SlideShare ist ein Scribd-Unternehmen logo
1 von 16
SECURING INTERNET OF MEDICAL THINGS
Manish Rai
VP Marketing
December 2nd, 2016
2
INTERNET OF MEDICAL THINGS (IoMT): $163B BY 2020, 38% CAGR
• 10-15 Device per Bed
• ~50% Networked
Source: Markets and Markets, Oct 2015
3
A Glimpse into the Numbers
72%Malicious traffic targeted
at Healthcare Providers
40% YoY Increase in
Healthcare Cyber
Attacks
81% of healthcare providers have
revealed one or more systems have
been compromised
HEALTHCARE CONTINUES TO BE THE TOP TARGET FOR CRIMINALS
Source: KPMG 2015 Healthcare Survey
4
MRI Device Hacked to Access Patient Information
Researcher “was able to hack into the hospital's network with ease – and permission
– after finding vulnerable medical devices listed on Shodan.”-International Business
Times, Feb 15 2006
RESEARCHES HAVE BEEN HIGHLIGHTING IoMT VULNERABILITIES
Infusion Pump Hacked to Administer Fatal Drug Dose
Security Professionals “showed how easy it is for hackers to take control of a hospital drug
infusion pump by overwriting the device’s firmware with malicious software. The hack would
allow someone to remotely administer a fatal drug dose to patients.”
Aug 12, 2015
5
• 7-8 year device development life cycle
• Devices built for patient safely not security
• Use of outdated OS with known vulnerabilities
• Ltd or no patching capability
• No support for 3rd party security agent
• Till recently, limited regulatory focus on security
• Unencrypted communication
REASONS FOR IoMT VULNERABILITIES
Attackers are infecting medical devices with malware and then moving laterally through
hospital networks to steal confidential data, according to TrapX’s MEDJACK report. (2015)
6
2016 HIMSS Cybersecurity Survey: Greatest Areas of Vulnerabilities
Top 5 Greatest Areas of Vulnerabilities (1-7 on a Likert-type scale)
1. E-mail (5.00 acute, 5.30 non-acute)
2. Mobile devices (4.81 acute, 4.72 non-acute)
3. Internet of Things (4.79 acute, 3.56 non-acute)
4. Other End User Devices (4.42 acute, 4.30 non-acute)
5. Network (4.17 acute, 4.07 non-acute)
7
2016 HIMSS Cybersecurity Survey: Information Security Tools
Low Rates of Implementation:
1. Network monitoring tools (54.6% acute, 45.2% non-acute)
2. Mobile device management (56.3% acute, 35.5% non-acute)
3. Intrusion detection system (57.1% acute, 41.9% non-acute)
4. Intrusion prevention system (49.6% acute, 41.9% non-acute)
5. Data loss prevention (38.7% acute, 25.8% non-acute)
8
Determine
Scope
• Inventory IoMT Device
• Determine Vulnerabilities
• Categorize Based on Risk
Identify Gaps
& Update
Processes
• Procurement
• Deployment
• Monitoring
• Migration Plan
IoMT SECURITY FRAMEWORK
9
Inventory type, usage and location of each medical device
Determine know vulnerabilities in each device type (OS, patching, default settings, etc.)
Score Device Risk Based on type, use, location and data transmitted
!
!
!
IoMT SECURITY FRAMEWORK: IDENTIFY SCOPE
#1 Inventory of Authorized and
Unauthorized Devices
10
• Procurement: Collaboration between IT & Biomedical
• Add security assessment as a key criterion
• Deployment: Segmenting devices based on risk
• Monitoring: Process continuous monitoring and assessment
• Migration Plan: Process of replacing high risk devices
IoMT SECURITY FRAMEWORK: IDENTIFY GAPS & UPDATE PROCESSES
According to SANS Institute, 50% + of
incident response takes over 3 hours
per endpoint.
- 2016 Endpoint Security Report
11
GREAT BAY SOFTWARE: COMPANY SNAPSHOT
10+
$1B+
100%
20MM+
Years Experience Securing
Enterprises
Implementation Success Rate
Investment Fund Backed
Devices Secured
200+ Customer Installations
Beacon Product Suite
5th Generation
Subscription Pricing Model
Experienced Management Team
12
ACT
SEE
GREAT BAY VISION
IoT /
Biomedical
Device
Connection
Security
Monitoring
• Identity
• Behavior
• Location
Onboarding
• Authenticate Device
• Onboard Automatically
• Segment
Enforcement
• Alert
• Quarantine
• Block
Visibility
• Real-time Discovery
• Comprehensive Profiling
• Every Network
13
ENHANCED SECURITY, MANAGEMENT & OPERATIONS
IoT and
Biomedical Device
Warehouse of
Context
Active Directory &
Radius Accounting
DNS & DHCP
SNMP Traps &
Polls, IP Helper
Wireless
Controllers
NetFlow / JFlow
Port Mirroring /
SPAN
Integrations:
MDM, NAC, etc.
Security
Operations
Management
MDM
EPP/EDR
NAC ATD
Asset
Management
Security Ops
Ingests and Correlate Hundreds of
Endpoint Attributes from Dozens
of Data Sources Industry’s Most Accurate Artificial Intelligence Expert System-
Based Profiling Engine Leverages 1,400+ Pre-Built Device Profile
IoT Gateway
14
UNIQUE ARTIFICIAL INTELLIGENCE EXPERT SYSTEM-BASED BEHAVIOR MONITORING
BehaviorIdentity Location
New York
San Francisco
9100, 515, 80, 443
FTP (21) SSH (22), Telnet (23)
Only Vendor with Device (not User)
Centric Behavior Monitoring
Prepares you for Estimated 25% of
Breached Expected to Involve
IoT/Unmanaged Devices by 2020
Detects and Flags Unusual Changes in Identity, Location and Behavior
 Network Intrusion
 MAC Spoofing
 Rouge AP
 Rouge Device
 Vulnerable Devices
 Unauthorized Access
Detect
15
Problem:
Solution:
Result:
Securing Medical and Unmanageable Devices
Beacon Endpoint Profiler
• Real-time identification of 100% of the medical and unmanaged devices
• Automatically on-boards the device by establishing profile-based trust
• Accelerate incident response by pinpointing the exact real-time location of the device
• 7,600 endpoints authenticated (100% of medical and unmanaged devices)
• Savings of 2 FTEs
• Real time device visibility and behavior monitoring
• Regulatory Compliance (HIPPA, PCI)
CASE STUDY
16
Questions?
Manish Rai
VP of Marketing
Great Bay Software
mrai@greatbaysoftware.com

Weitere ähnliche Inhalte

Was ist angesagt?

AED Final Project Abstract
AED Final Project AbstractAED Final Project Abstract
AED Final Project Abstract
Ramya Reddy
 
IoT as enabler(future) of Smart Hospital Technology
IoT as enabler(future) of Smart Hospital TechnologyIoT as enabler(future) of Smart Hospital Technology
IoT as enabler(future) of Smart Hospital Technology
Volodymyr Nazarenko
 

Was ist angesagt? (20)

AED Final Project Abstract
AED Final Project AbstractAED Final Project Abstract
AED Final Project Abstract
 
IOT HEALTH CARE
IOT HEALTH CAREIOT HEALTH CARE
IOT HEALTH CARE
 
Iot, cloud and healthcare - Challenges and Opportunities
Iot, cloud and healthcare - Challenges and OpportunitiesIot, cloud and healthcare - Challenges and Opportunities
Iot, cloud and healthcare - Challenges and Opportunities
 
The internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive surveyThe internet of things for health care a comprehensive survey
The internet of things for health care a comprehensive survey
 
IoT Healthcare/Medical Devices Insights from Patents
IoT Healthcare/Medical Devices Insights from PatentsIoT Healthcare/Medical Devices Insights from Patents
IoT Healthcare/Medical Devices Insights from Patents
 
Big Data, CEP and IoT : Redefining Healthcare Information Systems and Analytics
Big Data, CEP and IoT : Redefining Healthcare Information Systems and AnalyticsBig Data, CEP and IoT : Redefining Healthcare Information Systems and Analytics
Big Data, CEP and IoT : Redefining Healthcare Information Systems and Analytics
 
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
IoT, Big Data Healthcare Summit Western Canada - IoT Health - Enterprise - Ri...
 
IOT in healthcare
IOT in healthcareIOT in healthcare
IOT in healthcare
 
IoT as enabler(future) of Smart Hospital Technology
IoT as enabler(future) of Smart Hospital TechnologyIoT as enabler(future) of Smart Hospital Technology
IoT as enabler(future) of Smart Hospital Technology
 
IoT Healthcare
IoT HealthcareIoT Healthcare
IoT Healthcare
 
Smart devices for seniors
Smart devices for seniorsSmart devices for seniors
Smart devices for seniors
 
Healthcare IoT and Analytics to treat Parkinsons
Healthcare IoT and Analytics to treat ParkinsonsHealthcare IoT and Analytics to treat Parkinsons
Healthcare IoT and Analytics to treat Parkinsons
 
Fast and fire-walled IOT healthcare-Baseer
Fast and fire-walled  IOT healthcare-BaseerFast and fire-walled  IOT healthcare-Baseer
Fast and fire-walled IOT healthcare-Baseer
 
اینترنت اشیاء در حوزه سلامت
اینترنت  اشیاء در حوزه سلامت اینترنت  اشیاء در حوزه سلامت
اینترنت اشیاء در حوزه سلامت
 
IoT in Health Care
IoT in Health CareIoT in Health Care
IoT in Health Care
 
Digital transformation and application of iot to healthcare
Digital transformation and application of iot to healthcareDigital transformation and application of iot to healthcare
Digital transformation and application of iot to healthcare
 
Trends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoTTrends in Sensors, Wearable Devices and IoT
Trends in Sensors, Wearable Devices and IoT
 
Perspectives on IoT in healthcare in 2016
Perspectives on IoT in healthcare in 2016Perspectives on IoT in healthcare in 2016
Perspectives on IoT in healthcare in 2016
 
Iot healthcare
Iot healthcareIot healthcare
Iot healthcare
 
IoT in healthcare
IoT in healthcareIoT in healthcare
IoT in healthcare
 

Ähnlich wie IoT Slam Healthcare 12-02-2016

THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
Pam Gilmore
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 

Ähnlich wie IoT Slam Healthcare 12-02-2016 (20)

Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptxDomain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
Domain 7 of CEH Mobile Platform, IoT, and OT Hacking.pptx
 
SANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems TodaySANS Report: The State of Security in Control Systems Today
SANS Report: The State of Security in Control Systems Today
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
Cybercrime future perspectives
Cybercrime future perspectivesCybercrime future perspectives
Cybercrime future perspectives
 
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalystScale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
 
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity GuidanceThe FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
The FDA - Mobile, and Fixed Medical Devices Cybersecurity Guidance
 
Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013
 
Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Windstream Cloud Security Checklist
Windstream Cloud Security Checklist
 
How Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and SecurityHow Medical Devices Risk Patient Safety and Security
How Medical Devices Risk Patient Safety and Security
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone UnderwearThe Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
 
The Evolution of Cybercrime
The Evolution of CybercrimeThe Evolution of Cybercrime
The Evolution of Cybercrime
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 

Kürzlich hochgeladen

Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetJalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
gragmanisha42
 
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
mriyagarg453
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Call Girls Service
 

Kürzlich hochgeladen (20)

Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetJalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Jalna Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Patiala Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Patiala Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Patiala Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Patiala Just Call 8250077686 Top Class Call Girl Service Available
 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
 
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhubaneswar Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in AnantapurCall Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
Call Girls Service Anantapur 📲 6297143586 Book Now VIP Call Girls in Anantapur
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetMangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Mangalore Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetbhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
bhopal Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun  UttrakhandDehradun Call Girls 8854095900 Call Girl in Dehradun  Uttrakhand
Dehradun Call Girls 8854095900 Call Girl in Dehradun Uttrakhand
 
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetTirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Tirupati Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
Call Girl Gorakhpur * 8250192130 Service starts from just ₹9999 ✅
 
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetdehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
dehradun Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance PaymentsEscorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
Escorts Service Ahmedabad🌹6367187148 🌹 No Need For Advance Payments
 
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
ooty Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
 
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetNanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Nanded Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 

IoT Slam Healthcare 12-02-2016

  • 1. SECURING INTERNET OF MEDICAL THINGS Manish Rai VP Marketing December 2nd, 2016
  • 2. 2 INTERNET OF MEDICAL THINGS (IoMT): $163B BY 2020, 38% CAGR • 10-15 Device per Bed • ~50% Networked Source: Markets and Markets, Oct 2015
  • 3. 3 A Glimpse into the Numbers 72%Malicious traffic targeted at Healthcare Providers 40% YoY Increase in Healthcare Cyber Attacks 81% of healthcare providers have revealed one or more systems have been compromised HEALTHCARE CONTINUES TO BE THE TOP TARGET FOR CRIMINALS Source: KPMG 2015 Healthcare Survey
  • 4. 4 MRI Device Hacked to Access Patient Information Researcher “was able to hack into the hospital's network with ease – and permission – after finding vulnerable medical devices listed on Shodan.”-International Business Times, Feb 15 2006 RESEARCHES HAVE BEEN HIGHLIGHTING IoMT VULNERABILITIES Infusion Pump Hacked to Administer Fatal Drug Dose Security Professionals “showed how easy it is for hackers to take control of a hospital drug infusion pump by overwriting the device’s firmware with malicious software. The hack would allow someone to remotely administer a fatal drug dose to patients.” Aug 12, 2015
  • 5. 5 • 7-8 year device development life cycle • Devices built for patient safely not security • Use of outdated OS with known vulnerabilities • Ltd or no patching capability • No support for 3rd party security agent • Till recently, limited regulatory focus on security • Unencrypted communication REASONS FOR IoMT VULNERABILITIES Attackers are infecting medical devices with malware and then moving laterally through hospital networks to steal confidential data, according to TrapX’s MEDJACK report. (2015)
  • 6. 6 2016 HIMSS Cybersecurity Survey: Greatest Areas of Vulnerabilities Top 5 Greatest Areas of Vulnerabilities (1-7 on a Likert-type scale) 1. E-mail (5.00 acute, 5.30 non-acute) 2. Mobile devices (4.81 acute, 4.72 non-acute) 3. Internet of Things (4.79 acute, 3.56 non-acute) 4. Other End User Devices (4.42 acute, 4.30 non-acute) 5. Network (4.17 acute, 4.07 non-acute)
  • 7. 7 2016 HIMSS Cybersecurity Survey: Information Security Tools Low Rates of Implementation: 1. Network monitoring tools (54.6% acute, 45.2% non-acute) 2. Mobile device management (56.3% acute, 35.5% non-acute) 3. Intrusion detection system (57.1% acute, 41.9% non-acute) 4. Intrusion prevention system (49.6% acute, 41.9% non-acute) 5. Data loss prevention (38.7% acute, 25.8% non-acute)
  • 8. 8 Determine Scope • Inventory IoMT Device • Determine Vulnerabilities • Categorize Based on Risk Identify Gaps & Update Processes • Procurement • Deployment • Monitoring • Migration Plan IoMT SECURITY FRAMEWORK
  • 9. 9 Inventory type, usage and location of each medical device Determine know vulnerabilities in each device type (OS, patching, default settings, etc.) Score Device Risk Based on type, use, location and data transmitted ! ! ! IoMT SECURITY FRAMEWORK: IDENTIFY SCOPE #1 Inventory of Authorized and Unauthorized Devices
  • 10. 10 • Procurement: Collaboration between IT & Biomedical • Add security assessment as a key criterion • Deployment: Segmenting devices based on risk • Monitoring: Process continuous monitoring and assessment • Migration Plan: Process of replacing high risk devices IoMT SECURITY FRAMEWORK: IDENTIFY GAPS & UPDATE PROCESSES According to SANS Institute, 50% + of incident response takes over 3 hours per endpoint. - 2016 Endpoint Security Report
  • 11. 11 GREAT BAY SOFTWARE: COMPANY SNAPSHOT 10+ $1B+ 100% 20MM+ Years Experience Securing Enterprises Implementation Success Rate Investment Fund Backed Devices Secured 200+ Customer Installations Beacon Product Suite 5th Generation Subscription Pricing Model Experienced Management Team
  • 12. 12 ACT SEE GREAT BAY VISION IoT / Biomedical Device Connection Security Monitoring • Identity • Behavior • Location Onboarding • Authenticate Device • Onboard Automatically • Segment Enforcement • Alert • Quarantine • Block Visibility • Real-time Discovery • Comprehensive Profiling • Every Network
  • 13. 13 ENHANCED SECURITY, MANAGEMENT & OPERATIONS IoT and Biomedical Device Warehouse of Context Active Directory & Radius Accounting DNS & DHCP SNMP Traps & Polls, IP Helper Wireless Controllers NetFlow / JFlow Port Mirroring / SPAN Integrations: MDM, NAC, etc. Security Operations Management MDM EPP/EDR NAC ATD Asset Management Security Ops Ingests and Correlate Hundreds of Endpoint Attributes from Dozens of Data Sources Industry’s Most Accurate Artificial Intelligence Expert System- Based Profiling Engine Leverages 1,400+ Pre-Built Device Profile IoT Gateway
  • 14. 14 UNIQUE ARTIFICIAL INTELLIGENCE EXPERT SYSTEM-BASED BEHAVIOR MONITORING BehaviorIdentity Location New York San Francisco 9100, 515, 80, 443 FTP (21) SSH (22), Telnet (23) Only Vendor with Device (not User) Centric Behavior Monitoring Prepares you for Estimated 25% of Breached Expected to Involve IoT/Unmanaged Devices by 2020 Detects and Flags Unusual Changes in Identity, Location and Behavior  Network Intrusion  MAC Spoofing  Rouge AP  Rouge Device  Vulnerable Devices  Unauthorized Access Detect
  • 15. 15 Problem: Solution: Result: Securing Medical and Unmanageable Devices Beacon Endpoint Profiler • Real-time identification of 100% of the medical and unmanaged devices • Automatically on-boards the device by establishing profile-based trust • Accelerate incident response by pinpointing the exact real-time location of the device • 7,600 endpoints authenticated (100% of medical and unmanaged devices) • Savings of 2 FTEs • Real time device visibility and behavior monitoring • Regulatory Compliance (HIPPA, PCI) CASE STUDY
  • 16. 16 Questions? Manish Rai VP of Marketing Great Bay Software mrai@greatbaysoftware.com

Hinweis der Redaktion

  1. Bio Medical Devices and IoT Market expected to be $163 Billion by 2020 Marketresearch.com Expected to save Patients, Providers, and Payers Billions of Dollars in Asthma Alone Goldman Sachs Roughly 15 Devices per bed FDA Mandates devices are connected to the network Bad guys practicing on their own purchased models Networks increasing in size and creating larger attack surface
  2. APT-Nation State Types of Cyber Criminals Script Kiddies-The most basic and least skilled attackers Hacktivists-Politically Motivated Cyber Criminals-Stereo Typical Attacker Looking to make Money Nation State Attackers-Sponsored Groups to launch extensive cyberwarfare The Numbers 72% of malicious traffic targeted Healthcare Providers Healthcare Cyber Attacks increase 40% YoY KPMG 2015 Healthcare Survey states 81% of people revealed one or more of their systems was compromised within the last year
  3. Data vulnerable from Bio-Medical Devices Images X-Ray CT MRI Ultrasound Waveforms ECG BP EEG Demographic Information Vital Signs Heart Rate BP Pulse OX Respiration Temperature Alarm Parameters Drug Type & Dosage Control and Configuration Settings Infusion Rates Therapy Timers Anesthesia Radiation Delivery Settings Laboratory Results Sounds from blood flow and respiration
  4. Insecure Medical Devices EoL Operating Systems Devices have a 7-8 year life cycle OS & Software are baked in years prior to release Unsecure Bluetooth of Wi-Fi Connections Who purchases Typically 15 per bed