SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Pharmaceutical Companies
and Computer Security
Fidèle DEGNI | Juliette FOINE | Professor Christopher Yukna |
Ecole Nationale Supérieure des Mines de Saint Etienne
Why IT Security is Primary for
Pharmaceutical Companies?
“If you have anything of value, you will be targeted. You won't necessarily know by who.”
John Stewart, Chief Security Officer, Cisco Systems
Digitalization (1/2)
• Digital = hot topic in healthcare
• Devices -> connected into a medical Internet of
Things (“IoT”)
3
• Big Data analytical techniques, in order to collect and process large
amounts of data
• Personalised drugs
Digitalization (2/2)
4
At the same time... (1/2)
• There are cyber security breaches into sophisticated and well-
managed companies by hackers, criminals and nation states
• Intellectual property is stolen, confidential emails are shared publicly,
and medical records used to create fraudulent new identities
• For example US retailer Target’s data breach of 2014 involving a
reported 70 million credit card records, JP Morgan Chase’s data
breach involving 76 million accounts and Anthem’s loss of personal
information of its clients and employees earlier this year are some of
the recent major security breaches
5
• In 2011, the UK government estimates its pharmaceutical,
biotechnology and healthcare sector suffered ₤1.8b in losses arising
from theft of intellectual property (IP)
• The global market for pharmaceuticals is estimated to hit USD $1.1
trillion in 2015. Strong demand for new cures and high profits
associated with marketing new, patent-protected drugs drive fierce
competition in product development
• It is not surprising then that criminal elements have increasingly
targeted the intellectual property of pharmaceutical companies. The
cost of IP falling into a competitor’s hands, however, is difficult to
calculate
At the same time... (2/2)
6
Cyber security risks (1/2)
• Compromising information leads to financial losses and reputational
damage, but compromised production systems could have far
reaching impacts including loss of life
• One key problem is that the use of manufacturing systems often HAS
technology which is older than the internet itself,
meaning that these systems are inherently insecure
7
• Another concern is integrity and availability.
• The same risks apply to medical devices
Cyber security risks (2/2)
8
Data security (1/2)
• In all sectors of pharmaceutical industries, the use of IT systems
(Enterprise Resource Planning, ...) creates new needs in terms of
data security and working tools.
• There is no much difference between banks and pharmaceutical
industries : they have needs for traceability and confidentiality.
For pharmaceutical companies, there is intellectual property too.
9
Nothing is more valuable to a pharmaceutical company
than the formula for one of its new drugs
Data security (2/2)
10
What is the priority? (1/2)
• R&D phases
• Manufacturing
Indeed : we can imagine the panic, if a computer virus destroyed
research data on drug candidate developed for several years, or if a
computers crash forced to halt production for several days to solve the
problem...
11
Pharmaceutical companies have a strong dependence on
computers. Any interference (availability, confidentiality,
integrity) at these systems can have serious
consequences on the various processes !
What is the priority? (2/2)
12
What can be done?
Company insiders, not outside hackers, are involved in more than two-thirds of all cyber cases
involving theft of intellectueal property… Wether driven by opportunism, greed, a desire for
revenge, or a combination of all three, these insiders exploit their position of trust to obtain acces
their organization’s most valued digital assets
Regulations for IT security
• 21 CFR Part 11 (electronic
records and signatures)
• : It ensures the laboratories
traceability of all changes in the
system. Indeed, any changes
made by a manufacturer must
be drawn: who, what date and
time, why, etc. This allows for a
history of everything about a
product or action "
Norme ISO 27 001
• This international standard
provides a framework and
methods to identify and maintain
a level of security appropriate to
the constraints that meet the
obligations and requirements of
stakeholders
14
These IT security companies are involved including for audit of existing
systems missions.
They play penetration tests, which consist in trying to penetrate the system by
all means to detect security vulnerabilities.
Then, they study the practices, and also provide governance services, risk
analysis, often attending the computer security manager of the company .
Finally, they work on operational safety for support on the security infrastructure
or for reaction to incidents "
Testing the IT security with audits
15
Organizations need to do their
part 1/2
• Cyber risks resulting from interconnectivity to the internet and
enterprise systems must be taken into account as we increasingly
interconnect devices
• Organisations should analyse and understand the risks of increasing
connectivity together with assessing how their key assets are being
protected. It is crucial that security must be included during the
design process and as an inherent part of any system
16
• Educate and regularly train employees on security or other protocols
• Ensure that proprietary information is adequately, if not robustly,
protected
• Use appropriate screening processes to select new employees
• Provide non-threatening, convenient ways for employees to report
suspicions
• Routinely monitor computer networks for suspicious activity
• Ensure security (to include computer network security) personnel
have the tools they need
Organizations need to do their
part 2/2
17
Location of the business / context to
become expert in computer security
For several years, the budget of an undertaking allocated to IT security is
increasing much faster than other budgets.
With the explosion of cybercrime, and with the increasing complexity of
information systems, companies are often looking for new computer security
experts. The security of an organization's data has become a strategic
challenge, the IT security expert often will have a special status within a
company, and loyalty to the employer will often be rewarded.
18
Thank you for listening!
Questions?
19
References
• http://www.industrie.com/pharma/n-oublions-pas-la-securite,41826
• http://www.usine-digitale.fr/article/industrie-4-0-et-securite-informatique-les-nouvelles-
menaces.N337102
• http://www.ordre.pharmacien.fr/Le-patient/La-protection-des-donnees-de-sante
• http://etudiant.aujourdhui.fr/etudiant/metiers/fiche-metier/expert-en-securite-informatique.html
• http://www.europeanpharmaceuticalreview.com/35994/news/blog/cyber-security-in-
pharmaceuticals/
• http://www2.deloitte.com/jp/en/pages/life-sciences-and-healthcare/articles/ls/cyber-security-
ls.html
• https://www.ft.com/content/a6b09006-e5c9-11e3-aeef-00144feabdc0
20

Weitere ähnliche Inhalte

Was ist angesagt?

corrective and preventive action (CAPA)
corrective and preventive action (CAPA)corrective and preventive action (CAPA)
corrective and preventive action (CAPA)prakhar rai pk
 
LIMS Implementation
LIMS ImplementationLIMS Implementation
LIMS ImplementationRobin Emig
 
Good Manufacturing Practice (GMP) | Arrelic Insights
Good Manufacturing Practice (GMP) | Arrelic InsightsGood Manufacturing Practice (GMP) | Arrelic Insights
Good Manufacturing Practice (GMP) | Arrelic InsightsArrelic
 
FDA Data Integrity Issues - DMS hot fixes
FDA Data Integrity Issues - DMS hot fixesFDA Data Integrity Issues - DMS hot fixes
FDA Data Integrity Issues - DMS hot fixesVidyasagar P
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Santhosh L
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-PracticesMarco Raposo
 
Introduction to Understanding Human errors in Pharmaceutical Industries
 Introduction to Understanding Human errors in Pharmaceutical Industries Introduction to Understanding Human errors in Pharmaceutical Industries
Introduction to Understanding Human errors in Pharmaceutical IndustriesKarishmaRK
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsEd Tobias
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Maxime CARPENTIER
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghOWASP Delhi
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingCase IQ
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 

Was ist angesagt? (20)

corrective and preventive action (CAPA)
corrective and preventive action (CAPA)corrective and preventive action (CAPA)
corrective and preventive action (CAPA)
 
LIMS Implementation
LIMS ImplementationLIMS Implementation
LIMS Implementation
 
Good Manufacturing Practice (GMP) | Arrelic Insights
Good Manufacturing Practice (GMP) | Arrelic InsightsGood Manufacturing Practice (GMP) | Arrelic Insights
Good Manufacturing Practice (GMP) | Arrelic Insights
 
FDA Data Integrity Issues - DMS hot fixes
FDA Data Integrity Issues - DMS hot fixesFDA Data Integrity Issues - DMS hot fixes
FDA Data Integrity Issues - DMS hot fixes
 
Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...Automated anti money laundering using artificial intelligence and machine lea...
Automated anti money laundering using artificial intelligence and machine lea...
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Security Audit Best-Practices
Security Audit Best-PracticesSecurity Audit Best-Practices
Security Audit Best-Practices
 
Introduction to Understanding Human errors in Pharmaceutical Industries
 Introduction to Understanding Human errors in Pharmaceutical Industries Introduction to Understanding Human errors in Pharmaceutical Industries
Introduction to Understanding Human errors in Pharmaceutical Industries
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Corrective and Preventive action (CAPA)
Corrective and Preventive action (CAPA)Corrective and Preventive action (CAPA)
Corrective and Preventive action (CAPA)
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...Operational security | How to design your information security GRC (governanc...
Operational security | How to design your information security GRC (governanc...
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
FDA 483 observations in the lab
FDA 483 observations in the labFDA 483 observations in the lab
FDA 483 observations in the lab
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
Fight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud TrainingFight Fraud with Employee Fraud Training
Fight Fraud with Employee Fraud Training
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
IT compliance
IT complianceIT compliance
IT compliance
 

Ähnlich wie Pharmaceutical companies and security

Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Securityijtsrd
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...JustinFinch11
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system securityJan Wong
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wpCMR WORLD TECH
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One PagerSydney Wolff
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligencewbesse
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 

Ähnlich wie Pharmaceutical companies and security (20)

Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
An Empirical Study on Information Security
An Empirical Study on Information SecurityAn Empirical Study on Information Security
An Empirical Study on Information Security
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
i2 Contact Tracing One Pager
i2 Contact Tracing One Pageri2 Contact Tracing One Pager
i2 Contact Tracing One Pager
 
Forensics
ForensicsForensics
Forensics
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 

Kürzlich hochgeladen

(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipurseemahedar019
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabadgragmanisha42
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Sheetaleventcompany
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipurgragmanisha42
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171Call Girls Service Gurgaon
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhSheetaleventcompany
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...gurkirankumar98700
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...russian goa call girl and escorts service
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthanindiancallgirl4rent
 
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★indiancallgirl4rent
 
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...Gfnyt
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...chandigarhentertainm
 

Kürzlich hochgeladen (20)

(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in UdaipurUdaipur Call Girls 📲 9999965857 Call Girl in Udaipur
Udaipur Call Girls 📲 9999965857 Call Girl in Udaipur
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
 
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In RaipurCall Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
Call Girl Raipur 📲 9999965857 ヅ10k NiGhT Call Girls In Raipur
 
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
❤️♀️@ Jaipur Call Girl Agency ❤️♀️@ Manjeet Russian Call Girls Service in Jai...
 
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetOzhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Ozhukarai Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171VIP Call Girl Sector 10 Noida Call Me: 9711199171
VIP Call Girl Sector 10 Noida Call Me: 9711199171
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
 
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
Enjoyment ★ 8854095900 Indian Call Girls In Dehradun 🍆🍌 By Dehradun Call Girl ★
 
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...Bangalore call girl  👯‍♀️@ Simran Independent Call Girls in Bangalore  GIUXUZ...
Bangalore call girl 👯‍♀️@ Simran Independent Call Girls in Bangalore GIUXUZ...
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
❤️Call girls in Jalandhar ☎️9876848877☎️ Call Girl service in Jalandhar☎️ Jal...
 

Pharmaceutical companies and security

  • 1. Pharmaceutical Companies and Computer Security Fidèle DEGNI | Juliette FOINE | Professor Christopher Yukna | Ecole Nationale Supérieure des Mines de Saint Etienne
  • 2. Why IT Security is Primary for Pharmaceutical Companies? “If you have anything of value, you will be targeted. You won't necessarily know by who.” John Stewart, Chief Security Officer, Cisco Systems
  • 3. Digitalization (1/2) • Digital = hot topic in healthcare • Devices -> connected into a medical Internet of Things (“IoT”) 3
  • 4. • Big Data analytical techniques, in order to collect and process large amounts of data • Personalised drugs Digitalization (2/2) 4
  • 5. At the same time... (1/2) • There are cyber security breaches into sophisticated and well- managed companies by hackers, criminals and nation states • Intellectual property is stolen, confidential emails are shared publicly, and medical records used to create fraudulent new identities • For example US retailer Target’s data breach of 2014 involving a reported 70 million credit card records, JP Morgan Chase’s data breach involving 76 million accounts and Anthem’s loss of personal information of its clients and employees earlier this year are some of the recent major security breaches 5
  • 6. • In 2011, the UK government estimates its pharmaceutical, biotechnology and healthcare sector suffered ₤1.8b in losses arising from theft of intellectual property (IP) • The global market for pharmaceuticals is estimated to hit USD $1.1 trillion in 2015. Strong demand for new cures and high profits associated with marketing new, patent-protected drugs drive fierce competition in product development • It is not surprising then that criminal elements have increasingly targeted the intellectual property of pharmaceutical companies. The cost of IP falling into a competitor’s hands, however, is difficult to calculate At the same time... (2/2) 6
  • 7. Cyber security risks (1/2) • Compromising information leads to financial losses and reputational damage, but compromised production systems could have far reaching impacts including loss of life • One key problem is that the use of manufacturing systems often HAS technology which is older than the internet itself, meaning that these systems are inherently insecure 7
  • 8. • Another concern is integrity and availability. • The same risks apply to medical devices Cyber security risks (2/2) 8
  • 9. Data security (1/2) • In all sectors of pharmaceutical industries, the use of IT systems (Enterprise Resource Planning, ...) creates new needs in terms of data security and working tools. • There is no much difference between banks and pharmaceutical industries : they have needs for traceability and confidentiality. For pharmaceutical companies, there is intellectual property too. 9
  • 10. Nothing is more valuable to a pharmaceutical company than the formula for one of its new drugs Data security (2/2) 10
  • 11. What is the priority? (1/2) • R&D phases • Manufacturing Indeed : we can imagine the panic, if a computer virus destroyed research data on drug candidate developed for several years, or if a computers crash forced to halt production for several days to solve the problem... 11
  • 12. Pharmaceutical companies have a strong dependence on computers. Any interference (availability, confidentiality, integrity) at these systems can have serious consequences on the various processes ! What is the priority? (2/2) 12
  • 13. What can be done? Company insiders, not outside hackers, are involved in more than two-thirds of all cyber cases involving theft of intellectueal property… Wether driven by opportunism, greed, a desire for revenge, or a combination of all three, these insiders exploit their position of trust to obtain acces their organization’s most valued digital assets
  • 14. Regulations for IT security • 21 CFR Part 11 (electronic records and signatures) • : It ensures the laboratories traceability of all changes in the system. Indeed, any changes made by a manufacturer must be drawn: who, what date and time, why, etc. This allows for a history of everything about a product or action " Norme ISO 27 001 • This international standard provides a framework and methods to identify and maintain a level of security appropriate to the constraints that meet the obligations and requirements of stakeholders 14
  • 15. These IT security companies are involved including for audit of existing systems missions. They play penetration tests, which consist in trying to penetrate the system by all means to detect security vulnerabilities. Then, they study the practices, and also provide governance services, risk analysis, often attending the computer security manager of the company . Finally, they work on operational safety for support on the security infrastructure or for reaction to incidents " Testing the IT security with audits 15
  • 16. Organizations need to do their part 1/2 • Cyber risks resulting from interconnectivity to the internet and enterprise systems must be taken into account as we increasingly interconnect devices • Organisations should analyse and understand the risks of increasing connectivity together with assessing how their key assets are being protected. It is crucial that security must be included during the design process and as an inherent part of any system 16
  • 17. • Educate and regularly train employees on security or other protocols • Ensure that proprietary information is adequately, if not robustly, protected • Use appropriate screening processes to select new employees • Provide non-threatening, convenient ways for employees to report suspicions • Routinely monitor computer networks for suspicious activity • Ensure security (to include computer network security) personnel have the tools they need Organizations need to do their part 2/2 17
  • 18. Location of the business / context to become expert in computer security For several years, the budget of an undertaking allocated to IT security is increasing much faster than other budgets. With the explosion of cybercrime, and with the increasing complexity of information systems, companies are often looking for new computer security experts. The security of an organization's data has become a strategic challenge, the IT security expert often will have a special status within a company, and loyalty to the employer will often be rewarded. 18
  • 19. Thank you for listening! Questions? 19
  • 20. References • http://www.industrie.com/pharma/n-oublions-pas-la-securite,41826 • http://www.usine-digitale.fr/article/industrie-4-0-et-securite-informatique-les-nouvelles- menaces.N337102 • http://www.ordre.pharmacien.fr/Le-patient/La-protection-des-donnees-de-sante • http://etudiant.aujourdhui.fr/etudiant/metiers/fiche-metier/expert-en-securite-informatique.html • http://www.europeanpharmaceuticalreview.com/35994/news/blog/cyber-security-in- pharmaceuticals/ • http://www2.deloitte.com/jp/en/pages/life-sciences-and-healthcare/articles/ls/cyber-security- ls.html • https://www.ft.com/content/a6b09006-e5c9-11e3-aeef-00144feabdc0 20

Hinweis der Redaktion

  1. primary = primordial
  2. Digital health is a hot topic in healthcare offering more effective and more efficient personalised healthcare to patients and careers Devices such as fitness trackers, heart monitors and insulin pumps are connected into a medical Internet of Things (“IoT”) to enable us to monitor our activity, heart rate, and blood pressure
  3. Pharmaceutical and health companies can apply Big Data analytical techniques to collect and process large amounts of data Digitisation enables pharmaceutical companies to create personalised drugs based on individuals’ genomic sequences, more effective measurement of drug uptake and efficacy, and enables a closer relationship between pharmaceutical companies and patients
  4. The 2014 JPMorgan Chase data breach was a cyber-attack against American bank JPMorgan Chase that is believed to have compromised data associated with over 83 million accounts – 76 million households (approximately two out of three households in the country) and 7 million small businesses.[1] The data breach is considered one of the most serious intrusions into an American corporation's information system and one of the largest data breaches in history.[2][3][4] The attack – disclosed in September 2014 – was discovered by the bank's security team in late July 2014, but not completely halted until the middle of August.[3][5] The bank declared that login information associated with the accounts (such as social security numbers or passwords) was not compromised but names, email and postal addresses, and phone numbers of account holders were obtained by hackers, raising concerns of potential phishing attacks.[4][6]
  5. . They were designed as specialised and isolated systems and not built to withstand cyber security attacks
  6. As a patient, I am more concerned if my recorded blood type is changed (integrity) rather than my blood type is divulged (confidentiality). Médical devices. Vulnerabilities in the design or implementation of a medical device such as an insulin pump or in anything interconnected to such devices could result in loss of device integrity and potential harm to patients if they are exploited in a cyber-attack
  7. Indeed = en effet
  8. FD
  9. CFR = Code of Federal Regulation, edited by the FDA ISO : international standard organization
  10. FD
  11. FD