SlideShare a Scribd company logo
1 of 20
Florida Hospital Association
14th Annual Health Care Corporate Compliance Education Retreat
June 9, 2017
Presented by:
Barry L. Mathis
Principal, Healthcare Consulting
Hot Topics in Privacy and Security
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 1
About the Speaker
Barry Mathis, Principal, Healthcare Consulting
Barry has nearly three decades of experience in the information technology (IT)
and healthcare industries as a CIO, CTO, senior IT audit manager, and IT risk
management consultant. He has performed and managed complicated HIPAA
security reviews and audits for some of the most sophisticated hospital systems
in the country. Barry is a creative senior level healthcare executive who is
visionary and results-oriented, with demonstrated experience in planning,
developing, and implementing complex information technology solutions to
address business opportunities while reducing IT risk and exposure. He is
adept at project and crisis management, trouble shooting, problem solving, and
negotiating. Barry has strong technical capabilities combined with outstanding
presentation skills and professional pride. He is a prudent risk taker with
proficiency in IT risk management, physician relations, strategic development,
and employee team building.
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 2
Agenda
Changes in the Privacy and Security Ecosystem
What Happens to Hacked Data
Prepare: Take Action
Emerging Technology Risks and Hot Topics
Questions/Answers
Changes in the Privacy and
Security Ecosystem
SECTION 1
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 4
Organized Adversaries
Nation State
Insiders
Organized Crime
Hacktivists
• Economic, political, and/or
military advantage
• Immediate financial gain
• Collect information for
future financial gain
• Personal advantage,
monetary gain
• Professional revenge
• Patriotism
• Influence political and/or
social change
• Pressure business to
change practices
MotivesAdversary
• Trade secrets
• Business information
• Emerging technologies
• Critical infrastructure
• Financial/Payment
Systems
• PII
• PCI
• PHI
• Sales, deals, market
strategies
• Corporate secrets, IP,
R&D
• Business operations
• Personnel information
• Corporate secrets
• Business information
• Information of key
executives, employees,
customers, partners
Targets
• Loss of competitive
advantage
• Disruption to critical
infrastructure
• Regulatory inquiries
and penalties
• Lawsuits
• Loss of confidence
• Trade secret disclosure
• Operational disruption
• Brand and reputation
• National security impact
• Disruption of business
activities
• Brand and reputation
• Loss of consumer
confidence
Impact
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 5
Historical Privacy and
Security Perspectives
Today’s Leading Privacy
and Security Insights
Scope of the Challenge
• Limited to “four walls” and
the extended enterprise
• Spans interconnected global
business ecosystem
Ownership and Accountability
• Security led by IT
• Privacy led by compliance
• Business-aligned and owned;
CEO and board accountable
Adversaries’ Characteristics
• One-off and opportunistic;
motivated by notoriety,
technical challenge, and
individual gain
• Organized, funded and
targeted; motivated by
economic, monetary and
political gain
Information Asset Protection
• One-size-fits-all approach
• Focus on tools, policies &
procedures
• Prioritize and protect your
“crown jewels”
Defense Posture
• Protect the perimeter;
respond if attacked
• Plan, monitor, and rapidly
respond when attacked
Security Intelligence and
Information Sharing
• Keep to yourself
• Public/private partnerships;
collaboration with industry
working groups
Evolving Perspectives
Hot Topics
SECTION 2
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 7
Biomedical - Risks
 Medical devices with features like wireless connectivity, remote
monitoring, and near-field communication tech allow health
professionals to adjust and fine tune implanted devices without
invasive procedures
 Those conveniences also create potential points of exposure
 In one currently used exploit, known as MedJack, attackers inject
malware into medical devices to fan out across a network; the
medical data discovered in these types of attacks can be used for
tax fraud or identity theft, and can even be used to track active drug
prescriptions, enabling hackers to order medication online to sell on
the dark web
 In 2016, Johnson & Johnson notified 114,000 diabetic patients that
a hacker could exploit one of its insulin pumps; the J&J Animas
OneTouch Ping could be attacked, disabling the device or altering
the dosage
Source https://www.wired.com/2017/03/medical-devices-next-security-nightmare/
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 8
Biomedical in the News
 According to HIPAA Journal, a recent study of the pacemaker
ecosystem has uncovered security flaws in devices made by major
manufacturers
 Flaws could potentially be exploited to gain access to sensitive data
and cause devices to malfunction
 Some of the devices stored highly sensitive data, such as medical
histories and Social Security numbers, yet the data was not
encrypted to prevent unauthorized access
 The software used by the pacemaker systems was discovered to
contain more than 8,000 known vulnerabilities in third-party libraries
across all of the devices
Source: http://www.hipaajournal.com/study-uncovers-more-than-8000-security-flaws-in-
pacemakers-from-four-major-manufacturers-8829/
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 9
Biomedical – Response
US Department of Veterans Affairs Malware Attack
 Prompted the following U.S. Federal Bureau of
Investigation Cyber Division response:
“Cyber actors will likely increase cyber intrusions against health care
systems – to include medical devices – due to mandatory transition
from paper to electronic health records (EHR), lax cybersecurity
standards, and a higher financial payout for medical records in the
black market.”
 Prompted revisions to:
 International Organization for Standardization (ISO)/IEC 27000-
series “Information security management systems”
 ISO/IEC 80001 “Application of risk management for IT networks
incorporating medical devices”
Source: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4516335/
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 10
Evolving Ransomware
The most recent variants of ransomware have gone into
stealth mode.
 They are fileless and avoid detection by hiding the payload into
memory or the kernel
 They move under the radar of traditional Anti-Malware
 Fileless malware has been used to record administrator credentials
and passwords
 More than 3 billion user credentials and passwords were stolen in
2016
 Now, 8.2 million passwords are stolen every day
 Approximately 95 passwords are stolen every second
 Per the Verizon Data Breach Investigations report threat actors, or
malicious actors, used stolen passwords 95% of the time in the most
common types of attacks
Source: https://www.sailpoint.com/ransomware-goes-stealth-mode-7-things-can-protect/
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 11
Reputation Ransomware
“New ransomware variant extorts your reputation rather
than money.”
 “Ransoc,” a new form of desktop locking ransomware, screens
machines, Skype, and social media profiles for potential evidence
of pornography or media files downloaded via Torrents
 Current ransomware tends to be focused on file encryption
(“encrypt, and demand ransom to decrypt”)
 Attackers are discovering that taking files hostage (a.k.a.,
extortionware) is only one method of making easy money
 Attack vectors that are designed to collect sensitive data and
threaten to leak that data could very well be the future of the
malware landscape
Source: https://www.scmagazineuk.com/new-ransomware-variant-extorts-your-reputation-rather-than-money/article/573283/
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 12
Drones in Healthcare
 Zipline, launched in 2014, with
support from venture capital firms
such as Sequoia Partners and
Google Ventures, as well as with
funding from Paul Allen, a
Microsoft co-founder
 The company began delivering
medicine and blood in Rwanda in
May 2017 under a government
partnership, and expects to be
operational in half of the country
by the end of June 2017
 The hope is that Zipline's fleet of
drones will help deliver life-saving
materials to remote areas of the
U.S., as it has in Rwanda
Source: http://flyzipline.com
flyzipline.com
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 13
“Dronejacking” – Next Big Cyber Threat?
 A report by Intel's McAfee Labs stated
that hackers are expected to start
targeting drones used for deliveries, law
enforcement or camera crews, in
addition to hobbyists
 "Someone looking to 'dronejack'
deliveries could find a location with
regular drone traffic and wait for the
targets to appear," the report said;
"Once a package delivery drone is
overhead, the drone could be sent to
the ground, allowing the criminal to steal
the package"
Source: http://flyzipline.com
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 14
Machine Learning (ML)
Artificial Intelligence (AI) vs. Machine Learning (ML)
 AI is the broader concept of machines being able to carry out tasks in
a way that is considered “smart”
 ML is a current application of AI based around the idea that machines
should be given access to data and learn for themselves
Source: http://www.fiercehealthcare.com/analytics/boston-hospitals-use-machine-learning-to-manage-most-expensive-illnesses
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 15
Machine Learning Used to Help Protect
 The reality is, in a typical data access environment, anomalies
happen all of the time
 Using ML to gain a deep understanding of data and user access to
data will help identify meaningful indicators of critical data abuse
versus numerous mathematical anomalies that mean more work for
security teams
 A new breed of end-point anti-malware prevention tools using ML to
monitor all activity, learn what is normal and what is a potential
attack, and close the door and capture data can prevent future
attacks
Source: https://www.imperva.com/blog/2017/05/thwart-insider-threats-with-machine-learning-infographic/#sthash.Kz0afJig.dpuf
Source: https://www.ensilo.com/company/approach/
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 16
Hacked Data : Where does it all go?
Source: http://www.informit.com/blogs/blog.aspx?uk=How-the-Internet-Works-The-Deep-Web
Level 0: Common Web - YouTube, Facebook,
Wikipedia and other famous or easily accessible
websites can be found here.
Level 1: -Surface Web
This level is still accessible through normal
means, but contains “darker” websites.
Level 2: - Bergie Web
This level is the last one normally accessible: all
levels that follow this one have to be accessed
with a proxy.
Level 3: - Deep Web
The first part of this level has to be accessed
with a proxy. It contains hacking, data for
purchase… Here begins the Deep Web.
Level 4: - Charter Web
Things such as drug and human trafficking,
banned movies, books and black markets exist
here.
Level 5: - Marianas Web
It is difficult to find anyone who knows about this
level. It more than likely contains secret
government documentation.
4%
80%
Data
Auctions
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 17
The Data Black Market
 Cybercriminals are increasingly using stolen medical records for
other types of identity theft beyond healthcare fraud, including filing
fraudulent tax returns
 "You have experts in different fields. There are those who are great
at obtaining information. And then there are other guys, who will buy
this data and use it to commit fraud," said Etay Maor, an executive
security advisor at IBM Security
 Healthcare records fetch higher prices, as much as 60 times that of
stolen credit card data, because they contain much more information
that a cybercriminal can use
 While a Social Security number can be purchased on the dark Web
for around $15, medical records fetch at least $60 per record
Source: http://www.cnbc.com/2016/03/10/dark-web-is-fertile-ground-for-stolen-medical-records.html
Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 18
Take Action
4
Assess cybersecurity of third parties and supply chain partners,
and ensure they adhere to your security policies and practices
Identify your most valuable information assets, and prioritize
protection of this high-value data
1
Ensure that your cybersecurity strategy is aligned with business
objectives and is strategically funded
3
Understand your adversaries, including their motives,
resources, and methods of attack to help reduce the time from
detect to response
5
Collaborate with others to increase awareness of cybersecurity
threats and response tactics
2
PERSHING YOAKLEY & ASSOCIATES, P.C.
800.270.9629 | www.pyapc.com
Barry L. Mathis
Principal
bmathis@pyapc.com
Thank you!

More Related Content

What's hot

Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachEMC
 
Regulatory Compliance, Risk Management, and the Trustee's Role
Regulatory Compliance, Risk Management, and the Trustee's RoleRegulatory Compliance, Risk Management, and the Trustee's Role
Regulatory Compliance, Risk Management, and the Trustee's RolePYA, P.C.
 
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...Kishore Jethanandani, MBA, MA, MPhil,
 
EFPIA Disclosure & Consent Management
EFPIA Disclosure & Consent ManagementEFPIA Disclosure & Consent Management
EFPIA Disclosure & Consent Managementqordata
 
HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesRedspin, Inc.
 
Data Collaboration in Healthcare -- presented at VLDB 2018
Data Collaboration in Healthcare -- presented at VLDB 2018Data Collaboration in Healthcare -- presented at VLDB 2018
Data Collaboration in Healthcare -- presented at VLDB 2018Anand Deshpande
 
The Shift in the Compliance Landscape
The Shift in the Compliance LandscapeThe Shift in the Compliance Landscape
The Shift in the Compliance LandscapePYA, P.C.
 
National Healthcare Informatics Strategy Role Of Standards
National Healthcare Informatics Strategy Role Of StandardsNational Healthcare Informatics Strategy Role Of Standards
National Healthcare Informatics Strategy Role Of StandardsSaji Salam MD,MBA
 
FLAACOs 2014 Conference - Legal Considerations in Negotiating ACO Contracts ...
FLAACOs 2014 Conference - Legal Considerations in Negotiating ACO Contracts  ...FLAACOs 2014 Conference - Legal Considerations in Negotiating ACO Contracts  ...
FLAACOs 2014 Conference - Legal Considerations in Negotiating ACO Contracts ...MARCYINC
 
Top 6 reasons why you need a referral management system even though you have ...
Top 6 reasons why you need a referral management system even though you have ...Top 6 reasons why you need a referral management system even though you have ...
Top 6 reasons why you need a referral management system even though you have ...GaryRichards30
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk ManagementPYA, P.C.
 
Regulatory relationship-management
Regulatory relationship-managementRegulatory relationship-management
Regulatory relationship-managementMetricStream Inc
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected? Mark Merrill
 

What's hot (18)

Overcoming Major Electronic Health Record (EHR) Challenges in 2018
Overcoming Major Electronic Health Record (EHR) Challenges in 2018Overcoming Major Electronic Health Record (EHR) Challenges in 2018
Overcoming Major Electronic Health Record (EHR) Challenges in 2018
 
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic ApproachRole-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
Role-Based Access Governance and HIPAA Compliance: A Pragmatic Approach
 
Hipaa for business associates simple
Hipaa for business associates   simpleHipaa for business associates   simple
Hipaa for business associates simple
 
Carmel Shachar, "Potential Roadblocks in Health Care Big Data Collection: Gob...
Carmel Shachar, "Potential Roadblocks in Health Care Big Data Collection: Gob...Carmel Shachar, "Potential Roadblocks in Health Care Big Data Collection: Gob...
Carmel Shachar, "Potential Roadblocks in Health Care Big Data Collection: Gob...
 
Regulatory Compliance, Risk Management, and the Trustee's Role
Regulatory Compliance, Risk Management, and the Trustee's RoleRegulatory Compliance, Risk Management, and the Trustee's Role
Regulatory Compliance, Risk Management, and the Trustee's Role
 
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
Enterprise Content Management for Regulatory Compliance in Healthcare and Cre...
 
EFPIA Disclosure & Consent Management
EFPIA Disclosure & Consent ManagementEFPIA Disclosure & Consent Management
EFPIA Disclosure & Consent Management
 
HIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business AssociatesHIPAA Security Risk Analysis for Business Associates
HIPAA Security Risk Analysis for Business Associates
 
Data Collaboration in Healthcare -- presented at VLDB 2018
Data Collaboration in Healthcare -- presented at VLDB 2018Data Collaboration in Healthcare -- presented at VLDB 2018
Data Collaboration in Healthcare -- presented at VLDB 2018
 
DKapellmann_Security Compliance Models
DKapellmann_Security Compliance ModelsDKapellmann_Security Compliance Models
DKapellmann_Security Compliance Models
 
The Shift in the Compliance Landscape
The Shift in the Compliance LandscapeThe Shift in the Compliance Landscape
The Shift in the Compliance Landscape
 
National Healthcare Informatics Strategy Role Of Standards
National Healthcare Informatics Strategy Role Of StandardsNational Healthcare Informatics Strategy Role Of Standards
National Healthcare Informatics Strategy Role Of Standards
 
HIPAA Security 2019
HIPAA Security 2019HIPAA Security 2019
HIPAA Security 2019
 
FLAACOs 2014 Conference - Legal Considerations in Negotiating ACO Contracts ...
FLAACOs 2014 Conference - Legal Considerations in Negotiating ACO Contracts  ...FLAACOs 2014 Conference - Legal Considerations in Negotiating ACO Contracts  ...
FLAACOs 2014 Conference - Legal Considerations in Negotiating ACO Contracts ...
 
Top 6 reasons why you need a referral management system even though you have ...
Top 6 reasons why you need a referral management system even though you have ...Top 6 reasons why you need a referral management system even though you have ...
Top 6 reasons why you need a referral management system even though you have ...
 
Enterprise Risk Management
Enterprise Risk ManagementEnterprise Risk Management
Enterprise Risk Management
 
Regulatory relationship-management
Regulatory relationship-managementRegulatory relationship-management
Regulatory relationship-management
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?
 

Similar to Hot Topics in Healthcare Privacy and Security

Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...mosmedicalreview
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Druva
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? IJNSA Journal
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsESET North America
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsKristie Allison
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Hybrid Cloud
 

Similar to Hot Topics in Healthcare Privacy and Security (20)

Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
Healthcare Attorneys Feel the Healthcare Industry Is More Vulnerable to Cyber...
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?Where In The World Is Your Sensitive Data?
Where In The World Is Your Sensitive Data?
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Healthcare and Cyber security
Healthcare and Cyber securityHealthcare and Cyber security
Healthcare and Cyber security
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Threatsploit Adversary Report January 2019
Threatsploit Adversary Report January  2019Threatsploit Adversary Report January  2019
Threatsploit Adversary Report January 2019
 
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
Protecting Data in the Healthcare Industry - Storage Made Easy - Osterman Res...
 

More from PYA, P.C.

“CARES Act Provider Relief Fund: Opportunities, Compliance, and Reporting”
“CARES Act Provider Relief Fund: Opportunities, Compliance, and Reporting”“CARES Act Provider Relief Fund: Opportunities, Compliance, and Reporting”
“CARES Act Provider Relief Fund: Opportunities, Compliance, and Reporting”PYA, P.C.
 
PYA Presented on 2021 E/M Changes and a CARES Act Update During GHA Complianc...
PYA Presented on 2021 E/M Changes and a CARES Act Update During GHA Complianc...PYA Presented on 2021 E/M Changes and a CARES Act Update During GHA Complianc...
PYA Presented on 2021 E/M Changes and a CARES Act Update During GHA Complianc...PYA, P.C.
 
Webinar: “Trick or Treat? October 22nd Revisions to Provider Relief Fund Repo...
Webinar: “Trick or Treat? October 22nd Revisions to Provider Relief Fund Repo...Webinar: “Trick or Treat? October 22nd Revisions to Provider Relief Fund Repo...
Webinar: “Trick or Treat? October 22nd Revisions to Provider Relief Fund Repo...PYA, P.C.
 
“Regulatory Compliance Enforcement Update: Getting Results from the Guidance”
“Regulatory Compliance Enforcement Update: Getting Results from the Guidance” “Regulatory Compliance Enforcement Update: Getting Results from the Guidance”
“Regulatory Compliance Enforcement Update: Getting Results from the Guidance” PYA, P.C.
 
“Federal Legislative and Regulatory Update,” Webinar at DFWHC
 “Federal Legislative and Regulatory Update,” Webinar at DFWHC “Federal Legislative and Regulatory Update,” Webinar at DFWHC
“Federal Legislative and Regulatory Update,” Webinar at DFWHCPYA, P.C.
 
On-Demand Webinar: Compliance With New Provider Relief Funds Reporting Requir...
On-Demand Webinar: Compliance With New Provider Relief Funds Reporting Requir...On-Demand Webinar: Compliance With New Provider Relief Funds Reporting Requir...
On-Demand Webinar: Compliance With New Provider Relief Funds Reporting Requir...PYA, P.C.
 
Webinar: “While You Were Sleeping…Proposed Rule Positioned to Significantly I...
Webinar: “While You Were Sleeping…Proposed Rule Positioned to Significantly I...Webinar: “While You Were Sleeping…Proposed Rule Positioned to Significantly I...
Webinar: “While You Were Sleeping…Proposed Rule Positioned to Significantly I...PYA, P.C.
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesPYA, P.C.
 
Webinar: CMS Pricing Transparency — Final Rule Requirements, Compliance Chall...
Webinar: CMS Pricing Transparency — Final Rule Requirements, Compliance Chall...Webinar: CMS Pricing Transparency — Final Rule Requirements, Compliance Chall...
Webinar: CMS Pricing Transparency — Final Rule Requirements, Compliance Chall...PYA, P.C.
 
Federal Regulatory Update
Federal Regulatory UpdateFederal Regulatory Update
Federal Regulatory UpdatePYA, P.C.
 
Webinar: Post-Pandemic Provider Realignment — Navigating An Uncertain Market
Webinar: Post-Pandemic Provider Realignment — Navigating An Uncertain MarketWebinar: Post-Pandemic Provider Realignment — Navigating An Uncertain Market
Webinar: Post-Pandemic Provider Realignment — Navigating An Uncertain MarketPYA, P.C.
 
07 24-20 pya webinar covid physician compensation
07 24-20 pya webinar covid physician compensation07 24-20 pya webinar covid physician compensation
07 24-20 pya webinar covid physician compensationPYA, P.C.
 
Engaging Your Board In the COVID-19 Era
Engaging Your Board In the COVID-19 EraEngaging Your Board In the COVID-19 Era
Engaging Your Board In the COVID-19 EraPYA, P.C.
 
Webinar: Free Money with Strings Attached – Cares Act Considerations for Fron...
Webinar: Free Money with Strings Attached – Cares Act Considerations for Fron...Webinar: Free Money with Strings Attached – Cares Act Considerations for Fron...
Webinar: Free Money with Strings Attached – Cares Act Considerations for Fron...PYA, P.C.
 
Webinar: “Got a Payroll? Don’t Leave Money on the Table”
Webinar: “Got a Payroll? Don’t Leave Money on the Table”Webinar: “Got a Payroll? Don’t Leave Money on the Table”
Webinar: “Got a Payroll? Don’t Leave Money on the Table”PYA, P.C.
 
Webinar: So You Have a PPP Loan. Now What?
Webinar: So You Have a PPP Loan. Now What?Webinar: So You Have a PPP Loan. Now What?
Webinar: So You Have a PPP Loan. Now What?PYA, P.C.
 
Webinar: “Making It Work—Physician Compensation During the COVID-19 Pandemic”
Webinar: “Making It Work—Physician Compensation During the COVID-19 Pandemic”Webinar: “Making It Work—Physician Compensation During the COVID-19 Pandemic”
Webinar: “Making It Work—Physician Compensation During the COVID-19 Pandemic”PYA, P.C.
 
Webinar: “Provider Relief Fund Payments – What We Know, What We Don’t Know, W...
Webinar: “Provider Relief Fund Payments – What We Know, What We Don’t Know, W...Webinar: “Provider Relief Fund Payments – What We Know, What We Don’t Know, W...
Webinar: “Provider Relief Fund Payments – What We Know, What We Don’t Know, W...PYA, P.C.
 
Webinar: “Hospitals, Capital, and Cashflow Under COVID-19”
Webinar: “Hospitals, Capital, and Cashflow Under COVID-19”Webinar: “Hospitals, Capital, and Cashflow Under COVID-19”
Webinar: “Hospitals, Capital, and Cashflow Under COVID-19”PYA, P.C.
 
PYA Webinar: “Additional Expansion of Medicare Telehealth Coverage During COV...
PYA Webinar: “Additional Expansion of Medicare Telehealth Coverage During COV...PYA Webinar: “Additional Expansion of Medicare Telehealth Coverage During COV...
PYA Webinar: “Additional Expansion of Medicare Telehealth Coverage During COV...PYA, P.C.
 

More from PYA, P.C. (20)

“CARES Act Provider Relief Fund: Opportunities, Compliance, and Reporting”
“CARES Act Provider Relief Fund: Opportunities, Compliance, and Reporting”“CARES Act Provider Relief Fund: Opportunities, Compliance, and Reporting”
“CARES Act Provider Relief Fund: Opportunities, Compliance, and Reporting”
 
PYA Presented on 2021 E/M Changes and a CARES Act Update During GHA Complianc...
PYA Presented on 2021 E/M Changes and a CARES Act Update During GHA Complianc...PYA Presented on 2021 E/M Changes and a CARES Act Update During GHA Complianc...
PYA Presented on 2021 E/M Changes and a CARES Act Update During GHA Complianc...
 
Webinar: “Trick or Treat? October 22nd Revisions to Provider Relief Fund Repo...
Webinar: “Trick or Treat? October 22nd Revisions to Provider Relief Fund Repo...Webinar: “Trick or Treat? October 22nd Revisions to Provider Relief Fund Repo...
Webinar: “Trick or Treat? October 22nd Revisions to Provider Relief Fund Repo...
 
“Regulatory Compliance Enforcement Update: Getting Results from the Guidance”
“Regulatory Compliance Enforcement Update: Getting Results from the Guidance” “Regulatory Compliance Enforcement Update: Getting Results from the Guidance”
“Regulatory Compliance Enforcement Update: Getting Results from the Guidance”
 
“Federal Legislative and Regulatory Update,” Webinar at DFWHC
 “Federal Legislative and Regulatory Update,” Webinar at DFWHC “Federal Legislative and Regulatory Update,” Webinar at DFWHC
“Federal Legislative and Regulatory Update,” Webinar at DFWHC
 
On-Demand Webinar: Compliance With New Provider Relief Funds Reporting Requir...
On-Demand Webinar: Compliance With New Provider Relief Funds Reporting Requir...On-Demand Webinar: Compliance With New Provider Relief Funds Reporting Requir...
On-Demand Webinar: Compliance With New Provider Relief Funds Reporting Requir...
 
Webinar: “While You Were Sleeping…Proposed Rule Positioned to Significantly I...
Webinar: “While You Were Sleeping…Proposed Rule Positioned to Significantly I...Webinar: “While You Were Sleeping…Proposed Rule Positioned to Significantly I...
Webinar: “While You Were Sleeping…Proposed Rule Positioned to Significantly I...
 
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the ScenesWebinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
Webinar: “Cybersecurity During COVID-19: A Look Behind the Scenes
 
Webinar: CMS Pricing Transparency — Final Rule Requirements, Compliance Chall...
Webinar: CMS Pricing Transparency — Final Rule Requirements, Compliance Chall...Webinar: CMS Pricing Transparency — Final Rule Requirements, Compliance Chall...
Webinar: CMS Pricing Transparency — Final Rule Requirements, Compliance Chall...
 
Federal Regulatory Update
Federal Regulatory UpdateFederal Regulatory Update
Federal Regulatory Update
 
Webinar: Post-Pandemic Provider Realignment — Navigating An Uncertain Market
Webinar: Post-Pandemic Provider Realignment — Navigating An Uncertain MarketWebinar: Post-Pandemic Provider Realignment — Navigating An Uncertain Market
Webinar: Post-Pandemic Provider Realignment — Navigating An Uncertain Market
 
07 24-20 pya webinar covid physician compensation
07 24-20 pya webinar covid physician compensation07 24-20 pya webinar covid physician compensation
07 24-20 pya webinar covid physician compensation
 
Engaging Your Board In the COVID-19 Era
Engaging Your Board In the COVID-19 EraEngaging Your Board In the COVID-19 Era
Engaging Your Board In the COVID-19 Era
 
Webinar: Free Money with Strings Attached – Cares Act Considerations for Fron...
Webinar: Free Money with Strings Attached – Cares Act Considerations for Fron...Webinar: Free Money with Strings Attached – Cares Act Considerations for Fron...
Webinar: Free Money with Strings Attached – Cares Act Considerations for Fron...
 
Webinar: “Got a Payroll? Don’t Leave Money on the Table”
Webinar: “Got a Payroll? Don’t Leave Money on the Table”Webinar: “Got a Payroll? Don’t Leave Money on the Table”
Webinar: “Got a Payroll? Don’t Leave Money on the Table”
 
Webinar: So You Have a PPP Loan. Now What?
Webinar: So You Have a PPP Loan. Now What?Webinar: So You Have a PPP Loan. Now What?
Webinar: So You Have a PPP Loan. Now What?
 
Webinar: “Making It Work—Physician Compensation During the COVID-19 Pandemic”
Webinar: “Making It Work—Physician Compensation During the COVID-19 Pandemic”Webinar: “Making It Work—Physician Compensation During the COVID-19 Pandemic”
Webinar: “Making It Work—Physician Compensation During the COVID-19 Pandemic”
 
Webinar: “Provider Relief Fund Payments – What We Know, What We Don’t Know, W...
Webinar: “Provider Relief Fund Payments – What We Know, What We Don’t Know, W...Webinar: “Provider Relief Fund Payments – What We Know, What We Don’t Know, W...
Webinar: “Provider Relief Fund Payments – What We Know, What We Don’t Know, W...
 
Webinar: “Hospitals, Capital, and Cashflow Under COVID-19”
Webinar: “Hospitals, Capital, and Cashflow Under COVID-19”Webinar: “Hospitals, Capital, and Cashflow Under COVID-19”
Webinar: “Hospitals, Capital, and Cashflow Under COVID-19”
 
PYA Webinar: “Additional Expansion of Medicare Telehealth Coverage During COV...
PYA Webinar: “Additional Expansion of Medicare Telehealth Coverage During COV...PYA Webinar: “Additional Expansion of Medicare Telehealth Coverage During COV...
PYA Webinar: “Additional Expansion of Medicare Telehealth Coverage During COV...
 

Recently uploaded

Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipurseemahedar019
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...High Profile Call Girls Chandigarh Aarushi
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591adityaroy0215
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...Gfnyt.com
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknowgragteena
 
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliCall Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliHigh Profile Call Girls Chandigarh Aarushi
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhVip call girls In Chandigarh
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girls Service Chandigarh Ayushi
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Miss joya
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaRussian Call Girls in Ludhiana
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking Modelsindiancallgirl4rent
 

Recently uploaded (20)

Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
 
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi ❤️🍑 9907093804 👄🫦 Independent Escort ...
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
 
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service DehradunCall Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
Call Girl Dehradun Aashi 🔝 7001305949 🔝 💃 Independent Escort Service Dehradun
 
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service MohaliCall Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
Call Girls in Mohali Surbhi ❤️🍑 9907093804 👄🫦 Independent Escort Service Mohali
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Mumbai Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
 
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
Vip Kolkata Call Girls Cossipore 👉 8250192130 ❣️💯 Available With Room 24×7
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
College Call Girls Dehradun Kavya 🔝 7001305949 🔝 📍 Independent Escort Service...
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In LudhianaHot  Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
Hot Call Girl In Ludhiana 👅🥵 9053'900678 Call Girls Service In Ludhiana
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
 
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 8854095900 Real Russian Girls Looking Models
 

Hot Topics in Healthcare Privacy and Security

  • 1. Florida Hospital Association 14th Annual Health Care Corporate Compliance Education Retreat June 9, 2017 Presented by: Barry L. Mathis Principal, Healthcare Consulting Hot Topics in Privacy and Security
  • 2. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 1 About the Speaker Barry Mathis, Principal, Healthcare Consulting Barry has nearly three decades of experience in the information technology (IT) and healthcare industries as a CIO, CTO, senior IT audit manager, and IT risk management consultant. He has performed and managed complicated HIPAA security reviews and audits for some of the most sophisticated hospital systems in the country. Barry is a creative senior level healthcare executive who is visionary and results-oriented, with demonstrated experience in planning, developing, and implementing complex information technology solutions to address business opportunities while reducing IT risk and exposure. He is adept at project and crisis management, trouble shooting, problem solving, and negotiating. Barry has strong technical capabilities combined with outstanding presentation skills and professional pride. He is a prudent risk taker with proficiency in IT risk management, physician relations, strategic development, and employee team building.
  • 3. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 2 Agenda Changes in the Privacy and Security Ecosystem What Happens to Hacked Data Prepare: Take Action Emerging Technology Risks and Hot Topics Questions/Answers
  • 4. Changes in the Privacy and Security Ecosystem SECTION 1
  • 5. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 4 Organized Adversaries Nation State Insiders Organized Crime Hacktivists • Economic, political, and/or military advantage • Immediate financial gain • Collect information for future financial gain • Personal advantage, monetary gain • Professional revenge • Patriotism • Influence political and/or social change • Pressure business to change practices MotivesAdversary • Trade secrets • Business information • Emerging technologies • Critical infrastructure • Financial/Payment Systems • PII • PCI • PHI • Sales, deals, market strategies • Corporate secrets, IP, R&D • Business operations • Personnel information • Corporate secrets • Business information • Information of key executives, employees, customers, partners Targets • Loss of competitive advantage • Disruption to critical infrastructure • Regulatory inquiries and penalties • Lawsuits • Loss of confidence • Trade secret disclosure • Operational disruption • Brand and reputation • National security impact • Disruption of business activities • Brand and reputation • Loss of consumer confidence Impact
  • 6. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 5 Historical Privacy and Security Perspectives Today’s Leading Privacy and Security Insights Scope of the Challenge • Limited to “four walls” and the extended enterprise • Spans interconnected global business ecosystem Ownership and Accountability • Security led by IT • Privacy led by compliance • Business-aligned and owned; CEO and board accountable Adversaries’ Characteristics • One-off and opportunistic; motivated by notoriety, technical challenge, and individual gain • Organized, funded and targeted; motivated by economic, monetary and political gain Information Asset Protection • One-size-fits-all approach • Focus on tools, policies & procedures • Prioritize and protect your “crown jewels” Defense Posture • Protect the perimeter; respond if attacked • Plan, monitor, and rapidly respond when attacked Security Intelligence and Information Sharing • Keep to yourself • Public/private partnerships; collaboration with industry working groups Evolving Perspectives
  • 8. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 7 Biomedical - Risks  Medical devices with features like wireless connectivity, remote monitoring, and near-field communication tech allow health professionals to adjust and fine tune implanted devices without invasive procedures  Those conveniences also create potential points of exposure  In one currently used exploit, known as MedJack, attackers inject malware into medical devices to fan out across a network; the medical data discovered in these types of attacks can be used for tax fraud or identity theft, and can even be used to track active drug prescriptions, enabling hackers to order medication online to sell on the dark web  In 2016, Johnson & Johnson notified 114,000 diabetic patients that a hacker could exploit one of its insulin pumps; the J&J Animas OneTouch Ping could be attacked, disabling the device or altering the dosage Source https://www.wired.com/2017/03/medical-devices-next-security-nightmare/
  • 9. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 8 Biomedical in the News  According to HIPAA Journal, a recent study of the pacemaker ecosystem has uncovered security flaws in devices made by major manufacturers  Flaws could potentially be exploited to gain access to sensitive data and cause devices to malfunction  Some of the devices stored highly sensitive data, such as medical histories and Social Security numbers, yet the data was not encrypted to prevent unauthorized access  The software used by the pacemaker systems was discovered to contain more than 8,000 known vulnerabilities in third-party libraries across all of the devices Source: http://www.hipaajournal.com/study-uncovers-more-than-8000-security-flaws-in- pacemakers-from-four-major-manufacturers-8829/
  • 10. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 9 Biomedical – Response US Department of Veterans Affairs Malware Attack  Prompted the following U.S. Federal Bureau of Investigation Cyber Division response: “Cyber actors will likely increase cyber intrusions against health care systems – to include medical devices – due to mandatory transition from paper to electronic health records (EHR), lax cybersecurity standards, and a higher financial payout for medical records in the black market.”  Prompted revisions to:  International Organization for Standardization (ISO)/IEC 27000- series “Information security management systems”  ISO/IEC 80001 “Application of risk management for IT networks incorporating medical devices” Source: https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4516335/
  • 11. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 10 Evolving Ransomware The most recent variants of ransomware have gone into stealth mode.  They are fileless and avoid detection by hiding the payload into memory or the kernel  They move under the radar of traditional Anti-Malware  Fileless malware has been used to record administrator credentials and passwords  More than 3 billion user credentials and passwords were stolen in 2016  Now, 8.2 million passwords are stolen every day  Approximately 95 passwords are stolen every second  Per the Verizon Data Breach Investigations report threat actors, or malicious actors, used stolen passwords 95% of the time in the most common types of attacks Source: https://www.sailpoint.com/ransomware-goes-stealth-mode-7-things-can-protect/
  • 12. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 11 Reputation Ransomware “New ransomware variant extorts your reputation rather than money.”  “Ransoc,” a new form of desktop locking ransomware, screens machines, Skype, and social media profiles for potential evidence of pornography or media files downloaded via Torrents  Current ransomware tends to be focused on file encryption (“encrypt, and demand ransom to decrypt”)  Attackers are discovering that taking files hostage (a.k.a., extortionware) is only one method of making easy money  Attack vectors that are designed to collect sensitive data and threaten to leak that data could very well be the future of the malware landscape Source: https://www.scmagazineuk.com/new-ransomware-variant-extorts-your-reputation-rather-than-money/article/573283/
  • 13. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 12 Drones in Healthcare  Zipline, launched in 2014, with support from venture capital firms such as Sequoia Partners and Google Ventures, as well as with funding from Paul Allen, a Microsoft co-founder  The company began delivering medicine and blood in Rwanda in May 2017 under a government partnership, and expects to be operational in half of the country by the end of June 2017  The hope is that Zipline's fleet of drones will help deliver life-saving materials to remote areas of the U.S., as it has in Rwanda Source: http://flyzipline.com flyzipline.com
  • 14. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 13 “Dronejacking” – Next Big Cyber Threat?  A report by Intel's McAfee Labs stated that hackers are expected to start targeting drones used for deliveries, law enforcement or camera crews, in addition to hobbyists  "Someone looking to 'dronejack' deliveries could find a location with regular drone traffic and wait for the targets to appear," the report said; "Once a package delivery drone is overhead, the drone could be sent to the ground, allowing the criminal to steal the package" Source: http://flyzipline.com
  • 15. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 14 Machine Learning (ML) Artificial Intelligence (AI) vs. Machine Learning (ML)  AI is the broader concept of machines being able to carry out tasks in a way that is considered “smart”  ML is a current application of AI based around the idea that machines should be given access to data and learn for themselves Source: http://www.fiercehealthcare.com/analytics/boston-hospitals-use-machine-learning-to-manage-most-expensive-illnesses
  • 16. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 15 Machine Learning Used to Help Protect  The reality is, in a typical data access environment, anomalies happen all of the time  Using ML to gain a deep understanding of data and user access to data will help identify meaningful indicators of critical data abuse versus numerous mathematical anomalies that mean more work for security teams  A new breed of end-point anti-malware prevention tools using ML to monitor all activity, learn what is normal and what is a potential attack, and close the door and capture data can prevent future attacks Source: https://www.imperva.com/blog/2017/05/thwart-insider-threats-with-machine-learning-infographic/#sthash.Kz0afJig.dpuf Source: https://www.ensilo.com/company/approach/
  • 17. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 16 Hacked Data : Where does it all go? Source: http://www.informit.com/blogs/blog.aspx?uk=How-the-Internet-Works-The-Deep-Web Level 0: Common Web - YouTube, Facebook, Wikipedia and other famous or easily accessible websites can be found here. Level 1: -Surface Web This level is still accessible through normal means, but contains “darker” websites. Level 2: - Bergie Web This level is the last one normally accessible: all levels that follow this one have to be accessed with a proxy. Level 3: - Deep Web The first part of this level has to be accessed with a proxy. It contains hacking, data for purchase… Here begins the Deep Web. Level 4: - Charter Web Things such as drug and human trafficking, banned movies, books and black markets exist here. Level 5: - Marianas Web It is difficult to find anyone who knows about this level. It more than likely contains secret government documentation. 4% 80% Data Auctions
  • 18. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 17 The Data Black Market  Cybercriminals are increasingly using stolen medical records for other types of identity theft beyond healthcare fraud, including filing fraudulent tax returns  "You have experts in different fields. There are those who are great at obtaining information. And then there are other guys, who will buy this data and use it to commit fraud," said Etay Maor, an executive security advisor at IBM Security  Healthcare records fetch higher prices, as much as 60 times that of stolen credit card data, because they contain much more information that a cybercriminal can use  While a Social Security number can be purchased on the dark Web for around $15, medical records fetch at least $60 per record Source: http://www.cnbc.com/2016/03/10/dark-web-is-fertile-ground-for-stolen-medical-records.html
  • 19. Prepared for Florida Hospital Association – 14th Annual Health Care Corporate Compliance Education Retreat Page 18 Take Action 4 Assess cybersecurity of third parties and supply chain partners, and ensure they adhere to your security policies and practices Identify your most valuable information assets, and prioritize protection of this high-value data 1 Ensure that your cybersecurity strategy is aligned with business objectives and is strategically funded 3 Understand your adversaries, including their motives, resources, and methods of attack to help reduce the time from detect to response 5 Collaborate with others to increase awareness of cybersecurity threats and response tactics 2
  • 20. PERSHING YOAKLEY & ASSOCIATES, P.C. 800.270.9629 | www.pyapc.com Barry L. Mathis Principal bmathis@pyapc.com Thank you!