SlideShare a Scribd company logo
1 of 27
Download to read offline
THE FDA and Medical Device
Cybersecurity Guidance
Valdez Ladd, MBA, CISSP, CISA
Pam Gilmore ISSA Raleigh, NC
THE FDA and Medical Device Cybersecurity

FDA’s scope is beyond HIPAA

(Privacy & Security Rule)

Health Informatics-Provisions for Health
Applications on Mobile/Smart Devices.

Application of risk management for IT-networks
incorporating medical devices.

FDA and Wireless Frequency Devices

* Complements HIPAA’s security risk analysis
Vulnerability discovery

January 2013

Cybersecurity Cylance researchers Billy Rios and
Terry McCorkle.

Identified 300 pieces of medical equipment
vulnerable to cyber attacks

* firmware , embedded passwords and weak
authentication.

June 13, 2013 FDA Safety Communication:

 

Cybersecurity for Medical Devices and Hospital
Networks.

Assure that appropriate safeguards are in place
to reduce the risk of failure due to cyber attacks
for medical devices
Design security into the manufacturing process,
document it and communicate it to hospitals, etc.
THE FDA and Medical Device Cybersecurity
THE FDA and Medical Device Cybersecurity
Risk Analysis
Beyond C-I-A to Medical PAINS
CIA:
Confidentiality, Integrity, & Availability
PAINS
Privacy, Availability, Authentication, Integrity,
Non-repudiation and Safety
Risk and Compliance
Security Capabilities

Access controls best practices

Remove “hardcoded” passwords


Limit Access to trusted uses

Role based access with time limitations

Physical locks on devices
Incident Response

Use of Fail-Safe and Recovery

- Security features are recognized, logged and
acted upon

- Logging--Devices will need capacity for
logging diagnostic data. Capabilities varies
depending on device design

Forensics--Data captured in Hazard report
Incident Response

Ensure trusted Content with strong
authentication and encryption.

Customer notification process.
CyberSecurity Design
Document

FDA 501k Premarket Approval submissions by
manufacturer now require cybersecurity risk
analysis and protections in the design of their
medical devices:

1. Hazard analysis, mitigations and design

2. Traceability Mix

3. Antivirus
Manufacturer Disclosure Statement
for Medical Device Security (MDS2) v2
Developed by HIMSS and the National Electrical Manufacturers
Association (NEMA)
Since 2013 Medical device manufacturers have to disclose the
cybersecurity features of medical devices they sell to healthcare
providers.
A hospital risk assessment tool to assess the vulnerabilities and risks of
the medical devices.
Allows easy comparison of security features across different devices
and different manufacturers
Intrusion Detection is defined as:
 "...the act of detecting actions that attempt to compromise the confidentiality,
integrity or availability of a resource."1
 More specifically, the goal of intrusion
detection is to identify entities attempting to subvert in-place security controls.
Intrusion Detection and Mobile Devices
What are the risks with Health information and mobile devices
Assets: What is valuable in the system and how could it be lost?
Attackers and their motivations: Who would want to do something
bad and why?
What role does compliance, regulations and guidelines play in securing data?
Mobile Devices and health information
Defenses: What more could be done to prevent or mitigate attacks?
How can an attacker change the authentication data?
What is the impact if an attacker can read the user profile data?
What happens if access is denied to the user profile database?
*Spoofing vs. authentication……....…...….
*Tampering vs. integrity……………..….......
*Repudiation vs. non-repudiation….....…….
*Information disclosure vs. confidentiality
*Denial of service vs. availability………...
*Elevation of privilege vs. authorization…..
STRIDE MODEL
Types of Attacks
Carrier Based Methods
Man in the middle (MiTM) attacks which can steal data
Hijack wireless transmission.
Endpoints based methods
Inject code to tamper with web application or web services
Stealing user sensitive phone contents using Malwares
Wireless interfaces based methods
Stealing data when its in-transit using wireless channel
Exploit access and authentication access
An adversary steals sensitive data by reading SD Card based stored content
An adversary exploits OS level functionalities steal data from device
Rooting or Jailbreaking the phone to access sensitive data from memory
APT’s: Advanced Persistent Threats
Detecting APTs To aid in detecting Advanced Persistent Threats (APTs)
*The Splunk platform alerts IT on attempts to remotely access the hospital’s
infrastructure from foreign countries such as Russia. Russia has become well
known for infecting sites with malware.
*Many attack vectors starting with phishing email to infiltrate malware, analysts
can correlate Exchange, antimalware servers and firewall logs for evidence of
questionable downloads.
*“Splunk allows cross-reference of any data, identifying attack patterns and
unauthorized actions that would otherwise go undetected. Search for particular
virus signatures to determine which devices are infected.
Wearable Medical Devices
1.) Pacemaker
2.) Insulin pumps
3.) Smart glasses (Google, Vuzix)
4.) Smart watches (Google, Apple)
5.) Smart clothing (RFID tags)
Wearables- Risks & Possible Solutions
Middlesex hospital video
Splunk and security (intrusion detection)
Success Stories from Healthcare corporations
IRhythm--
Challenges
- iRhythm is a rapidly growing medical device and service company.
- iRhythm required an efficient and effective way to monitor business processes,
- establish baseline performance across their entire operation and continue to
- track that performance as the business evolved.
BUSINESS IMPACT
*Operational intelligence and longterm planning
*Business process monitoring through
every stage of the business model
*Operational intelligence without
investing in a data warehouse
*Secure data management for HIPAA
Success Stories—ING--Financial
Ensuring Regulatory Compliance
Financial services companies are subject to an ever increasing
set of regulatory requirements that include Sarbanes-Oxley,
PCI and Basel II, among others.
*Splunk indexes data generated by the technologies that need to
be monitored for regulatory compliance.
*It enables rapid retrieval of log data requested by
IT auditors.
“With Splunk we achieved ROI within 60 days, and we’re able
to better meet compliance mandates and improve auditing and
reporting best practices, despite reducing our compliance staff.”
Legg Mason
Splunk and Compliance
• Splunk demonstrates compliance with HIPAA requirements related to
unauthorized access of ePHI records. Splunk software is able to take proactive
measures to pinpoint any security breaches related to ePHI records.
Security Regulations:
• FISMA – For government agencies, Splunk Securely collect, index and store all
your log and Machine Data along with audit trails to meet NIST requirements.
The continuous monitoring process steps in NIST 800- 137 (draft) are listed as:
Define, Establish, Implement, Analyze/ Report, Respond and Review/Update.
•
HIPAA - Splunk instantly assesses reports of EPHI leakage and meets HIPAA’s
explicit log requirements. HIPAA and EPHI security and privacy rules include
explicit requirements for audit trail collection, review, automated monitoring and
incident investigation.
Splunk and Compliance
• PCI - Rapid compliance with explicit PCI requirements for log retention/review
and change monitoring, comprehensive reporting on all PCI controls such as
passwords and firewall policy.
• SOX - Splunk search of compliances mandated routine log review easy and
straightforward. For IT controls based on ITIL, COBiT, COSO, ISO 17799, BS-7799
audit and reporting.
Conclusion

Since 2014 future devices will have device
cybersecurity product life-cycle from design to
operation to disposal.

Result will be strengthening of HIPPA Privacy
and Security Rule in areas of Risk


Analysis for medical device purchases

About the Authors
Valdez Ladd – MBA, CISSP, CISA, COBIT 4.1
ISO/TC 215 - Health informatics, WG 4, Privacy and Security, (2011-2013)
WEDI.org
Cloud Security Alliance
ISACA.org
ISC2.org
contact: www.linkedin.com/in/valdezladd
Pam Gilmore - BS Business Administration Management concentration. Member
of ISSA Raleigh, NC chapter. She has been a key leader for editing of Dex One
company security policy documentation and review. Technical focus is in Incident
Handling, Information Security and Architecture.

More Related Content

What's hot

Webinar or Online Training on A comprehensive overview of 510(k) submission
Webinar or Online Training on A comprehensive overview of 510(k) submissionWebinar or Online Training on A comprehensive overview of 510(k) submission
Webinar or Online Training on A comprehensive overview of 510(k) submissionComplianz World
 
GMDNS, UDI, barcodes and more...
GMDNS, UDI, barcodes and more...GMDNS, UDI, barcodes and more...
GMDNS, UDI, barcodes and more...Paul Blackett
 
FDA Presentation 07/17/07
FDA Presentation 07/17/07FDA Presentation 07/17/07
FDA Presentation 07/17/07ckuyehar
 
Compliance with medical standards iec 62304, iso 14971, iec 60601, fda title ...
Compliance with medical standards iec 62304, iso 14971, iec 60601, fda title ...Compliance with medical standards iec 62304, iso 14971, iec 60601, fda title ...
Compliance with medical standards iec 62304, iso 14971, iec 60601, fda title ...Intland Software GmbH
 
Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Sterling Medical Devices
 
Information Required in a 510(k) Submission
Information Required in a 510(k) SubmissionInformation Required in a 510(k) Submission
Information Required in a 510(k) Submissioncomplianceonline123
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304Robert Ginsberg
 
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...Joanne Pelaschier, RAC, CQA, CQE
 
Software Introduction & Tools
Software Introduction & ToolsSoftware Introduction & Tools
Software Introduction & Toolscollegelisted
 
Breakthrough Devices
Breakthrough DevicesBreakthrough Devices
Breakthrough DevicesEMMAIntl
 
The De Novo 510(k) Process - Is There Hope at FDA for Lower Risk Innovative D...
The De Novo 510(k) Process - Is There Hope at FDA for Lower Risk Innovative D...The De Novo 510(k) Process - Is There Hope at FDA for Lower Risk Innovative D...
The De Novo 510(k) Process - Is There Hope at FDA for Lower Risk Innovative D...Michael Swit
 
The 21st Century Cures Act a focus on Title III Subtitle F – Medical Device I...
The 21st Century Cures Act a focus on Title III Subtitle F – Medical Device I...The 21st Century Cures Act a focus on Title III Subtitle F – Medical Device I...
The 21st Century Cures Act a focus on Title III Subtitle F – Medical Device I...David Loeser
 
Abbreviated 510(k)
Abbreviated 510(k)Abbreviated 510(k)
Abbreviated 510(k)Tosha Dave
 
Poster Presentation - FDA Compliance Landscape & What it Means to Your AI Asp...
Poster Presentation - FDA Compliance Landscape & What it Means to Your AI Asp...Poster Presentation - FDA Compliance Landscape & What it Means to Your AI Asp...
Poster Presentation - FDA Compliance Landscape & What it Means to Your AI Asp...CitiusTech
 
Strategies for meeting FDA's UDI Rule
Strategies for meeting FDA's UDI RuleStrategies for meeting FDA's UDI Rule
Strategies for meeting FDA's UDI Ruleulmedical
 
UDI: What & How within the overall Medical Device value chain
UDI: What & How within the overall Medical Device value chainUDI: What & How within the overall Medical Device value chain
UDI: What & How within the overall Medical Device value chainnancykathlen
 
UL Webinar - Updates to the Regulatory Framework in Korea and their impact to...
UL Webinar - Updates to the Regulatory Framework in Korea and their impact to...UL Webinar - Updates to the Regulatory Framework in Korea and their impact to...
UL Webinar - Updates to the Regulatory Framework in Korea and their impact to...ulmedical
 

What's hot (20)

Webinar or Online Training on A comprehensive overview of 510(k) submission
Webinar or Online Training on A comprehensive overview of 510(k) submissionWebinar or Online Training on A comprehensive overview of 510(k) submission
Webinar or Online Training on A comprehensive overview of 510(k) submission
 
GMDNS, UDI, barcodes and more...
GMDNS, UDI, barcodes and more...GMDNS, UDI, barcodes and more...
GMDNS, UDI, barcodes and more...
 
FDA Presentation 07/17/07
FDA Presentation 07/17/07FDA Presentation 07/17/07
FDA Presentation 07/17/07
 
Medical Device Regulations - 510(k) Process
Medical Device Regulations - 510(k) ProcessMedical Device Regulations - 510(k) Process
Medical Device Regulations - 510(k) Process
 
Compliance with medical standards iec 62304, iso 14971, iec 60601, fda title ...
Compliance with medical standards iec 62304, iso 14971, iec 60601, fda title ...Compliance with medical standards iec 62304, iso 14971, iec 60601, fda title ...
Compliance with medical standards iec 62304, iso 14971, iec 60601, fda title ...
 
Medical Device Software
Medical Device SoftwareMedical Device Software
Medical Device Software
 
Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...
 
Information Required in a 510(k) Submission
Information Required in a 510(k) SubmissionInformation Required in a 510(k) Submission
Information Required in a 510(k) Submission
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304
 
IEC 62304 Action List
IEC 62304 Action List IEC 62304 Action List
IEC 62304 Action List
 
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
 
Software Introduction & Tools
Software Introduction & ToolsSoftware Introduction & Tools
Software Introduction & Tools
 
Breakthrough Devices
Breakthrough DevicesBreakthrough Devices
Breakthrough Devices
 
The De Novo 510(k) Process - Is There Hope at FDA for Lower Risk Innovative D...
The De Novo 510(k) Process - Is There Hope at FDA for Lower Risk Innovative D...The De Novo 510(k) Process - Is There Hope at FDA for Lower Risk Innovative D...
The De Novo 510(k) Process - Is There Hope at FDA for Lower Risk Innovative D...
 
The 21st Century Cures Act a focus on Title III Subtitle F – Medical Device I...
The 21st Century Cures Act a focus on Title III Subtitle F – Medical Device I...The 21st Century Cures Act a focus on Title III Subtitle F – Medical Device I...
The 21st Century Cures Act a focus on Title III Subtitle F – Medical Device I...
 
Abbreviated 510(k)
Abbreviated 510(k)Abbreviated 510(k)
Abbreviated 510(k)
 
Poster Presentation - FDA Compliance Landscape & What it Means to Your AI Asp...
Poster Presentation - FDA Compliance Landscape & What it Means to Your AI Asp...Poster Presentation - FDA Compliance Landscape & What it Means to Your AI Asp...
Poster Presentation - FDA Compliance Landscape & What it Means to Your AI Asp...
 
Strategies for meeting FDA's UDI Rule
Strategies for meeting FDA's UDI RuleStrategies for meeting FDA's UDI Rule
Strategies for meeting FDA's UDI Rule
 
UDI: What & How within the overall Medical Device value chain
UDI: What & How within the overall Medical Device value chainUDI: What & How within the overall Medical Device value chain
UDI: What & How within the overall Medical Device value chain
 
UL Webinar - Updates to the Regulatory Framework in Korea and their impact to...
UL Webinar - Updates to the Regulatory Framework in Korea and their impact to...UL Webinar - Updates to the Regulatory Framework in Korea and their impact to...
UL Webinar - Updates to the Regulatory Framework in Korea and their impact to...
 

Viewers also liked

Agile Development And Medtech
Agile Development And MedtechAgile Development And Medtech
Agile Development And MedtechRobert Ginsberg
 
Device Classification John V.
Device Classification John V.Device Classification John V.
Device Classification John V.bigjuan
 
Software development process basic
Software development process basicSoftware development process basic
Software development process basicAnurag Tomar
 
US FDA medical device approval chart - Emergo
US FDA medical device approval chart - Emergo US FDA medical device approval chart - Emergo
US FDA medical device approval chart - Emergo EMERGO
 
FDA Expectations for Traceability in Device & Diagnostic Design
FDA Expectations for Traceability in Device & Diagnostic DesignFDA Expectations for Traceability in Device & Diagnostic Design
FDA Expectations for Traceability in Device & Diagnostic DesignSeapine Software
 
Steps to Compliance with the European Medical Device Regulations
Steps to Compliance with the European Medical Device RegulationsSteps to Compliance with the European Medical Device Regulations
Steps to Compliance with the European Medical Device RegulationsApril Bright
 
Bringing User-Centered Design Practices into Agile Development Projects
Bringing User-CenteredDesign Practices intoAgile Development ProjectsBringing User-CenteredDesign Practices intoAgile Development Projects
Bringing User-Centered Design Practices into Agile Development Projectsabcd82
 
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...Akshay Anand
 
Waterfall vs agile approach scrum framework and best practices in software d...
Waterfall vs agile approach  scrum framework and best practices in software d...Waterfall vs agile approach  scrum framework and best practices in software d...
Waterfall vs agile approach scrum framework and best practices in software d...Tayfun Bilsel
 
Software Development Plan
Software Development PlanSoftware Development Plan
Software Development PlanRonald Dove
 

Viewers also liked (10)

Agile Development And Medtech
Agile Development And MedtechAgile Development And Medtech
Agile Development And Medtech
 
Device Classification John V.
Device Classification John V.Device Classification John V.
Device Classification John V.
 
Software development process basic
Software development process basicSoftware development process basic
Software development process basic
 
US FDA medical device approval chart - Emergo
US FDA medical device approval chart - Emergo US FDA medical device approval chart - Emergo
US FDA medical device approval chart - Emergo
 
FDA Expectations for Traceability in Device & Diagnostic Design
FDA Expectations for Traceability in Device & Diagnostic DesignFDA Expectations for Traceability in Device & Diagnostic Design
FDA Expectations for Traceability in Device & Diagnostic Design
 
Steps to Compliance with the European Medical Device Regulations
Steps to Compliance with the European Medical Device RegulationsSteps to Compliance with the European Medical Device Regulations
Steps to Compliance with the European Medical Device Regulations
 
Bringing User-Centered Design Practices into Agile Development Projects
Bringing User-CenteredDesign Practices intoAgile Development ProjectsBringing User-CenteredDesign Practices intoAgile Development Projects
Bringing User-Centered Design Practices into Agile Development Projects
 
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
Regulatory Approval Process for Medical Devices in EU - Presentation by Aksha...
 
Waterfall vs agile approach scrum framework and best practices in software d...
Waterfall vs agile approach  scrum framework and best practices in software d...Waterfall vs agile approach  scrum framework and best practices in software d...
Waterfall vs agile approach scrum framework and best practices in software d...
 
Software Development Plan
Software Development PlanSoftware Development Plan
Software Development Plan
 

Similar to FDA Medical Device Cybersecurity Guidance

THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical DevicesSecurityMetrics
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdfkarthikvcyber
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxVinayPratap58
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.pptkarthikvcyber
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveJon Lendrum
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningBlack Duck by Synopsys
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsEMMAIntl
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Karl Kispert
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
building-a-secure-medical-app-with-dot-net.pdf
building-a-secure-medical-app-with-dot-net.pdfbuilding-a-secure-medical-app-with-dot-net.pdf
building-a-secure-medical-app-with-dot-net.pdfPixelQA
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
A Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkA Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkAudrey Britton
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeMedSafe
 

Similar to FDA Medical Device Cybersecurity Guidance (20)

THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical Devices
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdf
 
CyberSecurity Assignment.pptx
CyberSecurity Assignment.pptxCyberSecurity Assignment.pptx
CyberSecurity Assignment.pptx
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.ppt
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability Scanning
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
MobileSecurity WhitePaper
MobileSecurity WhitePaperMobileSecurity WhitePaper
MobileSecurity WhitePaper
 
Unit v
Unit vUnit v
Unit v
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
building-a-secure-medical-app-with-dot-net.pdf
building-a-secure-medical-app-with-dot-net.pdfbuilding-a-secure-medical-app-with-dot-net.pdf
building-a-secure-medical-app-with-dot-net.pdf
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
A Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkA Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer Network
 
What Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafeWhat Is Security Risk Analysis? By: MedSafe
What Is Security Risk Analysis? By: MedSafe
 
MIS chap # 9.....
MIS chap # 9.....MIS chap # 9.....
MIS chap # 9.....
 

More from Valdez Ladd MBA, CISSP, CISA,

Software data privacy threat analysis metric using no trust privacy risk metric
 Software data privacy threat analysis metric using no trust privacy risk metric Software data privacy threat analysis metric using no trust privacy risk metric
Software data privacy threat analysis metric using no trust privacy risk metricValdez Ladd MBA, CISSP, CISA,
 
The FDA and BYOD, Mobile and Fixed Medical Device Cybersecurity
The FDA and BYOD, Mobile and Fixed Medical Device CybersecurityThe FDA and BYOD, Mobile and Fixed Medical Device Cybersecurity
The FDA and BYOD, Mobile and Fixed Medical Device CybersecurityValdez Ladd MBA, CISSP, CISA,
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0Valdez Ladd MBA, CISSP, CISA,
 
Risk Management of Medical Devices Connected To IT Networks
Risk Management of Medical Devices Connected To IT NetworksRisk Management of Medical Devices Connected To IT Networks
Risk Management of Medical Devices Connected To IT NetworksValdez Ladd MBA, CISSP, CISA,
 

More from Valdez Ladd MBA, CISSP, CISA, (7)

Software data privacy threat analysis metric using no trust privacy risk metric
 Software data privacy threat analysis metric using no trust privacy risk metric Software data privacy threat analysis metric using no trust privacy risk metric
Software data privacy threat analysis metric using no trust privacy risk metric
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
The FDA and BYOD, Mobile and Fixed Medical Device Cybersecurity
The FDA and BYOD, Mobile and Fixed Medical Device CybersecurityThe FDA and BYOD, Mobile and Fixed Medical Device Cybersecurity
The FDA and BYOD, Mobile and Fixed Medical Device Cybersecurity
 
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
FedRAMP - Federal Agencies & Cloud Service Providers meet FISMA 2.0
 
Risk Management of Medical Devices Connected To IT Networks
Risk Management of Medical Devices Connected To IT NetworksRisk Management of Medical Devices Connected To IT Networks
Risk Management of Medical Devices Connected To IT Networks
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
HIPAA HITECH E-Prescribing / E-Prescription
HIPAA HITECH  E-Prescribing / E-PrescriptionHIPAA HITECH  E-Prescribing / E-Prescription
HIPAA HITECH E-Prescribing / E-Prescription
 

Recently uploaded

VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...Neha Kaur
 
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoybabeytanya
 
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...narwatsonia7
 
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls ServiceCALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls ServiceMiss joya
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...CALL GIRLS
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
CALL ON ➥9907093804 🔝 Call Girls Baramati ( Pune) Girls Service
CALL ON ➥9907093804 🔝 Call Girls Baramati ( Pune)  Girls ServiceCALL ON ➥9907093804 🔝 Call Girls Baramati ( Pune)  Girls Service
CALL ON ➥9907093804 🔝 Call Girls Baramati ( Pune) Girls ServiceMiss joya
 
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...Miss joya
 
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Miss joya
 
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoybabeytanya
 
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...narwatsonia7
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...jageshsingh5554
 
Call Girls Service Navi Mumbai Samaira 8617697112 Independent Escort Service ...
Call Girls Service Navi Mumbai Samaira 8617697112 Independent Escort Service ...Call Girls Service Navi Mumbai Samaira 8617697112 Independent Escort Service ...
Call Girls Service Navi Mumbai Samaira 8617697112 Independent Escort Service ...Call girls in Ahmedabad High profile
 
Aspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliAspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliRewAs ALI
 
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...Miss joya
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...astropune
 
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...narwatsonia7
 
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safenarwatsonia7
 

Recently uploaded (20)

VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
 
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
 
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...Bangalore Call Girls Nelamangala Number 7001035870  Meetin With Bangalore Esc...
Bangalore Call Girls Nelamangala Number 7001035870 Meetin With Bangalore Esc...
 
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls ServiceCALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
 
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Servicesauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
sauth delhi call girls in Bhajanpura 🔝 9953056974 🔝 escort Service
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
CALL ON ➥9907093804 🔝 Call Girls Baramati ( Pune) Girls Service
CALL ON ➥9907093804 🔝 Call Girls Baramati ( Pune)  Girls ServiceCALL ON ➥9907093804 🔝 Call Girls Baramati ( Pune)  Girls Service
CALL ON ➥9907093804 🔝 Call Girls Baramati ( Pune) Girls Service
 
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
Russian Call Girls in Pune Tanvi 9907093804 Short 1500 Night 6000 Best call g...
 
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
 
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
 
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Panvel Mumbai📲 9833363713 💞 Full Night Enjoy
 
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
VIP Call Girls Tirunelveli Aaradhya 8250192130 Independent Escort Service Tir...
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
 
Call Girls Service Navi Mumbai Samaira 8617697112 Independent Escort Service ...
Call Girls Service Navi Mumbai Samaira 8617697112 Independent Escort Service ...Call Girls Service Navi Mumbai Samaira 8617697112 Independent Escort Service ...
Call Girls Service Navi Mumbai Samaira 8617697112 Independent Escort Service ...
 
Aspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas AliAspirin presentation slides by Dr. Rewas Ali
Aspirin presentation slides by Dr. Rewas Ali
 
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
College Call Girls Pune Mira 9907093804 Short 1500 Night 6000 Best call girls...
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
 
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...Bangalore Call Girls Hebbal Kempapura Number 7001035870  Meetin With Bangalor...
Bangalore Call Girls Hebbal Kempapura Number 7001035870 Meetin With Bangalor...
 
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Majestic 📞 9907093804 High Profile Service 100% Safe
 

FDA Medical Device Cybersecurity Guidance

  • 1. THE FDA and Medical Device Cybersecurity Guidance Valdez Ladd, MBA, CISSP, CISA Pam Gilmore ISSA Raleigh, NC
  • 2. THE FDA and Medical Device Cybersecurity  FDA’s scope is beyond HIPAA  (Privacy & Security Rule)  Health Informatics-Provisions for Health Applications on Mobile/Smart Devices.  Application of risk management for IT-networks incorporating medical devices.  FDA and Wireless Frequency Devices  * Complements HIPAA’s security risk analysis
  • 3. Vulnerability discovery  January 2013  Cybersecurity Cylance researchers Billy Rios and Terry McCorkle.  Identified 300 pieces of medical equipment vulnerable to cyber attacks  * firmware , embedded passwords and weak authentication.
  • 4.  June 13, 2013 FDA Safety Communication:     Cybersecurity for Medical Devices and Hospital Networks.  Assure that appropriate safeguards are in place to reduce the risk of failure due to cyber attacks for medical devices Design security into the manufacturing process, document it and communicate it to hospitals, etc. THE FDA and Medical Device Cybersecurity
  • 5. THE FDA and Medical Device Cybersecurity
  • 6. Risk Analysis Beyond C-I-A to Medical PAINS CIA: Confidentiality, Integrity, & Availability PAINS Privacy, Availability, Authentication, Integrity, Non-repudiation and Safety
  • 8. Security Capabilities  Access controls best practices  Remove “hardcoded” passwords   Limit Access to trusted uses  Role based access with time limitations  Physical locks on devices
  • 9. Incident Response  Use of Fail-Safe and Recovery  - Security features are recognized, logged and acted upon  - Logging--Devices will need capacity for logging diagnostic data. Capabilities varies depending on device design  Forensics--Data captured in Hazard report
  • 10. Incident Response  Ensure trusted Content with strong authentication and encryption.  Customer notification process.
  • 11. CyberSecurity Design Document  FDA 501k Premarket Approval submissions by manufacturer now require cybersecurity risk analysis and protections in the design of their medical devices:  1. Hazard analysis, mitigations and design  2. Traceability Mix  3. Antivirus
  • 12. Manufacturer Disclosure Statement for Medical Device Security (MDS2) v2 Developed by HIMSS and the National Electrical Manufacturers Association (NEMA) Since 2013 Medical device manufacturers have to disclose the cybersecurity features of medical devices they sell to healthcare providers. A hospital risk assessment tool to assess the vulnerabilities and risks of the medical devices. Allows easy comparison of security features across different devices and different manufacturers
  • 13. Intrusion Detection is defined as:  "...the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource."1  More specifically, the goal of intrusion detection is to identify entities attempting to subvert in-place security controls. Intrusion Detection and Mobile Devices
  • 14. What are the risks with Health information and mobile devices Assets: What is valuable in the system and how could it be lost? Attackers and their motivations: Who would want to do something bad and why? What role does compliance, regulations and guidelines play in securing data? Mobile Devices and health information Defenses: What more could be done to prevent or mitigate attacks?
  • 15. How can an attacker change the authentication data? What is the impact if an attacker can read the user profile data? What happens if access is denied to the user profile database? *Spoofing vs. authentication……....…...…. *Tampering vs. integrity……………..…....... *Repudiation vs. non-repudiation….....……. *Information disclosure vs. confidentiality *Denial of service vs. availability………... *Elevation of privilege vs. authorization….. STRIDE MODEL
  • 16. Types of Attacks Carrier Based Methods Man in the middle (MiTM) attacks which can steal data Hijack wireless transmission. Endpoints based methods Inject code to tamper with web application or web services Stealing user sensitive phone contents using Malwares Wireless interfaces based methods Stealing data when its in-transit using wireless channel Exploit access and authentication access An adversary steals sensitive data by reading SD Card based stored content An adversary exploits OS level functionalities steal data from device Rooting or Jailbreaking the phone to access sensitive data from memory
  • 17. APT’s: Advanced Persistent Threats Detecting APTs To aid in detecting Advanced Persistent Threats (APTs) *The Splunk platform alerts IT on attempts to remotely access the hospital’s infrastructure from foreign countries such as Russia. Russia has become well known for infecting sites with malware. *Many attack vectors starting with phishing email to infiltrate malware, analysts can correlate Exchange, antimalware servers and firewall logs for evidence of questionable downloads. *“Splunk allows cross-reference of any data, identifying attack patterns and unauthorized actions that would otherwise go undetected. Search for particular virus signatures to determine which devices are infected.
  • 18.
  • 20. 1.) Pacemaker 2.) Insulin pumps 3.) Smart glasses (Google, Vuzix) 4.) Smart watches (Google, Apple) 5.) Smart clothing (RFID tags) Wearables- Risks & Possible Solutions
  • 21. Middlesex hospital video Splunk and security (intrusion detection)
  • 22. Success Stories from Healthcare corporations IRhythm-- Challenges - iRhythm is a rapidly growing medical device and service company. - iRhythm required an efficient and effective way to monitor business processes, - establish baseline performance across their entire operation and continue to - track that performance as the business evolved. BUSINESS IMPACT *Operational intelligence and longterm planning *Business process monitoring through every stage of the business model *Operational intelligence without investing in a data warehouse *Secure data management for HIPAA
  • 23. Success Stories—ING--Financial Ensuring Regulatory Compliance Financial services companies are subject to an ever increasing set of regulatory requirements that include Sarbanes-Oxley, PCI and Basel II, among others. *Splunk indexes data generated by the technologies that need to be monitored for regulatory compliance. *It enables rapid retrieval of log data requested by IT auditors. “With Splunk we achieved ROI within 60 days, and we’re able to better meet compliance mandates and improve auditing and reporting best practices, despite reducing our compliance staff.” Legg Mason
  • 24. Splunk and Compliance • Splunk demonstrates compliance with HIPAA requirements related to unauthorized access of ePHI records. Splunk software is able to take proactive measures to pinpoint any security breaches related to ePHI records. Security Regulations: • FISMA – For government agencies, Splunk Securely collect, index and store all your log and Machine Data along with audit trails to meet NIST requirements. The continuous monitoring process steps in NIST 800- 137 (draft) are listed as: Define, Establish, Implement, Analyze/ Report, Respond and Review/Update. • HIPAA - Splunk instantly assesses reports of EPHI leakage and meets HIPAA’s explicit log requirements. HIPAA and EPHI security and privacy rules include explicit requirements for audit trail collection, review, automated monitoring and incident investigation.
  • 25. Splunk and Compliance • PCI - Rapid compliance with explicit PCI requirements for log retention/review and change monitoring, comprehensive reporting on all PCI controls such as passwords and firewall policy. • SOX - Splunk search of compliances mandated routine log review easy and straightforward. For IT controls based on ITIL, COBiT, COSO, ISO 17799, BS-7799 audit and reporting.
  • 26. Conclusion  Since 2014 future devices will have device cybersecurity product life-cycle from design to operation to disposal.  Result will be strengthening of HIPPA Privacy and Security Rule in areas of Risk   Analysis for medical device purchases 
  • 27. About the Authors Valdez Ladd – MBA, CISSP, CISA, COBIT 4.1 ISO/TC 215 - Health informatics, WG 4, Privacy and Security, (2011-2013) WEDI.org Cloud Security Alliance ISACA.org ISC2.org contact: www.linkedin.com/in/valdezladd Pam Gilmore - BS Business Administration Management concentration. Member of ISSA Raleigh, NC chapter. She has been a key leader for editing of Dex One company security policy documentation and review. Technical focus is in Incident Handling, Information Security and Architecture.