strategy and Transformation 3.Vendor Risk Management PROTECT IT Governance IT Risk Assessment ISO 27001 Advisory PCI-DSS Advisory Managed Security Services Identity & Access Management Training Data Privacy DETECT Vulnerability Assessment & Penetration Testing Secure Code Review Secure Software Development Lifecycle Cloud Security Software License Compliance Revenue Assurance RESPOND Security Incident and Event Management (SIEM) Security Operations (SOC) RECOVER Business Continuity Management Disaster Recovery Planning Forensics Services Compliant Resilient Competitive Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. OUR INFORMATION SECURITY CONSULTING AND ADVISORY SERVICES
  • 11. HIPAA SECURITY AND PRIVACY  HIPAA is the Health Insurance Portability and Accountability Act, a federal law that… • Protects the privacy of a patient’s personal and health information (PII & PHI) • Provides for electronic and physical security of personal and health information • Simplifies billing and other transactions  Covered entities must protect an individual’s personal and health information that: • Is created, kept, filed, used or shared • Is written, spoken, or electronic EC-COUNCIL’S DETAILED HIPAA METHODOLGY AND OFFERING IS PROVIDED IN APPENDIX A TOWARDS THE END OF THE DOCUMENT Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive
  • 12. ABOUT EC-COUNCIL World’s Largest Cyber Security Consulting, Professional Training & Certification Body
  • 13. ICECC International Council of E-Commerce Consultants EC-Council Group ECCU EC-Council University Division of Academic Education ECC EC-Council Training & Certification Division of Professional Workforce Development EGS EC-Council Global Services Division of Corporate Consulting & Advisory Services EGE EC-Council Global Events Division of Conferences, Forums, Summits, Workshops & Industry Awards ECF EC-Council Foundation Non-Profit Organization for Cyber Security Awareness Increase. 16+ YEARS EXPERIENCE 40+ TRAINING & CERTIFICATION PROGRAMS 145+ COUNTRIES 350+ SUBJECT MATTER EXPERTS 700+ TRAINING PARTNERS WORLDWIDE 3000 TOOLS & TECHNOLOGIES 150,000 CERTIFIED MEMBERS EC-Council is known as worlds’ largest technical certification body. It is also famous for being a creator of Certified Ethical Hacker and LPT standards. Some of the finest organizations around the world such as the U.S. Army, U.S. Navy, DoD, the FBI, Microsoft, IBM, and the United Nations have trusted ECC to develop and advance their security infrastructure. WE ARE INFORMATION SECURITY EC-COUNCIL AT A GLANCE WE WROTE THE STANDARDS Compliant Resilient CompetitiveCopyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 14. Critical Information Security Skill Development Solutions Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.
  • 15. WE BUILD CORE HANDS-ON ON INFORMATION SECURITY SKILLS FOR ALL LEVELS AND DEPARTMENTS • Often 70% Of An Organization's InfoSec Challenges Are Addressed By Just Investing In Upskilling Their Staff With The Information Security Hands-on Skills. Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. Compliant Resilient Competitive
  • 17. HEALTHCARE BUSINESS CONCERNS Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. 1. Protect patient records 2. Maintain compliance with HIPAA standards for retention, recoverability & security 3. Healthcare data is stored in cloud hosted SaaS solutions 4. Secure Communication about patient information 5. Business partner/vendor integration 6. Protect employee healthcare records 7. Provide training to employees 8. Avoid fines from the government 9. Maintain brand and reputation 10. Minimize customer loss
  • 18. WHY HIPAA STANDARDS? Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.  Collaboration Engage with business partners, suppliers, and customers  Speed Deploy faster by integrating with existing systems  Agility Adapt to changing business needs faster  Accessibility Data available and useable today, tomorrow, years from now  Cost Reduce acquisition and operating costs  Protection Provide a standard level of protection around protected health information (PHI)
  • 19. HEALTHCARE – WHAT DO WE HAVE TO OFFER? Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. 1. Training and development for IT, Risk, Compliance and Security teams. 2. HIPAA Security and Privacy Assessment 3. Hospital Physical Security Assessment 4. IT GAP Analysis 5. Employee Training 6. Data Loss Prevention 7. Policy Development 8. Healthcare Application Security Test 9. HIPAA HHS Audit Readiness Assessment
  • 20. EXAMPLE USE CASES FOR DATA PROTECTION NEEDS Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.  Accounting departments needs to: Share encrypted files with customers  Legal departments needs to: Block all staff from saving data to USB flash drives Share encrypted data on CDs / DVDs Shared cloud storage  Retail organizations needs to: Block unauthorized software from work computers Prevent all data from being transferred via any port or connection to customers over insecure channels  Hospitals needs to: Allow select usage of doctors’ smartphones Log all data exchanged between devices and hospital network for compliance
  • 21. WHERE IS YOUR CORPORATE PROTECTED DATA? Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.  Convenience and storage USB flash drives, CDs, DVDs, Bluetooth-enabled devices, etc. Devices used for transferring and storage of data, music, pictures, etc. Everything is kept in email  More mobile data, more data to lose Users retain everything by default Users transfer data between endpoint devices and corporate network Mobility increases risk of theft and accidental loss of data  Prevent a data breach Monitor and enforce data loss prevention on removable media, mobile disks and connections Control device usage and log activity
  • 22. COMPLIANCE: HISTORICALLY COSTLY & DIFFICULT TO IMPLEMENT Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.  Enforcement Policy compliance required manual user & administrator intervention  User Training New deployments required additional training due to significant user impact  Administrative Burden Differing management interfaces & demands for enrollment administration  Patch Management Each application creates an additional patch burden when updated  Mobile / Online applications Each application is a point solution without common administration & policy  Integration Lack of common integration & configuration with existing infrastructure
  • 23. DATA PROTECTION IMPLEMENTATION CHALLENGES Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.  Corporate access to data Employee dismissal cannot result in data loss  Central deployment, management, & updates How can thousands of distributed users be tracked and managed? Software installation can be uncontrolled  Initial & ongoing management cost Constrained by existing IT resources Can compliance grow with the business?  User experience What additional user processes are required? Cannot rely on users to make security decisions Non-disruptive implementation is essential
  • 24. HIPAA SECURITY ASSESSMENTS Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. POLICY AND PROCESS (Security Posture Creation) ASSESSMENT (Security Posture Maintenance) SECURITY POLICY DEVELOPMENT VULNERABILITY SECURITY STRATEGY GAP ANALYSIS (Where you are vs. Where you need to be) TEMPORARY CSO AUDIT & COMPLIANCE (HIPPA, PCI, SOX, etc.) ROADMAP STRATEGY WEB APPLICATION EMPLOYEE AWARENESS TRAINING SUPPLIER SECURITY
  • 25. QUESTIONS FOR YOUR HOSPITAL OR CLINIC Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.  Security architecture Can the compliance framework provide an encryption platform that can expand to accommodate additional applications?  Comprehensive protection Can the compliance solution comprehensively protect sensitive data without tremendous administrative overhead or changes to user behavior?  Security management Can the compliance framework be efficiently managed by using an integrated management processes?  Application risk What other applications / products will need to be installed / deployed as part of the total enterprise framework strategy?
  • 26. DO YOU NEED TO INVEST IN INFORMATION SECURITY TRAINING, CONSULTING AND ADVISORY Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited.  Does the organization allow removable devices such as CDs, USB drives, etc.?  Is there a corporate policy on information security and HIPAA Privacy and Security?  Do you want to keep track of where and how confidential data is transferred onto portable media?  Do you have a lot of users who work offline / are disconnected from the corporate network?  How do you protect data within/leaving your enterprise (laptops, email, servers, mobile)?  What are the consequences if data is stolen or compromised? Company brand damage? Lost customers? Regulatory fines?  How do you control access to information based on the different roles within the organization, for example across-departments, with contractors, etc?
  • 27. CONTACT US Copyright 2017 by EC-Council. All Rights Reserved. Reproduction is Strictly Prohibited. MARK MERRILL Executive Sales & Business Development | Global Services EC-Council Global Services: An EC-Council Division markm@altselli.com Web: http://www.eccouncil.org http://www.eccgs.com US Cell : +1.(817).821.4200