SlideShare a Scribd company logo
33 West Monroe St, Suite 1700 
Chicago, IL 60603-5616 
Tel 312 664 4467 
Fax 312 664 6143 
www.himss.org 
1 
October 10, 2014 
Dr. Willie E. May 
Acting Director 
National Institute of Standards and Technology 
Department of Commerce 
100 Bureau Drive 
Gaithersburg, MD 20899 
Dear Dr. May, 
On behalf of the Healthcare Information and Management Systems Society (HIMSS), we are pleased to provide written comments to the National Institute of Standards and Technology (NIST) in response to the request for information (RFI), “Experience with the Framework for Improving Critical Infrastructure Cybersecurity,” published in the Federal Register on August 26, 2014. 
HIMSS is a cause-based, global enterprise producing health IT thought leadership, education, events, market research and media services around the world. Founded in 1961, HIMSS encompasses more than 57,000 individuals, of which more than two-thirds work in healthcare provider, governmental and not-for-profit organizations, plus over 640 corporations and over 400 not-for-profit partner organizations that share this cause. 
HIMSS welcomes the opportunity to contribute to this dialogue, and outlines our answers below to the questions posed in the RFI. 
Current Awareness of the Cybersecurity Framework 
 What is the extent of awareness of the Framework among the Nation’s critical infrastructure organizations? Six months after the Framework was issued, has it gained the traction needed to be a factor in how organizations manage cyber risks in the Nation’s critical infrastructure? 
In regards to the healthcare sector, HIMSS estimates that there is modest awareness about the Framework. There are a few organizations that have implemented the Framework; we note that our estimate is anecdotally based, and likely to be very small. 
 How have organizations learned about the Framework? Outreach from NIST or another government agency, an association, participation in a NIST workshop, news media? Other source? 
HIMSS observes that the modest awareness among healthcare organizations appears to have been generated through communications at the workplace, HIMSS and other professional organizations, federal announcements and newsletters, but not necessarily from the media or other mainstream publications.
2 
 Are critical infrastructure owners and operators working with sector-specific groups, non- profits, and other organizations that support critical infrastructure to receive information and share lessons learned about the Framework? 
HIMSS has monitored development of the Framework; we’ve shared its progress with our stakeholders. In addition, we’ve submitted comments on the discussion draft with expert input from our HIMSS Privacy and Security Committee, including the following observations: 
1) To strengthen cybersecurity and support business objectives of healthcare organizations, we recommend that privacy and security be integrated into the organization’s business objectives; 
2) To strengthen cybersecurity, we suggest that organizations increase their resilience to cyber incidents by utilizing lessons learned as part of their short-term and long-term recovery efforts. 
3) To better handle incidents, we suggest that healthcare organizations have an incident response plan in place which focuses on handling cyber incidents in terms of the roles and actions of people, processes, and technology within the healthcare organization.[1] 
We acknowledge and appreciate that NIST has incorporated HIMSS’s comments into Version 1.0 of the Framework. 
 Is there general awareness that the Framework: a. Is intended for voluntary use? b. Is intended as a cyber risk management tool for all levels of an organization in assessing risk and how cybersecurity factors into risk assessments? 
a. Yes. For those organizations aware of the Framework, they understand the Framework is intended for voluntary use. However, further education and information-sharing is necessary to alleviate concerns that the Framework is being mandated by regulation or law. 
b. Yes, we believe it is generally understood that the Framework is intended as a cyber risk management tool for all levels of an organization in assessing risk. We also note that the Framework makes clear how cybersecurity factors into risk assessments. However, we suggest that NIST consider publishing guidance on adoption and use of the Framework, tailored to the type and size of the organization, as we believe such guidance may be helpful. 
 What are the greatest challenges and opportunities—for NIST, the Federal government more broadly, and the private sector—to improve awareness of the Framework? 
NIST could improve the field’s awareness of the Framework by providing a means for healthcare organizations – those that have adopted and implemented the Framework – to discuss use of the Framework to their advantage to manage risk. Input could be sought from small, medium, and large healthcare organizations in both urban and rural settings. 
[1] HIMSS’ Response to NIST Preliminary version of the Cybersecurity Framework; December 2013. http://csrc.nist.gov/cyberframework/framework_comments/20131213_thomas_leary_himss_part2.pdf
3 
 Is your organization doing any form of outreach or education on cybersecurity risk management (including the Framework)? If so, what kind of outreach and how many entities are you reaching? If not, does your organization plan to do any form of outreach or awareness on the Framework? 
HIMSS utilizes a variety of outreach and educational initiatives to inform and educate our stakeholders. We also participate with other non-profit organizations representing critical infrastructure sectors, in an information sharing initiative to discuss the Framework. We work with our stakeholders through HIMSS’s volunteer-led Privacy and Security Committee, and associated Task Forces and Work Groups to build educational deliverables relating to risk management, through blog posts and privacy and security toolkits, which are all available on our website. HIMSS also has year-round educational initiatives and deliverables relating to risk management, including the biannual Privacy and Security Forum, and the mHealth Summit Mobile Privacy and Security Symposium. Finally, as appropriate, HIMSS connects with government agencies to provide education and information relating to risk management. 
 What more can and should be done to raise awareness? 
We suggest that NIST widely present the Framework at health sector-oriented conferences. Another suggestion is NIST create a repository of information in which organizations across the various critical infrastructure sectors can contribute information, comments, and feedback relevant to experiences, lessons learned, and best practices with respect to adoption and use of the Framework. 
Experiences with the Cybersecurity Framework 
 Do organizations in some sectors require some type of sector specific guidance prior to use? 
Yes, we have observed that the health sector has become acutely aware of cyber attacks, insider threats, and other malicious activity. However, traditionally, healthcare’s focus has been on HIPAA compliance. Compliance, though, does not necessarily mean that information will be kept safe and secure. Accordingly, healthcare providers, other covered entities, and the business associates that do work on behalf of these covered entities, all need practical and detailed guidance on making the transition from “compliance only” to being secure (in the same sense that other critical infrastructure sectors, such as the chemical, electrical, and financial sectors have adopted and embraced security). The healthcare industry also could benefit from specific guidance from NIST (with input from healthcare stakeholders) on what an ideal “target state” would be for a healthcare organization. Stakeholders would also benefit from a common, industry-wide understanding and agreement of what the target state should be as well as standard metrics/tools to measure current state and progress made by a healthcare organization towards that target state. Both privacy risk management and information security risk management should be addressed (as well as the points of intersection and other points of connection between these two spheres). The target state and standard metrics/tools are not provided by HIPAA, the HITECH Act, or other associated or related guidance.
4 
 Which activities by NIST, the Department of Commerce overall (including the Patent and Trademark Office (PTO); National Telecommunications and Information Administration (NTIA); and the Internet Policy Taskforce (IPTF)) or other departments and agencies could be expanded or initiated to promote implementation of the Framework? 
The National Initiative for Cybersecurity Education (NICE) could be used to promote better awareness and more specific guidance with regard to the Framework. For example, the PTO could assist with the Framework by ensuring that the quality of patent review and patent application review remains high with respect to patents and patent applications relating to risk management and cybersecurity, in addition to other related arts. 
Roadmap for the Future of the Cybersecurity Framework 
 Are key cybersecurity issues and opportunities missing that should be considered as priorities, and if so, what are they and why do they merit special attention? 
The Framework could explain in detail what constitutes an accurate, thorough, and holistic risk assessment. As we are in an age where much information is electronic and, if information is not secure, it very well may not be private. The Framework could explain in detail how privacy and cybersecurity interrelate. Consideration should also be given to our global economy and global interdependencies and the need to manage risk on a global scale, with the understanding that entities can and do interact across critical infrastructure sectors. The interdependence among the critical infrastructure sectors can result in shared threats and vulnerabilities. This approach would truly be managing risk in the real world, as opposed to managing risk in a vacuum. We suggest that NIST (with input from healthcare stakeholders) bring together government, academia, and industry to develop a Framework which is fluid and flexible enough to be a living document which can be improved and revamped to ensure that the Framework content reflects real world risks and risk management, including in view of interdependencies among the critical infrastructure sectors. 
According to the 6th Annual HIMSS Security Survey1, released February 19, 2014, more than half of the survey’s respondents (51%) have increased their security budgets in the past year. However, 49% of these organizations are still spending 3% or less of their overall IT budget on security initiatives that will secure patient data— the industry average is cited as 5% of the total IT budget on security. Information security in the health sector is generally underfunded. In spite of this, more healthcare stakeholders are strengthening their information security programs (or are interested in do so, but need additional guidance), in light of recent breaches and cyber attacks. To the extent that other critical infrastructure sectors have applied the Framework to address breaches and cyber attacks, these lessons learned may be of interest to HIMSS and its healthcare stakeholders. 
1 HIMSS Security Survey; February 2014: http://www.himss.org/files/2013_HIMSS_Security_Survey.pdf
5 
HIMSS appreciates the opportunity to submit comments on this RFI—this framework presents an opportunity for HIMSS to work with NIST to further educate health stakeholders on appropriate information security practices. We look forward to continued dialogue with NIST and the Department of Commerce, and welcome any questions you may have. For more information, please contact Jeff Coughlin, Senior Director of Federal & State Affairs, at 703.562.8824, or Stephanie Jamison, Director of Federal Affairs, at 703.562.8844. 
Sincerely, 
Paul Kleeberg, MD, FAAFP, FHIMSS H. Stephen Lieber, CAE Chair, HIMSS Board of Directors President & CEO Chief Medical Informatics Officer HIMSS Stratis Health

More Related Content

What's hot

National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
Gopal Choudhary
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
at MicroFocus Italy ❖✔
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
Michael Smith
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
Ernest Staats
 
NASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and RecoveryNASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and Recovery
David Sweigert
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
Scientia Groups
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
Boston Global Forum
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
Laurie Mosca-Cocca
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
James Bryce Clark
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
Bill Besse
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security Initiativesi
Lindsey Landolfi
 
Information governance
Information governanceInformation governance
Information governance
Gerardo Medina
 
Healthcare_Security_White_Paper
Healthcare_Security_White_PaperHealthcare_Security_White_Paper
Healthcare_Security_White_Paper
James Maudlin
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
Dejan Jeremic
 
Viyya Ssms Overview 2009
Viyya Ssms Overview 2009Viyya Ssms Overview 2009
Viyya Ssms Overview 2009
guestee358
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
M P Keshava
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
Nawanan Theera-Ampornpunt
 
Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015
Rob Blackwell
 
Get Prepared
Get PreparedGet Prepared
Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016
Rob Blackwell
 

What's hot (20)

National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)National Cyber Security Policy 2013 (NCSP)
National Cyber Security Policy 2013 (NCSP)
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Building A Modern Security Policy For Social Media and Government
Building A  Modern  Security  Policy For  Social  Media and GovernmentBuilding A  Modern  Security  Policy For  Social  Media and Government
Building A Modern Security Policy For Social Media and Government
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
NASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and RecoveryNASCIO Cyber Disruption Response and Recovery
NASCIO Cyber Disruption Response and Recovery
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
Rutkowski OASIS CTI F2F Cybersecurity Act Preso 20160115
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
US Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security InitiativesiUS Government Software Assurance and Security Initiativesi
US Government Software Assurance and Security Initiativesi
 
Information governance
Information governanceInformation governance
Information governance
 
Healthcare_Security_White_Paper
Healthcare_Security_White_PaperHealthcare_Security_White_Paper
Healthcare_Security_White_Paper
 
Zlatibor risk based balancing of organizational and technical controls for ...
Zlatibor   risk based balancing of organizational and technical controls for ...Zlatibor   risk based balancing of organizational and technical controls for ...
Zlatibor risk based balancing of organizational and technical controls for ...
 
Viyya Ssms Overview 2009
Viyya Ssms Overview 2009Viyya Ssms Overview 2009
Viyya Ssms Overview 2009
 
National cyber security policy 2013
National cyber security policy  2013National cyber security policy  2013
National cyber security policy 2013
 
Legal Aspects in Health Informatics
Legal Aspects in Health InformaticsLegal Aspects in Health Informatics
Legal Aspects in Health Informatics
 
Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015Mich_Cyber_Initiative_2015
Mich_Cyber_Initiative_2015
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016Protect and Grow Public Report May 2016
Protect and Grow Public Report May 2016
 

Similar to HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST

Social media compliance for healthcare professionals
Social media compliance for healthcare professionalsSocial media compliance for healthcare professionals
Social media compliance for healthcare professionals
complianceonline123
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
IJNSA Journal
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
kimangeloullero
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
Paul Di Gangi
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
Jessica Graf
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
Tony Hauxwell
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to Know
PYA, P.C.
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
DoubleHorn
 
Healthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergHealthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart Bredberg
Lennart Bredberg
 
Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1
Lennart Bredberg
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
AISHA232980
 
Questions On The Healthcare System
Questions On The Healthcare SystemQuestions On The Healthcare System
Questions On The Healthcare System
Amanda Gray
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
Steve Knapp
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
Bryan Cline, Ph.D.
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Angie Miller
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
makdul
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
jeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
glendar3
 

Similar to HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST (20)

Social media compliance for healthcare professionals
Social media compliance for healthcare professionalsSocial media compliance for healthcare professionals
Social media compliance for healthcare professionals
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to Know
 
An Overview of the Major Compliance Requirements
An Overview of the Major Compliance RequirementsAn Overview of the Major Compliance Requirements
An Overview of the Major Compliance Requirements
 
Healthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart BredbergHealthcare Security by Senior Security Consultant Lennart Bredberg
Healthcare Security by Senior Security Consultant Lennart Bredberg
 
Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Questions On The Healthcare System
Questions On The Healthcare SystemQuestions On The Healthcare System
Questions On The Healthcare System
 
Healthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINALHealthcare Cybersecurity Whitepaper FINAL
Healthcare Cybersecurity Whitepaper FINAL
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
 
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...Assimilation Of Security-Related Policies In U.S. Firms  An Empirical Study O...
Assimilation Of Security-Related Policies In U.S. Firms An Empirical Study O...
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 

More from David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
David Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
David Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
David Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
David Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
David Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
David Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
David Sweigert
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
David Sweigert
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
David Sweigert
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
David Sweigert
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
David Sweigert
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
David Sweigert
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
David Sweigert
 

More from David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFTNational Incident Management System (NIMS) NQS DRAFT
National Incident Management System (NIMS) NQS DRAFT
 
National Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public FeedbackNational Incident Management System - NQS Public Feedback
National Incident Management System - NQS Public Feedback
 
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERTNursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
 
National Preparedness Goals 2015 2nd edition
National Preparedness Goals  2015  2nd editionNational Preparedness Goals  2015  2nd edition
National Preparedness Goals 2015 2nd edition
 
Healthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness PlanHealthcare Sector-wide Disaster Prepardness Plan
Healthcare Sector-wide Disaster Prepardness Plan
 
Cyber Risk Assessment for the Emergency Services Sector - DHS
Cyber Risk Assessment for the Emergency Services Sector  -  DHSCyber Risk Assessment for the Emergency Services Sector  -  DHS
Cyber Risk Assessment for the Emergency Services Sector - DHS
 

Recently uploaded

一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
gjsma0ep
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
veteranlegal
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Syed Muhammad Humza Hussain
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
Milind Agarwal
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
lawyersonia
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
CIkumparan
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
USDAReapgrants.com
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
PelayoGilbert
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
ssusera97a2f
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
bhavenpr
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
seri bangash
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
osenwakm
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
BridgeWest.eu
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
HarpreetSaini48
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
osenwakm
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Massimo Talia
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
MasoudZamani13
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
Justin Ordoyo
 

Recently uploaded (20)

一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
一比一原版(Lincoln毕业证)新西兰林肯大学毕业证如何办理
 
The Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdfThe Future of Criminal Defense Lawyer in India.pdf
The Future of Criminal Defense Lawyer in India.pdf
 
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
Synopsis On Annual General Meeting/Extra Ordinary General Meeting With Ordina...
 
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and ToolsThe Art and Science of Cryptoforensic Investigation: Best Practices and Tools
The Art and Science of Cryptoforensic Investigation: Best Practices and Tools
 
What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...What are the common challenges faced by women lawyers working in the legal pr...
What are the common challenges faced by women lawyers working in the legal pr...
 
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
Sangyun Lee, 'Why Korea's Merger Control Occasionally Fails: A Public Choice ...
 
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
2015pmkemenhub163.pdf. 2015pmkemenhub163.pdf
 
Receivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptxReceivership and liquidation Accounts Prof. Oyedokun.pptx
Receivership and liquidation Accounts Prof. Oyedokun.pptx
 
Energizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining FuturesEnergizing Communities, Fostering Growth, Sustaining Futures
Energizing Communities, Fostering Growth, Sustaining Futures
 
Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976Ease of Paying Tax Law Republic Act 11976
Ease of Paying Tax Law Republic Act 11976
 
From Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal EnvironmentsFrom Promise to Practice. Implementing AI in Legal Environments
From Promise to Practice. Implementing AI in Legal Environments
 
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdfV.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
V.-SENTHIL-BALAJI-SLP-C-8939-8940-2023-SC-Judgment-07-August-2023.pdf
 
Lifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point PresentationLifting the Corporate Veil. Power Point Presentation
Lifting the Corporate Veil. Power Point Presentation
 
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
原版制作(PSU毕业证书)宾州州立大学公园分校毕业证学历证书一模一样
 
The Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in ItalyThe Work Permit for Self-Employed Persons in Italy
The Work Permit for Self-Employed Persons in Italy
 
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence LawyersDefending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
Defending Weapons Offence Charges: Role of Mississauga Criminal Defence Lawyers
 
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
在线办理(SU毕业证书)美国雪城大学毕业证成绩单一模一样
 
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
Guide on the use of Artificial Intelligence-based tools by lawyers and law fi...
 
Genocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptxGenocide in International Criminal Law.pptx
Genocide in International Criminal Law.pptx
 
San Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at SeaSan Remo Manual on International Law Applicable to Armed Conflict at Sea
San Remo Manual on International Law Applicable to Armed Conflict at Sea
 

HIMSS seeks HIPAA Cybersecurity Framework clarifications from NIST

  • 1. 33 West Monroe St, Suite 1700 Chicago, IL 60603-5616 Tel 312 664 4467 Fax 312 664 6143 www.himss.org 1 October 10, 2014 Dr. Willie E. May Acting Director National Institute of Standards and Technology Department of Commerce 100 Bureau Drive Gaithersburg, MD 20899 Dear Dr. May, On behalf of the Healthcare Information and Management Systems Society (HIMSS), we are pleased to provide written comments to the National Institute of Standards and Technology (NIST) in response to the request for information (RFI), “Experience with the Framework for Improving Critical Infrastructure Cybersecurity,” published in the Federal Register on August 26, 2014. HIMSS is a cause-based, global enterprise producing health IT thought leadership, education, events, market research and media services around the world. Founded in 1961, HIMSS encompasses more than 57,000 individuals, of which more than two-thirds work in healthcare provider, governmental and not-for-profit organizations, plus over 640 corporations and over 400 not-for-profit partner organizations that share this cause. HIMSS welcomes the opportunity to contribute to this dialogue, and outlines our answers below to the questions posed in the RFI. Current Awareness of the Cybersecurity Framework  What is the extent of awareness of the Framework among the Nation’s critical infrastructure organizations? Six months after the Framework was issued, has it gained the traction needed to be a factor in how organizations manage cyber risks in the Nation’s critical infrastructure? In regards to the healthcare sector, HIMSS estimates that there is modest awareness about the Framework. There are a few organizations that have implemented the Framework; we note that our estimate is anecdotally based, and likely to be very small.  How have organizations learned about the Framework? Outreach from NIST or another government agency, an association, participation in a NIST workshop, news media? Other source? HIMSS observes that the modest awareness among healthcare organizations appears to have been generated through communications at the workplace, HIMSS and other professional organizations, federal announcements and newsletters, but not necessarily from the media or other mainstream publications.
  • 2. 2  Are critical infrastructure owners and operators working with sector-specific groups, non- profits, and other organizations that support critical infrastructure to receive information and share lessons learned about the Framework? HIMSS has monitored development of the Framework; we’ve shared its progress with our stakeholders. In addition, we’ve submitted comments on the discussion draft with expert input from our HIMSS Privacy and Security Committee, including the following observations: 1) To strengthen cybersecurity and support business objectives of healthcare organizations, we recommend that privacy and security be integrated into the organization’s business objectives; 2) To strengthen cybersecurity, we suggest that organizations increase their resilience to cyber incidents by utilizing lessons learned as part of their short-term and long-term recovery efforts. 3) To better handle incidents, we suggest that healthcare organizations have an incident response plan in place which focuses on handling cyber incidents in terms of the roles and actions of people, processes, and technology within the healthcare organization.[1] We acknowledge and appreciate that NIST has incorporated HIMSS’s comments into Version 1.0 of the Framework.  Is there general awareness that the Framework: a. Is intended for voluntary use? b. Is intended as a cyber risk management tool for all levels of an organization in assessing risk and how cybersecurity factors into risk assessments? a. Yes. For those organizations aware of the Framework, they understand the Framework is intended for voluntary use. However, further education and information-sharing is necessary to alleviate concerns that the Framework is being mandated by regulation or law. b. Yes, we believe it is generally understood that the Framework is intended as a cyber risk management tool for all levels of an organization in assessing risk. We also note that the Framework makes clear how cybersecurity factors into risk assessments. However, we suggest that NIST consider publishing guidance on adoption and use of the Framework, tailored to the type and size of the organization, as we believe such guidance may be helpful.  What are the greatest challenges and opportunities—for NIST, the Federal government more broadly, and the private sector—to improve awareness of the Framework? NIST could improve the field’s awareness of the Framework by providing a means for healthcare organizations – those that have adopted and implemented the Framework – to discuss use of the Framework to their advantage to manage risk. Input could be sought from small, medium, and large healthcare organizations in both urban and rural settings. [1] HIMSS’ Response to NIST Preliminary version of the Cybersecurity Framework; December 2013. http://csrc.nist.gov/cyberframework/framework_comments/20131213_thomas_leary_himss_part2.pdf
  • 3. 3  Is your organization doing any form of outreach or education on cybersecurity risk management (including the Framework)? If so, what kind of outreach and how many entities are you reaching? If not, does your organization plan to do any form of outreach or awareness on the Framework? HIMSS utilizes a variety of outreach and educational initiatives to inform and educate our stakeholders. We also participate with other non-profit organizations representing critical infrastructure sectors, in an information sharing initiative to discuss the Framework. We work with our stakeholders through HIMSS’s volunteer-led Privacy and Security Committee, and associated Task Forces and Work Groups to build educational deliverables relating to risk management, through blog posts and privacy and security toolkits, which are all available on our website. HIMSS also has year-round educational initiatives and deliverables relating to risk management, including the biannual Privacy and Security Forum, and the mHealth Summit Mobile Privacy and Security Symposium. Finally, as appropriate, HIMSS connects with government agencies to provide education and information relating to risk management.  What more can and should be done to raise awareness? We suggest that NIST widely present the Framework at health sector-oriented conferences. Another suggestion is NIST create a repository of information in which organizations across the various critical infrastructure sectors can contribute information, comments, and feedback relevant to experiences, lessons learned, and best practices with respect to adoption and use of the Framework. Experiences with the Cybersecurity Framework  Do organizations in some sectors require some type of sector specific guidance prior to use? Yes, we have observed that the health sector has become acutely aware of cyber attacks, insider threats, and other malicious activity. However, traditionally, healthcare’s focus has been on HIPAA compliance. Compliance, though, does not necessarily mean that information will be kept safe and secure. Accordingly, healthcare providers, other covered entities, and the business associates that do work on behalf of these covered entities, all need practical and detailed guidance on making the transition from “compliance only” to being secure (in the same sense that other critical infrastructure sectors, such as the chemical, electrical, and financial sectors have adopted and embraced security). The healthcare industry also could benefit from specific guidance from NIST (with input from healthcare stakeholders) on what an ideal “target state” would be for a healthcare organization. Stakeholders would also benefit from a common, industry-wide understanding and agreement of what the target state should be as well as standard metrics/tools to measure current state and progress made by a healthcare organization towards that target state. Both privacy risk management and information security risk management should be addressed (as well as the points of intersection and other points of connection between these two spheres). The target state and standard metrics/tools are not provided by HIPAA, the HITECH Act, or other associated or related guidance.
  • 4. 4  Which activities by NIST, the Department of Commerce overall (including the Patent and Trademark Office (PTO); National Telecommunications and Information Administration (NTIA); and the Internet Policy Taskforce (IPTF)) or other departments and agencies could be expanded or initiated to promote implementation of the Framework? The National Initiative for Cybersecurity Education (NICE) could be used to promote better awareness and more specific guidance with regard to the Framework. For example, the PTO could assist with the Framework by ensuring that the quality of patent review and patent application review remains high with respect to patents and patent applications relating to risk management and cybersecurity, in addition to other related arts. Roadmap for the Future of the Cybersecurity Framework  Are key cybersecurity issues and opportunities missing that should be considered as priorities, and if so, what are they and why do they merit special attention? The Framework could explain in detail what constitutes an accurate, thorough, and holistic risk assessment. As we are in an age where much information is electronic and, if information is not secure, it very well may not be private. The Framework could explain in detail how privacy and cybersecurity interrelate. Consideration should also be given to our global economy and global interdependencies and the need to manage risk on a global scale, with the understanding that entities can and do interact across critical infrastructure sectors. The interdependence among the critical infrastructure sectors can result in shared threats and vulnerabilities. This approach would truly be managing risk in the real world, as opposed to managing risk in a vacuum. We suggest that NIST (with input from healthcare stakeholders) bring together government, academia, and industry to develop a Framework which is fluid and flexible enough to be a living document which can be improved and revamped to ensure that the Framework content reflects real world risks and risk management, including in view of interdependencies among the critical infrastructure sectors. According to the 6th Annual HIMSS Security Survey1, released February 19, 2014, more than half of the survey’s respondents (51%) have increased their security budgets in the past year. However, 49% of these organizations are still spending 3% or less of their overall IT budget on security initiatives that will secure patient data— the industry average is cited as 5% of the total IT budget on security. Information security in the health sector is generally underfunded. In spite of this, more healthcare stakeholders are strengthening their information security programs (or are interested in do so, but need additional guidance), in light of recent breaches and cyber attacks. To the extent that other critical infrastructure sectors have applied the Framework to address breaches and cyber attacks, these lessons learned may be of interest to HIMSS and its healthcare stakeholders. 1 HIMSS Security Survey; February 2014: http://www.himss.org/files/2013_HIMSS_Security_Survey.pdf
  • 5. 5 HIMSS appreciates the opportunity to submit comments on this RFI—this framework presents an opportunity for HIMSS to work with NIST to further educate health stakeholders on appropriate information security practices. We look forward to continued dialogue with NIST and the Department of Commerce, and welcome any questions you may have. For more information, please contact Jeff Coughlin, Senior Director of Federal & State Affairs, at 703.562.8824, or Stephanie Jamison, Director of Federal Affairs, at 703.562.8844. Sincerely, Paul Kleeberg, MD, FAAFP, FHIMSS H. Stephen Lieber, CAE Chair, HIMSS Board of Directors President & CEO Chief Medical Informatics Officer HIMSS Stratis Health