Securing Healthcare’s
Digital Front Door
Enabling Innovation and Maximizing Return on Life
Presented by:
Ryan Coleman | Vice President
717-649-3287 | ryan.coleman@raventek.com
www.raventek.com
At RavenTek, we help healthcare providers secure what matters most, build organizational
resilience against cyberattacks and maximize provider Return On Life. We combine world-
class technologies, innovative security ideas and a forward-thinking team of problem solvers
and consultants to secure healthcare providers.
We believe enterprise visibility and persistent, always-on security testing is the essential
foundation of every cybersecurity program.
RavenTek is a powerful combination of small company agility with big company
resources and stability, delivering best in class technical services to Hospitals and
Healthcare Systems across the United States. RavenTek provides innovative
Infrastructure, Cloud, Cybersecurity and Data Analytics solutions and services to
meet the unique needs and demanding requirements of healthcare systems.
Certified Engineers Subject Matter Experts Advanced Technology
Headquarters: Herndon, VA
Founded: 2015
Alaska Native/ Veteran Owned
225 Employees
ISO 9001:2015, 27001 / CMMI Level 3 SVC
Agenda
Define the Digital Front Door
Strategies For Securing The Digital Front Door
Hacker Perspective: The Digital Front Door
The pandemic showcased the power and
potential of digital health
An entire industry being pushed toward innovation
NEW TECH UNLEASHES NEW
CARE DELIVERY MODELS
• Virtual-first primary care
• Digital therapeutics
• Remote patient
monitoring
• Tele-everything
FAST CONSUMER SHIFTS (AND
BRANDS)
• The rise of direct to
consumer
• COVID introduces vast
populations to telehealth
(with amazing adoption
rates)
THE NON-HEALTHCARE
LANDGRAB FOR HEALTH
• Big tech plays: devices, data,
infrastructure
• Retail “brick and click”
strategies
• Media opportunity in
engagement / content
The Digital Front Door
7
What is a Digital Front Door?
A digital front door is much more than the adoption of a single piece of technology, it’s a strategic approach
to extend access beyond a hospital or health system facilities to where its patients live and to support the
various points in the patient’s journey.
 Find a Doc
 Chat Bot
 Online Check-In
 Wait-Time Estimator
 Online Scheduling
 Online Registration
 Mobile Apps
 Telemedicine / Video Visits
 Symptom Triage
 Online Payment Tool
8
The Rise of Consumerism
Patients are becoming more involved in their own healthcare decisions and well-being. In
essence, it is the empowerment of the patient—the economic purchasing power and decision-
making shifts into the hands of the consumer.
Who is the right provider for me?
What types of care do I need?
How do I get the right care at the right time?
Who will schedule me? Is the location convenient?
What do I owe? Can I afford care?
Am I covered? How do I pay?
What’s next? Do I have a post-care plan?
How do I schedule a follow up appointment? How do I
get help?
KEY TOUCH POINTS
• Right Provider.
• Right Location.
• Right Time.
• Right Experience.
9
Other Industries Set The Bar:
an expectation of convenience.
Patients demand a seamless experience and assume security is properly address – an implied trust.
The digital front door is a wraparound experience that changes the way
patients get to engage with their care.
10
Emerging Trends
• Introduction of Conversational AI
• Adoption of remote monitoring and smart devices
• Deeper Integration and Consolidation of Tech Stack
• Massive funding and investments in the Digital Health startup community
• Major Shortages of Clinicians and Health IT Staff and Cybersecurity Staff
• The future center of care is the home
IT IS PROFITABLE FOR HACKERS TO TARGET HEALTHCARE PROVIDERS!
11
Tremendous Benefits to The Digital Front Door
• Streamlining the care path and reducing delays / friction
• Improve patient experiences and create stickiness
• Decrease cost of care and improved operational efficiencies
• Amazing visibility into what matters most to patients
• Patient centered healthcare – everywhere
• Potential for new revenue streams
12
What Are The Challenges and Risks?
Privacy and
Regulatory
Compliance
Organizational
Buy-In
Building & Breaking
Trust
Ransomware is a
matter of life or
death
The attack surface has
expanded exponentially Visibility Gaps
The Digital Divide
Data Breaches
Expanded ecosystems of
Business Associates
Patient Identity
“The risk of not implementing a digital front door strategy far exceeds the risk of doing so.”
Where do we start…
Compliance does not mean secure.
15
Front Doors Must Be Open For Business
Leading with a Framework: CIS v.8
Reimaging Security Testing
18
Reimagine Security Testing.
The Problem:
The Healthcare ecosystem is expanding exponentially. Cybersecurity teams can implement firewalls but
hackers are blowing through firewalls in every attack. Now every device now has an IP address and the threat
vector continuously expands – think IoT and IoMT connected devices, wearables, new applications,
telemedicine, integration between applications and the demand for patients to authorize how data is shared.
Healthcare organizations perform penetration testing for compliance purposes annually, but the rate of
change and the innovation relies on internal teams and tools to manage vulnerabilities.
Solution:
Reimaging Security Testing. Always on, persistent security testing to protect the ever-changing Digital Front
Door
19
Reimagine Security Testing.
Synack is a crowdsourced security testing platform
with a crowd of 1800 of the worlds best security
researchers and ethical hackers working along side
enterprise security teams providing “always on”
security testing 24x7x365.
Unlike traditional compliance testing with two
consultants, two laptops over two weeks, with
Synack 50-60 of the worlds best security
researchers provide persistent security testing of
your most critical applications and infrastructure.
Key Features:
• Leading edge AI technology and world class Red Team
security researchers
• Real-time coverage analytics, security scores and
remediation recommendations
• End-to-end vulnerability lifecycle management
• Zero recruiting and staffing cost
Make Zero Trust and Micro-
segmentation a reality
Zero Trust enforces the creation of a perimeter around every network connected device and
ensure that only authorized users are allowed.
21
Global Attacks Require Global Scale
”The network is constantly moving and evolving.
Attacks are global in nature. You need a platform
that can protect you at global scale.”
DDOS Attack Prevention – Zero Second SLA and blocked
some of the largest DDOS attacks in history.
Bot Management – Digital front doors have bots
constantly knocking
Bot Traffic increased 26% on healthcare sites in
2021
Protecting Web Applications and API’s - WAAP
Discover API’s and Automatically inspect JSON
& XML requests for malicious payloads.
Multi-Factor Authentication- Prevent employee account
takeovers and data breaches with phish-proof MFA.
Enterprise Application Access – No more VPN’s, connect
and monitor users directly to only authorized
applications
Enterprise Threat Protector -Safely connect users &
devices to the internet with a secure web gateway.
22
You Can’t Protect What You Can’t See
The Problem:
Every device is connected! IoT and IoMT are commonplace, and those devices are not always up to date.
Asset Inventory is challenging. Clinical engineering teams cannot keep track of devices manually.
Solution:
Give your IT and Cybersecurity team superpowers with automating device discovery and create policies to
quarantine unauthorized devices.
23
Discover Every Device Connecting To Your Network
Whole hospital approach to secure every
device
Comprehensive view of medical risks
Cyber risks
Clinical risks
PHI exposure risks
Identify not only what the device is but
what it’s doing in the network
Automate device policies
Flexible policy creation
Segment vulnerable and high-risk devices
Enforce on existing infrastructure
Device insights to optimize maintenance
and utilization
RavenTek Cybersecurity Services 24
ROL
(Return on Life)
13900 Lincoln Park Drive, Suite 150
Herndon, VA 20171
Prepared By:
Ryan Coleman| 717-649-3287
ryan.coleman@raventek.com

Securing the digital front door

  • 1.
    Securing Healthcare’s Digital FrontDoor Enabling Innovation and Maximizing Return on Life Presented by: Ryan Coleman | Vice President 717-649-3287 | ryan.coleman@raventek.com
  • 2.
    www.raventek.com At RavenTek, wehelp healthcare providers secure what matters most, build organizational resilience against cyberattacks and maximize provider Return On Life. We combine world- class technologies, innovative security ideas and a forward-thinking team of problem solvers and consultants to secure healthcare providers. We believe enterprise visibility and persistent, always-on security testing is the essential foundation of every cybersecurity program.
  • 3.
    RavenTek is apowerful combination of small company agility with big company resources and stability, delivering best in class technical services to Hospitals and Healthcare Systems across the United States. RavenTek provides innovative Infrastructure, Cloud, Cybersecurity and Data Analytics solutions and services to meet the unique needs and demanding requirements of healthcare systems. Certified Engineers Subject Matter Experts Advanced Technology Headquarters: Herndon, VA Founded: 2015 Alaska Native/ Veteran Owned 225 Employees ISO 9001:2015, 27001 / CMMI Level 3 SVC
  • 4.
    Agenda Define the DigitalFront Door Strategies For Securing The Digital Front Door Hacker Perspective: The Digital Front Door
  • 5.
    The pandemic showcasedthe power and potential of digital health An entire industry being pushed toward innovation NEW TECH UNLEASHES NEW CARE DELIVERY MODELS • Virtual-first primary care • Digital therapeutics • Remote patient monitoring • Tele-everything FAST CONSUMER SHIFTS (AND BRANDS) • The rise of direct to consumer • COVID introduces vast populations to telehealth (with amazing adoption rates) THE NON-HEALTHCARE LANDGRAB FOR HEALTH • Big tech plays: devices, data, infrastructure • Retail “brick and click” strategies • Media opportunity in engagement / content
  • 6.
  • 7.
    7 What is aDigital Front Door? A digital front door is much more than the adoption of a single piece of technology, it’s a strategic approach to extend access beyond a hospital or health system facilities to where its patients live and to support the various points in the patient’s journey.  Find a Doc  Chat Bot  Online Check-In  Wait-Time Estimator  Online Scheduling  Online Registration  Mobile Apps  Telemedicine / Video Visits  Symptom Triage  Online Payment Tool
  • 8.
    8 The Rise ofConsumerism Patients are becoming more involved in their own healthcare decisions and well-being. In essence, it is the empowerment of the patient—the economic purchasing power and decision- making shifts into the hands of the consumer. Who is the right provider for me? What types of care do I need? How do I get the right care at the right time? Who will schedule me? Is the location convenient? What do I owe? Can I afford care? Am I covered? How do I pay? What’s next? Do I have a post-care plan? How do I schedule a follow up appointment? How do I get help? KEY TOUCH POINTS • Right Provider. • Right Location. • Right Time. • Right Experience.
  • 9.
    9 Other Industries SetThe Bar: an expectation of convenience. Patients demand a seamless experience and assume security is properly address – an implied trust. The digital front door is a wraparound experience that changes the way patients get to engage with their care.
  • 10.
    10 Emerging Trends • Introductionof Conversational AI • Adoption of remote monitoring and smart devices • Deeper Integration and Consolidation of Tech Stack • Massive funding and investments in the Digital Health startup community • Major Shortages of Clinicians and Health IT Staff and Cybersecurity Staff • The future center of care is the home IT IS PROFITABLE FOR HACKERS TO TARGET HEALTHCARE PROVIDERS!
  • 11.
    11 Tremendous Benefits toThe Digital Front Door • Streamlining the care path and reducing delays / friction • Improve patient experiences and create stickiness • Decrease cost of care and improved operational efficiencies • Amazing visibility into what matters most to patients • Patient centered healthcare – everywhere • Potential for new revenue streams
  • 12.
    12 What Are TheChallenges and Risks? Privacy and Regulatory Compliance Organizational Buy-In Building & Breaking Trust Ransomware is a matter of life or death The attack surface has expanded exponentially Visibility Gaps The Digital Divide Data Breaches Expanded ecosystems of Business Associates Patient Identity “The risk of not implementing a digital front door strategy far exceeds the risk of doing so.”
  • 13.
    Where do westart…
  • 14.
    Compliance does notmean secure.
  • 15.
    15 Front Doors MustBe Open For Business
  • 16.
    Leading with aFramework: CIS v.8
  • 17.
  • 18.
    18 Reimagine Security Testing. TheProblem: The Healthcare ecosystem is expanding exponentially. Cybersecurity teams can implement firewalls but hackers are blowing through firewalls in every attack. Now every device now has an IP address and the threat vector continuously expands – think IoT and IoMT connected devices, wearables, new applications, telemedicine, integration between applications and the demand for patients to authorize how data is shared. Healthcare organizations perform penetration testing for compliance purposes annually, but the rate of change and the innovation relies on internal teams and tools to manage vulnerabilities. Solution: Reimaging Security Testing. Always on, persistent security testing to protect the ever-changing Digital Front Door
  • 19.
    19 Reimagine Security Testing. Synackis a crowdsourced security testing platform with a crowd of 1800 of the worlds best security researchers and ethical hackers working along side enterprise security teams providing “always on” security testing 24x7x365. Unlike traditional compliance testing with two consultants, two laptops over two weeks, with Synack 50-60 of the worlds best security researchers provide persistent security testing of your most critical applications and infrastructure. Key Features: • Leading edge AI technology and world class Red Team security researchers • Real-time coverage analytics, security scores and remediation recommendations • End-to-end vulnerability lifecycle management • Zero recruiting and staffing cost
  • 20.
    Make Zero Trustand Micro- segmentation a reality Zero Trust enforces the creation of a perimeter around every network connected device and ensure that only authorized users are allowed.
  • 21.
    21 Global Attacks RequireGlobal Scale ”The network is constantly moving and evolving. Attacks are global in nature. You need a platform that can protect you at global scale.” DDOS Attack Prevention – Zero Second SLA and blocked some of the largest DDOS attacks in history. Bot Management – Digital front doors have bots constantly knocking Bot Traffic increased 26% on healthcare sites in 2021 Protecting Web Applications and API’s - WAAP Discover API’s and Automatically inspect JSON & XML requests for malicious payloads. Multi-Factor Authentication- Prevent employee account takeovers and data breaches with phish-proof MFA. Enterprise Application Access – No more VPN’s, connect and monitor users directly to only authorized applications Enterprise Threat Protector -Safely connect users & devices to the internet with a secure web gateway.
  • 22.
    22 You Can’t ProtectWhat You Can’t See The Problem: Every device is connected! IoT and IoMT are commonplace, and those devices are not always up to date. Asset Inventory is challenging. Clinical engineering teams cannot keep track of devices manually. Solution: Give your IT and Cybersecurity team superpowers with automating device discovery and create policies to quarantine unauthorized devices.
  • 23.
    23 Discover Every DeviceConnecting To Your Network Whole hospital approach to secure every device Comprehensive view of medical risks Cyber risks Clinical risks PHI exposure risks Identify not only what the device is but what it’s doing in the network Automate device policies Flexible policy creation Segment vulnerable and high-risk devices Enforce on existing infrastructure Device insights to optimize maintenance and utilization
  • 24.
  • 25.
  • 26.
    13900 Lincoln ParkDrive, Suite 150 Herndon, VA 20171 Prepared By: Ryan Coleman| 717-649-3287 ryan.coleman@raventek.com