- Dr. Emma Garrison-Alexander
Vice Dean, Cybersecurity and Information Assurance University of Maryland University College April 22, 2016
President Obama has identified cybersecurity as one
- f the most serious economic and national security
Healthcare: Is the Cyber Threat Real? President Obama has identified - - PowerPoint PPT Presentation
Healthcare: Is the Cyber Threat Real? President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation..!Whitehouse.gov Dr. Emma Garrison-Alexander Vice Dean, Cybersecurity
Vice Dean, Cybersecurity and Information Assurance University of Maryland University College April 22, 2016
Chemical Commercial Communications Critical Manufacturing Dams Emergency Services Defense Industrial Base Energy Financial Food & Agricultural Government Facilities Healthcare & Public Health Information Technology Nuclear Water & Waste Transportation
– Protection of patient’s privacy & health information
– Promote use Electronic Health Records – Strengthen the civil and criminal enforcement of HIPAA – Breach Notification
– Enhances patient’s privacy protections – Provide individuals new rights to their health information – Strengthens government’s ability to enforce the law – Holds business associates, contractors, etc. accountable for privacy and data protections
– Timeframe: last 12 months
– 888 total incidents reported – 188 or 21% in healthcare industry
– 72% targeted healthcare providers – 10% targeted healthcare business associates – 6% targeted health plan organizations – 12% of traffic pharmaceutical companies, healthcare information clearinghouses, and other healthcare entities
http://icitech.org/wp-content/uploads/2016/01/ICIT-Brief-Hacking-Healthcare-IT-in-2016.pdf
Hospital Pays $17,000 in Ransomware Attack 22 Million Personnel Comprised MedStar Health Hacked
– Network mapping tool, scanning tool – Network protocol analyzer – Patch Management – Data Encryption – Background investigations (Insider Threat) – Multifactor authentication – Identity management – Least privilege – Anti-virus software – Redundant and failover systems
– Network Intrusion Prevention/Detection System
– Forensic Tools – Digital Investigation