SlideShare a Scribd company logo
IoT:n tietoturva terveydenhuollossa
21.3.2017
Copyright 2017 FUJITSU
IoT in healthcare
1
Little data… ability to react with speed + Big data… ability to act at scale
Healthcare domain embraces IoT to make its services better than ever.
For the sake of higher quality delivery.
And drive down costs from clinical and
operations inefficiencies.
Various medical devices,
sensors, and diagnostic and
imaging devices constitute
a core part of IoT-based
healthcare services.
Copyright 2017 FUJITSU
Prime target for malicious cyber groups
 “The health sector will continue to be pummeled by any and every script
kiddie and sophisticated cybercriminal dedicated to exfiltrating
electronic health records and PII for infinite variation of use and optimal
capitalization on dark web forums”
 Immense budgets + seasoned experts
against
minuscule resources + time + dedication
 All you need is only one cyber-hygienically apathetic employee in one of
the target organizations that opens an attachment or clicks a maliciou
2
Immense budgets + seasoned experts against minuscule resources + time + dedication
Administration
Care area
Patient room
Medical devices
“The health sector will continue to be pummeled by any and every script
kiddie and sophisticated cybercriminal dedicated to exfiltrating
electronic health records and personally identifiable information for
infinite variation of use and optimal capitalization on dark web forums.”
Copyright 2017 FUJITSU
Hacking incidents on the rise
3
“Wall of shame”
Copyright 2017 FUJITSU
Patients alerted of vulnerable “endpoints”
4
“… could then be used to modify
programming commands to the
implanted device, which could
result in rapid battery depletion
and/or administration of
inappropriate pacing or shocks.”
“…a hacker could exploit
to overdose diabetic
patients with insulin.”
Copyright 2017 FUJITSU
Attention on medical device security
5
EU is concerned about healthcare IoT security
New medical systems and devices need to be classified according to
their risk before they can be certified and conformity with the Medical
Devices Directive, the In Vitro Diagnostic Device Directive or the Active
Implantable Medical Device Directive can be confirmed. Conformity
with MDD is also applicable to certain ICT products used in hospitals.
Copyright 2017 FUJITSU
Hospital devices: frankensteined attack surface
6
Threat modelling the clinical scenario is a scary job
The attack surface for medical devices is simply
larger than the maturity of standardized
procedures to test those surface areas.
Device testing: time available,
tools available, skill level
available? Postmarket
management of cybersecurity?
Hardware physical interfaces
Physical networking ports
Debug / admin ports
WiFi / RF
Data transfer and storage
Cryptographic implementations
HL7 implementations
Hardware sensors
Input parsing / validation
Command / data authentication
Integrated clinical environment:
a platform to create a medical
‘Internet of Things’ around the
care of a single patient.
Heterogeneous medical devices
& auxiliary apps from different
vendors connected together.
Copyright 2017 FUJITSU
Security challenge in healthcare environment
7
Security aspects are considered in OT,
but given that most systems are not
connected it is mostly physical security.
Security concepts such as user-based access
control applies less often in OT systems than
they do in IT.
Similar to transition from Industrie 3.0 to Industrie 4.0
Copyright 2017 FUJITSU
Medical device hijack (zero-day attack)
8
Connected to Internet? Poor authentication? Local Admin privilege apps? Vendor remote access?
Unpatched OS? Unnecessary services enabled? Communication not secure? No encryption? No anti-
virus installed? Security patches not applied – ever? Running on end-of-life operating system?
Medical devices have become a key pivot point for attackers within healthcare networks
Devices vulnerable to MEDJACK.3 includes diagnostic equipment (PET scanners, CT scanners, MRI machines, etc.),
therapeutic equipment (infusion pumps, medical lasers, surgical machines), life support equipment (heart – lung
machines, medical ventilators, extracorporeal membrane oxygenation machines and dialysis machines) and more.
Copyright 2017 FUJITSU
From hacks to hospitals being ransomed
9
Medical space is extremely vulnerable to these issues
“34% of Health Trusts in the
U.K., and 60% of Scottish trusts,
hit with ransomware within the
last 18 months. One NHS area
had to transfer patients
because they were shut down.
Other countries affected as well,
including Germany.”
When ransomware happens the payment is usually in bitcoin.
Companies getting hacked often don’t know anything about bitcoin, and are
hiring law firms to acquire and hold bitcoin for them in case they get hacked.
Copyright 2017 FUJITSU
Shift to ransomware
10
Attackers are shifting their attention to
ransomware attacks because of the glut of stolen
health information hitting the black market.
88 out of the 260 NHS trusts
across England, Scotland,
and Wales were the victim
of ransomware attacks over
the last 18-month period.
Dark Web examples:
Ransomware-as-a-Service listed on Alphabay and
Ransomware Kit on DreamMarket, both fully
undetectable by traditional security technologies.
Victims' need to access the infected system is greater than the fiscal demands of the attacker
Copyright 2017 FUJITSU
SAMAS RansomWorm
 Domain Credential Theft
 Exploit front-facing servers for a known
vulnerability (CVE-2010-0738)
 Once inside, use Mimikatz/Bladabindi/Derusbi
to steal domain admin credentials
 Active Directory Reconnaissance
 Query AD with Windows Utility (CSVDE)
 Verify a target is alive using PING command
 Lateral Movement
 Install infection using Windows Utility (PSEXEC)
 Infect the endpoint
 Self-propagate through the network, until each
and every endpoint and server is locked down
11
Spreads inside throughout entire network to encrypt every server & computer — and backups
Time will tell
might not be a
good security
approach.
Copyright 2017 FUJITSU
EU Agency for Network and Information Security
12
Most critical are interconnected clinical information systems and networked medical devices
Due to the great number of significant assets at stake (patient life, sensitive personal
information and financial resources) information security is a key issue for smart hospitals.
The notion of smart hospitals is introduced when IoT
components are supporting core functions of a hospital:
Establish effective enterprise governance for cyber security
Implement state-of-the-art security measures
Provide specific IT security requirements for IoT components
Invest in Network Information Service products
Establish an information security sharing mechanism
Conduct risk assessment and vulnerability assessment
Perform penetration testing and auditing
Support multi-stakeholder communication platforms (ISACs)
Copyright 2017 FUJITSU
IoT healthcare services and applications
Focus on the following security requirements:
Confidentiality Integrity Availability
Data freshness Non-repudiation Authorization
Resiliency Fault tolerance Self-healing
13
Source:
The Internet of Things for Health Care:
A Comprehensive Survey, IEEE, 2015
Data-in-motion protection
interruption, interception, modification, fabrication, replay
Host properties
user compromise, hardware compromise, software compromise
Network properties
standard protocol compromise, network protocol stack attack
Copyright 2017 FUJITSU
Industrial IoT security framework
14
Security model & policy:
ensure confidentiality, integrity and availability of the system
Data protection
Security configuration & management
Security monitoring & analysis:
preserving system state throughout the operational lifecycle
Communications & connectivity protection:
cryptographic techniques for integrity and confidentiality, information flow control techniques
Endpoint protection (egde & cloud):
physical security functions, cyber security techniques and an authoritative identity
Source: Industrial Internet Consortium Security Working Group
Copyright 2017 FUJITSU
Fujitsu’s security offerings
15
PalmSecure
SURIENT
Content –
Web, Email
and DLP
Endpoint
protection
Firewalls,
NGFW and
IDS/IPS
Managed Security Services
Security
Assessments
incl. GDPR
Continuity and
Resilience
Consultancy
Technical
Design and
Integration
Cyber Threat
Response
Security
Consultancy
IDaaS Advanced
Threat
Protection
SIEM and
SIEMaaS
Vulnerability
Management
Identity &
Access Mgmt
Consultancy and Advisory
Cyber Threat
Intelligence
Products
Copyright 2017 FUJITSU
Intelligence led security
16
Copyright 2017 FUJITSU

More Related Content

What's hot

Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
Frank Siepmann
 
اینترنت اشیاء در حوزه سلامت
اینترنت  اشیاء در حوزه سلامت اینترنت  اشیاء در حوزه سلامت
اینترنت اشیاء در حوزه سلامت
Mahmood Khosravi
 
[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security
OWASP
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
Domenico Catalano
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
redpel dot com
 
HP Whitepaper BYOD in Healthcare
 HP Whitepaper BYOD in Healthcare  HP Whitepaper BYOD in Healthcare
HP Whitepaper BYOD in Healthcare
Wirehead Technology
 
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Priyanka Aash
 
Using Real Time Communication Provide Emergency Treatment and Hospital Search...
Using Real Time Communication Provide Emergency Treatment and Hospital Search...Using Real Time Communication Provide Emergency Treatment and Hospital Search...
Using Real Time Communication Provide Emergency Treatment and Hospital Search...
IRJET Journal
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
IRJET Journal
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET Journal
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
VMware Tanzu
 
Health care analytics
Health care analyticsHealth care analytics
Health care analytics
Rohit Bisht
 
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
ijceronline
 
N018138696
N018138696N018138696
N018138696
IOSR Journals
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical Devices
SecurityMetrics
 
Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...
AndrewSebastian17
 
IoT in Healthcare
IoT in HealthcareIoT in Healthcare
IoT in Healthcare
Vish Anantraman
 
Internet of things
Internet of thingsInternet of things
Internet of things
varungoyal98
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
Domenico Catalano
 

What's hot (20)

Medical device security presentation - Frank Siepmann
Medical device security presentation - Frank SiepmannMedical device security presentation - Frank Siepmann
Medical device security presentation - Frank Siepmann
 
اینترنت اشیاء در حوزه سلامت
اینترنت  اشیاء در حوزه سلامت اینترنت  اشیاء در حوزه سلامت
اینترنت اشیاء در حوزه سلامت
 
[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security
 
UMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenarioUMA as Authorization mechanism for IoT: a healthcare scenario
UMA as Authorization mechanism for IoT: a healthcare scenario
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
 
HP Whitepaper BYOD in Healthcare
 HP Whitepaper BYOD in Healthcare  HP Whitepaper BYOD in Healthcare
HP Whitepaper BYOD in Healthcare
 
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security Impact
 
Using Real Time Communication Provide Emergency Treatment and Hospital Search...
Using Real Time Communication Provide Emergency Treatment and Hospital Search...Using Real Time Communication Provide Emergency Treatment and Hospital Search...
Using Real Time Communication Provide Emergency Treatment and Hospital Search...
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud ComputingIRJET- Comprehensive Study of E-Health Security in Cloud Computing
IRJET- Comprehensive Study of E-Health Security in Cloud Computing
 
Personal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using SpringPersonal Healthcare IOT on PCF Using Spring
Personal Healthcare IOT on PCF Using Spring
 
Health care analytics
Health care analyticsHealth care analytics
Health care analytics
 
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...
 
N018138696
N018138696N018138696
N018138696
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical Devices
 
Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...
 
IoT in Healthcare
IoT in HealthcareIoT in Healthcare
IoT in Healthcare
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 

Similar to IoT tietoturva terveydenhuollossa, 2017-03-21, gko

Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
Unisys Corporation
 
Andy-Bridden-IoMT-Canterburyv1.pptx
Andy-Bridden-IoMT-Canterburyv1.pptxAndy-Bridden-IoMT-Canterburyv1.pptx
Andy-Bridden-IoMT-Canterburyv1.pptx
safsda1
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
PacificResearchPlatform
 
Medical Security [EN] .pdf
Medical       Security      [EN]    .pdfMedical       Security      [EN]    .pdf
Medical Security [EN] .pdf
Snarky Security
 
Improving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of ThingsImproving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of Things
CitiusTech
 
Cybersecurity Challenges in the Healthcare Industry.pdf
Cybersecurity Challenges in the Healthcare Industry.pdfCybersecurity Challenges in the Healthcare Industry.pdf
Cybersecurity Challenges in the Healthcare Industry.pdf
MobibizIndia1
 
Why healthcare is the biggest target for cyberattacks-converted.pdf
Why healthcare is the biggest target for cyberattacks-converted.pdfWhy healthcare is the biggest target for cyberattacks-converted.pdf
Why healthcare is the biggest target for cyberattacks-converted.pdf
Sparity1
 
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
J On The Beach
 
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
The Lifesciences Magazine
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
AdilsonSuende
 
Security and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devicesSecurity and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devices
Zoe Gilbert
 
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
Ivanti
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
 
Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...
PayamBarnaghi
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
ijtsrd
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
IJARIIT
 
Pharmaceutical companies and security
Pharmaceutical companies and securityPharmaceutical companies and security
Pharmaceutical companies and security
Juliette Foine
 
The role of the internet of things in healthcare future trends and challenges
The role of the internet of things in healthcare future trends and challengesThe role of the internet of things in healthcare future trends and challenges
The role of the internet of things in healthcare future trends and challenges
Noman Shaikh
 

Similar to IoT tietoturva terveydenhuollossa, 2017-03-21, gko (20)

Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Andy-Bridden-IoMT-Canterburyv1.pptx
Andy-Bridden-IoMT-Canterburyv1.pptxAndy-Bridden-IoMT-Canterburyv1.pptx
Andy-Bridden-IoMT-Canterburyv1.pptx
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
Medical Security [EN] .pdf
Medical       Security      [EN]    .pdfMedical       Security      [EN]    .pdf
Medical Security [EN] .pdf
 
Improving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of ThingsImproving Efficiency and Outcomes in Healthcare using Internet of Things
Improving Efficiency and Outcomes in Healthcare using Internet of Things
 
Cybersecurity Challenges in the Healthcare Industry.pdf
Cybersecurity Challenges in the Healthcare Industry.pdfCybersecurity Challenges in the Healthcare Industry.pdf
Cybersecurity Challenges in the Healthcare Industry.pdf
 
Why healthcare is the biggest target for cyberattacks-converted.pdf
Why healthcare is the biggest target for cyberattacks-converted.pdfWhy healthcare is the biggest target for cyberattacks-converted.pdf
Why healthcare is the biggest target for cyberattacks-converted.pdf
 
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...
 
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
Best 3 Cyber Threats in Healthcare Organizations Today | The Lifesciences Mag...
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Security and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devicesSecurity and privacy issues with io t healthcare devices
Security and privacy issues with io t healthcare devices
 
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
 
Pharmaceutical companies and security
Pharmaceutical companies and securityPharmaceutical companies and security
Pharmaceutical companies and security
 
The role of the internet of things in healthcare future trends and challenges
The role of the internet of things in healthcare future trends and challengesThe role of the internet of things in healthcare future trends and challenges
The role of the internet of things in healthcare future trends and challenges
 
EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8EHLP - July 2015 pg 6-8
EHLP - July 2015 pg 6-8
 

More from Glen Koskela

Using Blockchain to Exchange Retail Value
Using Blockchain to Exchange Retail ValueUsing Blockchain to Exchange Retail Value
Using Blockchain to Exchange Retail Value
Glen Koskela
 
From Frictionless to Human Centric Retail
From Frictionless to Human Centric RetailFrom Frictionless to Human Centric Retail
From Frictionless to Human Centric Retail
Glen Koskela
 
Digital Transformation in the Retail Business
Digital Transformation in the Retail BusinessDigital Transformation in the Retail Business
Digital Transformation in the Retail Business
Glen Koskela
 
Employee and Customer Facing AI Applications
Employee and Customer Facing AI ApplicationsEmployee and Customer Facing AI Applications
Employee and Customer Facing AI Applications
Glen Koskela
 
Digital Annealer Keynote
Digital Annealer KeynoteDigital Annealer Keynote
Digital Annealer Keynote
Glen Koskela
 
Social (assistive) robots
Social (assistive) robotsSocial (assistive) robots
Social (assistive) robots
Glen Koskela
 
Differentiation through digital innovation and transformation
Differentiation through digital innovation and transformationDifferentiation through digital innovation and transformation
Differentiation through digital innovation and transformation
Glen Koskela
 
From digitalization to innovation and transformation
From digitalization to innovation and transformationFrom digitalization to innovation and transformation
From digitalization to innovation and transformation
Glen Koskela
 
IoT trends and innovations
IoT trends and innovationsIoT trends and innovations
IoT trends and innovations
Glen Koskela
 
Building an innovative future
Building an innovative futureBuilding an innovative future
Building an innovative future
Glen Koskela
 
Dream of the smart city
Dream of the smart cityDream of the smart city
Dream of the smart city
Glen Koskela
 
Tulevaisuuden tietotyötä
Tulevaisuuden tietotyötäTulevaisuuden tietotyötä
Tulevaisuuden tietotyötä
Glen Koskela
 
Industrial IoT based on SAP Technology
Industrial IoT based on SAP TechnologyIndustrial IoT based on SAP Technology
Industrial IoT based on SAP Technology
Glen Koskela
 
Could Service Provider Forum
Could Service Provider ForumCould Service Provider Forum
Could Service Provider Forum
Glen Koskela
 
Stories of digitalization, 2017 05-09, gko
Stories of digitalization, 2017 05-09, gkoStories of digitalization, 2017 05-09, gko
Stories of digitalization, 2017 05-09, gko
Glen Koskela
 
Artificial intelligence (wo video), 2017 05-23, gko
Artificial intelligence (wo video), 2017 05-23, gkoArtificial intelligence (wo video), 2017 05-23, gko
Artificial intelligence (wo video), 2017 05-23, gko
Glen Koskela
 
Technology innovation through AI
Technology innovation through AITechnology innovation through AI
Technology innovation through AI
Glen Koskela
 
Human centric innovation and digitalization
Human centric innovation and digitalizationHuman centric innovation and digitalization
Human centric innovation and digitalization
Glen Koskela
 
IoT-hype into practical implementations
IoT-hype into practical implementationsIoT-hype into practical implementations
IoT-hype into practical implementations
Glen Koskela
 
Testbeds as enabling digitalization and innovation for health
Testbeds as enabling digitalization and innovation for healthTestbeds as enabling digitalization and innovation for health
Testbeds as enabling digitalization and innovation for health
Glen Koskela
 

More from Glen Koskela (20)

Using Blockchain to Exchange Retail Value
Using Blockchain to Exchange Retail ValueUsing Blockchain to Exchange Retail Value
Using Blockchain to Exchange Retail Value
 
From Frictionless to Human Centric Retail
From Frictionless to Human Centric RetailFrom Frictionless to Human Centric Retail
From Frictionless to Human Centric Retail
 
Digital Transformation in the Retail Business
Digital Transformation in the Retail BusinessDigital Transformation in the Retail Business
Digital Transformation in the Retail Business
 
Employee and Customer Facing AI Applications
Employee and Customer Facing AI ApplicationsEmployee and Customer Facing AI Applications
Employee and Customer Facing AI Applications
 
Digital Annealer Keynote
Digital Annealer KeynoteDigital Annealer Keynote
Digital Annealer Keynote
 
Social (assistive) robots
Social (assistive) robotsSocial (assistive) robots
Social (assistive) robots
 
Differentiation through digital innovation and transformation
Differentiation through digital innovation and transformationDifferentiation through digital innovation and transformation
Differentiation through digital innovation and transformation
 
From digitalization to innovation and transformation
From digitalization to innovation and transformationFrom digitalization to innovation and transformation
From digitalization to innovation and transformation
 
IoT trends and innovations
IoT trends and innovationsIoT trends and innovations
IoT trends and innovations
 
Building an innovative future
Building an innovative futureBuilding an innovative future
Building an innovative future
 
Dream of the smart city
Dream of the smart cityDream of the smart city
Dream of the smart city
 
Tulevaisuuden tietotyötä
Tulevaisuuden tietotyötäTulevaisuuden tietotyötä
Tulevaisuuden tietotyötä
 
Industrial IoT based on SAP Technology
Industrial IoT based on SAP TechnologyIndustrial IoT based on SAP Technology
Industrial IoT based on SAP Technology
 
Could Service Provider Forum
Could Service Provider ForumCould Service Provider Forum
Could Service Provider Forum
 
Stories of digitalization, 2017 05-09, gko
Stories of digitalization, 2017 05-09, gkoStories of digitalization, 2017 05-09, gko
Stories of digitalization, 2017 05-09, gko
 
Artificial intelligence (wo video), 2017 05-23, gko
Artificial intelligence (wo video), 2017 05-23, gkoArtificial intelligence (wo video), 2017 05-23, gko
Artificial intelligence (wo video), 2017 05-23, gko
 
Technology innovation through AI
Technology innovation through AITechnology innovation through AI
Technology innovation through AI
 
Human centric innovation and digitalization
Human centric innovation and digitalizationHuman centric innovation and digitalization
Human centric innovation and digitalization
 
IoT-hype into practical implementations
IoT-hype into practical implementationsIoT-hype into practical implementations
IoT-hype into practical implementations
 
Testbeds as enabling digitalization and innovation for health
Testbeds as enabling digitalization and innovation for healthTestbeds as enabling digitalization and innovation for health
Testbeds as enabling digitalization and innovation for health
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

IoT tietoturva terveydenhuollossa, 2017-03-21, gko

  • 2. Copyright 2017 FUJITSU IoT in healthcare 1 Little data… ability to react with speed + Big data… ability to act at scale Healthcare domain embraces IoT to make its services better than ever. For the sake of higher quality delivery. And drive down costs from clinical and operations inefficiencies. Various medical devices, sensors, and diagnostic and imaging devices constitute a core part of IoT-based healthcare services.
  • 3. Copyright 2017 FUJITSU Prime target for malicious cyber groups  “The health sector will continue to be pummeled by any and every script kiddie and sophisticated cybercriminal dedicated to exfiltrating electronic health records and PII for infinite variation of use and optimal capitalization on dark web forums”  Immense budgets + seasoned experts against minuscule resources + time + dedication  All you need is only one cyber-hygienically apathetic employee in one of the target organizations that opens an attachment or clicks a maliciou 2 Immense budgets + seasoned experts against minuscule resources + time + dedication Administration Care area Patient room Medical devices “The health sector will continue to be pummeled by any and every script kiddie and sophisticated cybercriminal dedicated to exfiltrating electronic health records and personally identifiable information for infinite variation of use and optimal capitalization on dark web forums.”
  • 4. Copyright 2017 FUJITSU Hacking incidents on the rise 3 “Wall of shame”
  • 5. Copyright 2017 FUJITSU Patients alerted of vulnerable “endpoints” 4 “… could then be used to modify programming commands to the implanted device, which could result in rapid battery depletion and/or administration of inappropriate pacing or shocks.” “…a hacker could exploit to overdose diabetic patients with insulin.”
  • 6. Copyright 2017 FUJITSU Attention on medical device security 5 EU is concerned about healthcare IoT security New medical systems and devices need to be classified according to their risk before they can be certified and conformity with the Medical Devices Directive, the In Vitro Diagnostic Device Directive or the Active Implantable Medical Device Directive can be confirmed. Conformity with MDD is also applicable to certain ICT products used in hospitals.
  • 7. Copyright 2017 FUJITSU Hospital devices: frankensteined attack surface 6 Threat modelling the clinical scenario is a scary job The attack surface for medical devices is simply larger than the maturity of standardized procedures to test those surface areas. Device testing: time available, tools available, skill level available? Postmarket management of cybersecurity? Hardware physical interfaces Physical networking ports Debug / admin ports WiFi / RF Data transfer and storage Cryptographic implementations HL7 implementations Hardware sensors Input parsing / validation Command / data authentication Integrated clinical environment: a platform to create a medical ‘Internet of Things’ around the care of a single patient. Heterogeneous medical devices & auxiliary apps from different vendors connected together.
  • 8. Copyright 2017 FUJITSU Security challenge in healthcare environment 7 Security aspects are considered in OT, but given that most systems are not connected it is mostly physical security. Security concepts such as user-based access control applies less often in OT systems than they do in IT. Similar to transition from Industrie 3.0 to Industrie 4.0
  • 9. Copyright 2017 FUJITSU Medical device hijack (zero-day attack) 8 Connected to Internet? Poor authentication? Local Admin privilege apps? Vendor remote access? Unpatched OS? Unnecessary services enabled? Communication not secure? No encryption? No anti- virus installed? Security patches not applied – ever? Running on end-of-life operating system? Medical devices have become a key pivot point for attackers within healthcare networks Devices vulnerable to MEDJACK.3 includes diagnostic equipment (PET scanners, CT scanners, MRI machines, etc.), therapeutic equipment (infusion pumps, medical lasers, surgical machines), life support equipment (heart – lung machines, medical ventilators, extracorporeal membrane oxygenation machines and dialysis machines) and more.
  • 10. Copyright 2017 FUJITSU From hacks to hospitals being ransomed 9 Medical space is extremely vulnerable to these issues “34% of Health Trusts in the U.K., and 60% of Scottish trusts, hit with ransomware within the last 18 months. One NHS area had to transfer patients because they were shut down. Other countries affected as well, including Germany.” When ransomware happens the payment is usually in bitcoin. Companies getting hacked often don’t know anything about bitcoin, and are hiring law firms to acquire and hold bitcoin for them in case they get hacked.
  • 11. Copyright 2017 FUJITSU Shift to ransomware 10 Attackers are shifting their attention to ransomware attacks because of the glut of stolen health information hitting the black market. 88 out of the 260 NHS trusts across England, Scotland, and Wales were the victim of ransomware attacks over the last 18-month period. Dark Web examples: Ransomware-as-a-Service listed on Alphabay and Ransomware Kit on DreamMarket, both fully undetectable by traditional security technologies. Victims' need to access the infected system is greater than the fiscal demands of the attacker
  • 12. Copyright 2017 FUJITSU SAMAS RansomWorm  Domain Credential Theft  Exploit front-facing servers for a known vulnerability (CVE-2010-0738)  Once inside, use Mimikatz/Bladabindi/Derusbi to steal domain admin credentials  Active Directory Reconnaissance  Query AD with Windows Utility (CSVDE)  Verify a target is alive using PING command  Lateral Movement  Install infection using Windows Utility (PSEXEC)  Infect the endpoint  Self-propagate through the network, until each and every endpoint and server is locked down 11 Spreads inside throughout entire network to encrypt every server & computer — and backups Time will tell might not be a good security approach.
  • 13. Copyright 2017 FUJITSU EU Agency for Network and Information Security 12 Most critical are interconnected clinical information systems and networked medical devices Due to the great number of significant assets at stake (patient life, sensitive personal information and financial resources) information security is a key issue for smart hospitals. The notion of smart hospitals is introduced when IoT components are supporting core functions of a hospital: Establish effective enterprise governance for cyber security Implement state-of-the-art security measures Provide specific IT security requirements for IoT components Invest in Network Information Service products Establish an information security sharing mechanism Conduct risk assessment and vulnerability assessment Perform penetration testing and auditing Support multi-stakeholder communication platforms (ISACs)
  • 14. Copyright 2017 FUJITSU IoT healthcare services and applications Focus on the following security requirements: Confidentiality Integrity Availability Data freshness Non-repudiation Authorization Resiliency Fault tolerance Self-healing 13 Source: The Internet of Things for Health Care: A Comprehensive Survey, IEEE, 2015 Data-in-motion protection interruption, interception, modification, fabrication, replay Host properties user compromise, hardware compromise, software compromise Network properties standard protocol compromise, network protocol stack attack
  • 15. Copyright 2017 FUJITSU Industrial IoT security framework 14 Security model & policy: ensure confidentiality, integrity and availability of the system Data protection Security configuration & management Security monitoring & analysis: preserving system state throughout the operational lifecycle Communications & connectivity protection: cryptographic techniques for integrity and confidentiality, information flow control techniques Endpoint protection (egde & cloud): physical security functions, cyber security techniques and an authoritative identity Source: Industrial Internet Consortium Security Working Group
  • 16. Copyright 2017 FUJITSU Fujitsu’s security offerings 15 PalmSecure SURIENT Content – Web, Email and DLP Endpoint protection Firewalls, NGFW and IDS/IPS Managed Security Services Security Assessments incl. GDPR Continuity and Resilience Consultancy Technical Design and Integration Cyber Threat Response Security Consultancy IDaaS Advanced Threat Protection SIEM and SIEMaaS Vulnerability Management Identity & Access Mgmt Consultancy and Advisory Cyber Threat Intelligence Products