SlideShare a Scribd company logo
Pharmaceutical Companies
and Computer Security
Fidèle DEGNI | Juliette FOINE | Professor Christopher Yukna |
Ecole Nationale Supérieure des Mines de Saint Etienne
Why IT Security is Primary for
Pharmaceutical Companies?
“If you have anything of value, you will be targeted. You won't necessarily know by who.”
John Stewart, Chief Security Officer, Cisco Systems
Digitalization (1/2)
• Digital = hot topic in healthcare
• Devices -> connected into a medical Internet of
Things (“IoT”)
3
• Big Data analytical techniques, in order to collect and process large
amounts of data
• Personalised drugs
Digitalization (2/2)
4
At the same time... (1/2)
• There are cyber security breaches into sophisticated and well-
managed companies by hackers, criminals and nation states
• Intellectual property is stolen, confidential emails are shared publicly,
and medical records used to create fraudulent new identities
• For example US retailer Target’s data breach of 2014 involving a
reported 70 million credit card records, JP Morgan Chase’s data
breach involving 76 million accounts and Anthem’s loss of personal
information of its clients and employees earlier this year are some of
the recent major security breaches
5
• In 2011, the UK government estimates its pharmaceutical,
biotechnology and healthcare sector suffered ₤1.8b in losses arising
from theft of intellectual property (IP)
• The global market for pharmaceuticals is estimated to hit USD $1.1
trillion in 2015. Strong demand for new cures and high profits
associated with marketing new, patent-protected drugs drive fierce
competition in product development
• It is not surprising then that criminal elements have increasingly
targeted the intellectual property of pharmaceutical companies. The
cost of IP falling into a competitor’s hands, however, is difficult to
calculate
At the same time... (2/2)
6
Cyber security risks (1/2)
• Compromising information leads to financial losses and reputational
damage, but compromised production systems could have far
reaching impacts including loss of life
• One key problem is that the use of manufacturing systems often HAS
technology which is older than the internet itself,
meaning that these systems are inherently insecure
7
• Another concern is integrity and availability.
• The same risks apply to medical devices
Cyber security risks (2/2)
8
Data security (1/2)
• In all sectors of pharmaceutical industries, the use of IT systems
(Enterprise Resource Planning, ...) creates new needs in terms of
data security and working tools.
• There is no much difference between banks and pharmaceutical
industries : they have needs for traceability and confidentiality.
For pharmaceutical companies, there is intellectual property too.
9
Nothing is more valuable to a pharmaceutical company
than the formula for one of its new drugs
Data security (2/2)
10
What is the priority? (1/2)
• R&D phases
• Manufacturing
Indeed : we can imagine the panic, if a computer virus destroyed
research data on drug candidate developed for several years, or if a
computers crash forced to halt production for several days to solve the
problem...
11
Pharmaceutical companies have a strong dependence on
computers. Any interference (availability, confidentiality,
integrity) at these systems can have serious
consequences on the various processes !
What is the priority? (2/2)
12
What can be done?
Company insiders, not outside hackers, are involved in more than two-thirds of all cyber cases
involving theft of intellectueal property… Wether driven by opportunism, greed, a desire for
revenge, or a combination of all three, these insiders exploit their position of trust to obtain acces
their organization’s most valued digital assets
Regulations for IT security
• 21 CFR Part 11 (electronic
records and signatures)
• : It ensures the laboratories
traceability of all changes in the
system. Indeed, any changes
made by a manufacturer must
be drawn: who, what date and
time, why, etc. This allows for a
history of everything about a
product or action "
Norme ISO 27 001
• This international standard
provides a framework and
methods to identify and maintain
a level of security appropriate to
the constraints that meet the
obligations and requirements of
stakeholders
14
These IT security companies are involved including for audit of existing
systems missions.
They play penetration tests, which consist in trying to penetrate the system by
all means to detect security vulnerabilities.
Then, they study the practices, and also provide governance services, risk
analysis, often attending the computer security manager of the company .
Finally, they work on operational safety for support on the security infrastructure
or for reaction to incidents "
Testing the IT security with audits
15
Organizations need to do their
part 1/2
• Cyber risks resulting from interconnectivity to the internet and
enterprise systems must be taken into account as we increasingly
interconnect devices
• Organisations should analyse and understand the risks of increasing
connectivity together with assessing how their key assets are being
protected. It is crucial that security must be included during the
design process and as an inherent part of any system
16
• Educate and regularly train employees on security or other protocols
• Ensure that proprietary information is adequately, if not robustly,
protected
• Use appropriate screening processes to select new employees
• Provide non-threatening, convenient ways for employees to report
suspicions
• Routinely monitor computer networks for suspicious activity
• Ensure security (to include computer network security) personnel
have the tools they need
Organizations need to do their
part 2/2
17
Location of the business / context to
become expert in computer security
For several years, the budget of an undertaking allocated to IT security is
increasing much faster than other budgets.
With the explosion of cybercrime, and with the increasing complexity of
information systems, companies are often looking for new computer security
experts. The security of an organization's data has become a strategic
challenge, the IT security expert often will have a special status within a
company, and loyalty to the employer will often be rewarded.
18
Thank you for listening!
Questions?
19
References
• http://www.industrie.com/pharma/n-oublions-pas-la-securite,41826
• http://www.usine-digitale.fr/article/industrie-4-0-et-securite-informatique-les-nouvelles-
menaces.N337102
• http://www.ordre.pharmacien.fr/Le-patient/La-protection-des-donnees-de-sante
• http://etudiant.aujourdhui.fr/etudiant/metiers/fiche-metier/expert-en-securite-informatique.html
• http://www.europeanpharmaceuticalreview.com/35994/news/blog/cyber-security-in-
pharmaceuticals/
• http://www2.deloitte.com/jp/en/pages/life-sciences-and-healthcare/articles/ls/cyber-security-
ls.html
• https://www.ft.com/content/a6b09006-e5c9-11e3-aeef-00144feabdc0
20

More Related Content

What's hot

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
Nada G.Youssef
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
Evolve IP
 
cyber security
cyber securitycyber security
cyber security
abithajayavel
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
James W. De Rienzo
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
David Sweigert
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Information security
Information securityInformation security
Information security
avinashbalakrishnan2
 
How to Plan and Manage a BCM and IT DR Project
How to Plan and Manage a BCM and IT DR ProjectHow to Plan and Manage a BCM and IT DR Project
How to Plan and Manage a BCM and IT DR Project
Continuity and Resilience
 
Owasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilitiesOwasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilities
RIZWAN HASAN
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
n|u - The Open Security Community
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
Tanmay Shinde
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
Denise Bailey
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
PECB
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
Network Intelligence India
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
Anomaly detection - TIBCO Data Science Central
Anomaly detection - TIBCO Data Science CentralAnomaly detection - TIBCO Data Science Central
Anomaly detection - TIBCO Data Science Central
Michael O'Connell
 
Cybersecurity
CybersecurityCybersecurity

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
cyber security
cyber securitycyber security
cyber security
 
NIST SP 800 30 Flow Chart
NIST SP 800 30 Flow ChartNIST SP 800 30 Flow Chart
NIST SP 800 30 Flow Chart
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Information security
Information securityInformation security
Information security
 
How to Plan and Manage a BCM and IT DR Project
How to Plan and Manage a BCM and IT DR ProjectHow to Plan and Manage a BCM and IT DR Project
How to Plan and Manage a BCM and IT DR Project
 
Owasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilitiesOwasp top 10 & Web vulnerabilities
Owasp top 10 & Web vulnerabilities
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
Cyber Security Incident Response
Cyber Security Incident ResponseCyber Security Incident Response
Cyber Security Incident Response
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
Anomaly detection - TIBCO Data Science Central
Anomaly detection - TIBCO Data Science CentralAnomaly detection - TIBCO Data Science Central
Anomaly detection - TIBCO Data Science Central
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 

Similar to Pharmaceutical companies and security

Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
Cyril Soeri
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
ASNA p.a
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
ijtsrd
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
AdilsonSuende
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
Krist Davood - Principal - CIO
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
JustinFinch11
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
eresavenzon
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
anjalee990
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
Jan Wong
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
Amirul Shafiq Ahmad Zuperi
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
CMR WORLD TECH
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
ronoelias98
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
Sydney Wolff
 
Forensics
ForensicsForensics
Forensics
Laura Aviles
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
wbesse
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
Keith Braswell
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
Patrick Bouillaud
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
Ban Selvakumar
 

Similar to Pharmaceutical companies and security (20)

Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
security_threats.pdf and control mechanisms
security_threats.pdf and control mechanismssecurity_threats.pdf and control mechanisms
security_threats.pdf and control mechanisms
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
 
Forensics
ForensicsForensics
Forensics
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 

Recently uploaded

Friendly Massage in Ajman - Malayali Kerala Spa Ajman
Friendly Massage in Ajman - Malayali Kerala Spa AjmanFriendly Massage in Ajman - Malayali Kerala Spa Ajman
Friendly Massage in Ajman - Malayali Kerala Spa Ajman
Malayali Kerala Spa Ajman
 
Sexual Disorders.gender identity disorderspptx
Sexual Disorders.gender identity  disorderspptxSexual Disorders.gender identity  disorderspptx
Sexual Disorders.gender identity disorderspptx
Pupayumnam1
 
Monopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in TripuraMonopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in Tripura
SKG Internationals
 
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
PsychoTech Services
 
Know Latest Hiranandani Hospital Powai News.pdf
Know Latest Hiranandani Hospital Powai News.pdfKnow Latest Hiranandani Hospital Powai News.pdf
Know Latest Hiranandani Hospital Powai News.pdf
Dr. Sujit Chatterjee CEO Hiranandani Hospital
 
muscluskeletal assessment...........pptx
muscluskeletal assessment...........pptxmuscluskeletal assessment...........pptx
muscluskeletal assessment...........pptx
RushikeshHange1
 
Solution manual for managerial accounting 18th edition by ray garrison eric n...
Solution manual for managerial accounting 18th edition by ray garrison eric n...Solution manual for managerial accounting 18th edition by ray garrison eric n...
Solution manual for managerial accounting 18th edition by ray garrison eric n...
rightmanforbloodline
 
Management of Post Operative Pain: to make doctors conscious about the benefi...
Management of Post Operative Pain: to make doctors conscious about the benefi...Management of Post Operative Pain: to make doctors conscious about the benefi...
Management of Post Operative Pain: to make doctors conscious about the benefi...
Nilima65
 
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdfchatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
marynayjun112024
 
Mental Health and Physical Wellbeing.pdf
Mental Health and Physical Wellbeing.pdfMental Health and Physical Wellbeing.pdf
Mental Health and Physical Wellbeing.pdf
shindesupriya013
 
nurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdfnurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdf
Carolyn Harker
 
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
AndrzejJarynowski
 
The Importance of Black Women Understanding the Chemicals in Their Personal C...
The Importance of Black Women Understanding the Chemicals in Their Personal C...The Importance of Black Women Understanding the Chemicals in Their Personal C...
The Importance of Black Women Understanding the Chemicals in Their Personal C...
bkling
 
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdfVEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
Vedanta A
 
EXAMINATION OF HUMAN URINE AND FAECES.pdf
EXAMINATION OF HUMAN URINE AND FAECES.pdfEXAMINATION OF HUMAN URINE AND FAECES.pdf
EXAMINATION OF HUMAN URINE AND FAECES.pdf
Madhusmita Sahoo
 
3. User Guide Activity Budget Tracking App Steps to apply.pptx
3. User Guide Activity Budget Tracking App Steps to apply.pptx3. User Guide Activity Budget Tracking App Steps to apply.pptx
3. User Guide Activity Budget Tracking App Steps to apply.pptx
habtegirma
 
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
gjsma0ep
 
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
Kumar Satyam
 
1比1制作(uofm毕业证书)美国密歇根大学毕业证学位证书原版一模一样
1比1制作(uofm毕业证书)美国密歇根大学毕业证学位证书原版一模一样1比1制作(uofm毕业证书)美国密歇根大学毕业证学位证书原版一模一样
1比1制作(uofm毕业证书)美国密歇根大学毕业证学位证书原版一模一样
5sj7jxf7
 
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
Kumar Satyam
 

Recently uploaded (20)

Friendly Massage in Ajman - Malayali Kerala Spa Ajman
Friendly Massage in Ajman - Malayali Kerala Spa AjmanFriendly Massage in Ajman - Malayali Kerala Spa Ajman
Friendly Massage in Ajman - Malayali Kerala Spa Ajman
 
Sexual Disorders.gender identity disorderspptx
Sexual Disorders.gender identity  disorderspptxSexual Disorders.gender identity  disorderspptx
Sexual Disorders.gender identity disorderspptx
 
Monopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in TripuraMonopoly PCD Pharma Franchise in Tripura
Monopoly PCD Pharma Franchise in Tripura
 
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...Emotional and Behavioural Problems in Children - Counselling and Family Thera...
Emotional and Behavioural Problems in Children - Counselling and Family Thera...
 
Know Latest Hiranandani Hospital Powai News.pdf
Know Latest Hiranandani Hospital Powai News.pdfKnow Latest Hiranandani Hospital Powai News.pdf
Know Latest Hiranandani Hospital Powai News.pdf
 
muscluskeletal assessment...........pptx
muscluskeletal assessment...........pptxmuscluskeletal assessment...........pptx
muscluskeletal assessment...........pptx
 
Solution manual for managerial accounting 18th edition by ray garrison eric n...
Solution manual for managerial accounting 18th edition by ray garrison eric n...Solution manual for managerial accounting 18th edition by ray garrison eric n...
Solution manual for managerial accounting 18th edition by ray garrison eric n...
 
Management of Post Operative Pain: to make doctors conscious about the benefi...
Management of Post Operative Pain: to make doctors conscious about the benefi...Management of Post Operative Pain: to make doctors conscious about the benefi...
Management of Post Operative Pain: to make doctors conscious about the benefi...
 
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdfchatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
chatgptfornlp-230314021506-2f03f614.pdf. 21506-2f03f614.pdf
 
Mental Health and Physical Wellbeing.pdf
Mental Health and Physical Wellbeing.pdfMental Health and Physical Wellbeing.pdf
Mental Health and Physical Wellbeing.pdf
 
nurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdfnurs fpx 4050 assessment 4 final care coordination plan.pdf
nurs fpx 4050 assessment 4 final care coordination plan.pdf
 
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
Assessing Large Language Models in the Context of Bioterrorism: An Epidemiolo...
 
The Importance of Black Women Understanding the Chemicals in Their Personal C...
The Importance of Black Women Understanding the Chemicals in Their Personal C...The Importance of Black Women Understanding the Chemicals in Their Personal C...
The Importance of Black Women Understanding the Chemicals in Their Personal C...
 
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdfVEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
VEDANTA AIR AMBULANCE SERVICES IN REWA AT A COST-EFFECTIVE PRICE.pdf
 
EXAMINATION OF HUMAN URINE AND FAECES.pdf
EXAMINATION OF HUMAN URINE AND FAECES.pdfEXAMINATION OF HUMAN URINE AND FAECES.pdf
EXAMINATION OF HUMAN URINE AND FAECES.pdf
 
3. User Guide Activity Budget Tracking App Steps to apply.pptx
3. User Guide Activity Budget Tracking App Steps to apply.pptx3. User Guide Activity Budget Tracking App Steps to apply.pptx
3. User Guide Activity Budget Tracking App Steps to apply.pptx
 
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
一比一原版(EUR毕业证)鹿特丹伊拉斯姆斯大学毕业证如何办理
 
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
India Home Healthcare Market: Driving Forces and Disruptive Trends [2029]
 
1比1制作(uofm毕业证书)美国密歇根大学毕业证学位证书原版一模一样
1比1制作(uofm毕业证书)美国密歇根大学毕业证学位证书原版一模一样1比1制作(uofm毕业证书)美国密歇根大学毕业证学位证书原版一模一样
1比1制作(uofm毕业证书)美国密歇根大学毕业证学位证书原版一模一样
 
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
India Medical Devices Market: Size, Share, and In-Depth Competitive Analysis ...
 

Pharmaceutical companies and security

  • 1. Pharmaceutical Companies and Computer Security Fidèle DEGNI | Juliette FOINE | Professor Christopher Yukna | Ecole Nationale Supérieure des Mines de Saint Etienne
  • 2. Why IT Security is Primary for Pharmaceutical Companies? “If you have anything of value, you will be targeted. You won't necessarily know by who.” John Stewart, Chief Security Officer, Cisco Systems
  • 3. Digitalization (1/2) • Digital = hot topic in healthcare • Devices -> connected into a medical Internet of Things (“IoT”) 3
  • 4. • Big Data analytical techniques, in order to collect and process large amounts of data • Personalised drugs Digitalization (2/2) 4
  • 5. At the same time... (1/2) • There are cyber security breaches into sophisticated and well- managed companies by hackers, criminals and nation states • Intellectual property is stolen, confidential emails are shared publicly, and medical records used to create fraudulent new identities • For example US retailer Target’s data breach of 2014 involving a reported 70 million credit card records, JP Morgan Chase’s data breach involving 76 million accounts and Anthem’s loss of personal information of its clients and employees earlier this year are some of the recent major security breaches 5
  • 6. • In 2011, the UK government estimates its pharmaceutical, biotechnology and healthcare sector suffered ₤1.8b in losses arising from theft of intellectual property (IP) • The global market for pharmaceuticals is estimated to hit USD $1.1 trillion in 2015. Strong demand for new cures and high profits associated with marketing new, patent-protected drugs drive fierce competition in product development • It is not surprising then that criminal elements have increasingly targeted the intellectual property of pharmaceutical companies. The cost of IP falling into a competitor’s hands, however, is difficult to calculate At the same time... (2/2) 6
  • 7. Cyber security risks (1/2) • Compromising information leads to financial losses and reputational damage, but compromised production systems could have far reaching impacts including loss of life • One key problem is that the use of manufacturing systems often HAS technology which is older than the internet itself, meaning that these systems are inherently insecure 7
  • 8. • Another concern is integrity and availability. • The same risks apply to medical devices Cyber security risks (2/2) 8
  • 9. Data security (1/2) • In all sectors of pharmaceutical industries, the use of IT systems (Enterprise Resource Planning, ...) creates new needs in terms of data security and working tools. • There is no much difference between banks and pharmaceutical industries : they have needs for traceability and confidentiality. For pharmaceutical companies, there is intellectual property too. 9
  • 10. Nothing is more valuable to a pharmaceutical company than the formula for one of its new drugs Data security (2/2) 10
  • 11. What is the priority? (1/2) • R&D phases • Manufacturing Indeed : we can imagine the panic, if a computer virus destroyed research data on drug candidate developed for several years, or if a computers crash forced to halt production for several days to solve the problem... 11
  • 12. Pharmaceutical companies have a strong dependence on computers. Any interference (availability, confidentiality, integrity) at these systems can have serious consequences on the various processes ! What is the priority? (2/2) 12
  • 13. What can be done? Company insiders, not outside hackers, are involved in more than two-thirds of all cyber cases involving theft of intellectueal property… Wether driven by opportunism, greed, a desire for revenge, or a combination of all three, these insiders exploit their position of trust to obtain acces their organization’s most valued digital assets
  • 14. Regulations for IT security • 21 CFR Part 11 (electronic records and signatures) • : It ensures the laboratories traceability of all changes in the system. Indeed, any changes made by a manufacturer must be drawn: who, what date and time, why, etc. This allows for a history of everything about a product or action " Norme ISO 27 001 • This international standard provides a framework and methods to identify and maintain a level of security appropriate to the constraints that meet the obligations and requirements of stakeholders 14
  • 15. These IT security companies are involved including for audit of existing systems missions. They play penetration tests, which consist in trying to penetrate the system by all means to detect security vulnerabilities. Then, they study the practices, and also provide governance services, risk analysis, often attending the computer security manager of the company . Finally, they work on operational safety for support on the security infrastructure or for reaction to incidents " Testing the IT security with audits 15
  • 16. Organizations need to do their part 1/2 • Cyber risks resulting from interconnectivity to the internet and enterprise systems must be taken into account as we increasingly interconnect devices • Organisations should analyse and understand the risks of increasing connectivity together with assessing how their key assets are being protected. It is crucial that security must be included during the design process and as an inherent part of any system 16
  • 17. • Educate and regularly train employees on security or other protocols • Ensure that proprietary information is adequately, if not robustly, protected • Use appropriate screening processes to select new employees • Provide non-threatening, convenient ways for employees to report suspicions • Routinely monitor computer networks for suspicious activity • Ensure security (to include computer network security) personnel have the tools they need Organizations need to do their part 2/2 17
  • 18. Location of the business / context to become expert in computer security For several years, the budget of an undertaking allocated to IT security is increasing much faster than other budgets. With the explosion of cybercrime, and with the increasing complexity of information systems, companies are often looking for new computer security experts. The security of an organization's data has become a strategic challenge, the IT security expert often will have a special status within a company, and loyalty to the employer will often be rewarded. 18
  • 19. Thank you for listening! Questions? 19
  • 20. References • http://www.industrie.com/pharma/n-oublions-pas-la-securite,41826 • http://www.usine-digitale.fr/article/industrie-4-0-et-securite-informatique-les-nouvelles- menaces.N337102 • http://www.ordre.pharmacien.fr/Le-patient/La-protection-des-donnees-de-sante • http://etudiant.aujourdhui.fr/etudiant/metiers/fiche-metier/expert-en-securite-informatique.html • http://www.europeanpharmaceuticalreview.com/35994/news/blog/cyber-security-in- pharmaceuticals/ • http://www2.deloitte.com/jp/en/pages/life-sciences-and-healthcare/articles/ls/cyber-security- ls.html • https://www.ft.com/content/a6b09006-e5c9-11e3-aeef-00144feabdc0 20

Editor's Notes

  1. primary = primordial
  2. Digital health is a hot topic in healthcare offering more effective and more efficient personalised healthcare to patients and careers Devices such as fitness trackers, heart monitors and insulin pumps are connected into a medical Internet of Things (“IoT”) to enable us to monitor our activity, heart rate, and blood pressure
  3. Pharmaceutical and health companies can apply Big Data analytical techniques to collect and process large amounts of data Digitisation enables pharmaceutical companies to create personalised drugs based on individuals’ genomic sequences, more effective measurement of drug uptake and efficacy, and enables a closer relationship between pharmaceutical companies and patients
  4. The 2014 JPMorgan Chase data breach was a cyber-attack against American bank JPMorgan Chase that is believed to have compromised data associated with over 83 million accounts – 76 million households (approximately two out of three households in the country) and 7 million small businesses.[1] The data breach is considered one of the most serious intrusions into an American corporation's information system and one of the largest data breaches in history.[2][3][4] The attack – disclosed in September 2014 – was discovered by the bank's security team in late July 2014, but not completely halted until the middle of August.[3][5] The bank declared that login information associated with the accounts (such as social security numbers or passwords) was not compromised but names, email and postal addresses, and phone numbers of account holders were obtained by hackers, raising concerns of potential phishing attacks.[4][6]
  5. . They were designed as specialised and isolated systems and not built to withstand cyber security attacks
  6. As a patient, I am more concerned if my recorded blood type is changed (integrity) rather than my blood type is divulged (confidentiality). Médical devices. Vulnerabilities in the design or implementation of a medical device such as an insulin pump or in anything interconnected to such devices could result in loss of device integrity and potential harm to patients if they are exploited in a cyber-attack
  7. Indeed = en effet
  8. FD
  9. CFR = Code of Federal Regulation, edited by the FDA ISO : international standard organization
  10. FD
  11. FD