SlideShare ist ein Scribd-Unternehmen logo
1 von 23
At the Security Crossroads of Healthcare
Reforms and IoT enabled e-Health
Rajesh Vargheese
CTO, Cisco Healthcare Solutions
4/16/2014
SecConX Conference 2014
2SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Agenda
• Healthcare Reforms
• Key Healthcare IT transitions
• Transitions created security
challenges
• Internet of everything
enabled e-Health
• E-Health Architecture and
Security touch points
• PHI Data and Healthcare
Attack Vectors
• Healthcare Regulations and
Data breaches
• Influencing Healthcare
outcomes
• Conclusion and Q & A
3SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Let’s start with a Stretching Exercise
Show of Hands
How many of you
use some form of
fitness device?
How many of you
have access to a
patient portal?
How many of you
have a healthcare
mobile app?
4SecConX Conference 2014 – Session 4 - Rajesh Vargheese
How many of you were able to do
this 10 years ago?
5SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Healthcare Information Technology Transition
The Last 10 years
The progress that
Healthcare IT has made in
the last 10 years is much
more that the last 50
years combined.
6SecConX Conference 2014 – Session 4 - Rajesh Vargheese
US Healthcare Reforms
• A paradigm shift in fixing healthcare
challenges
• Technology has a key role
• The Carrot and the Stick Approach
• Incentives for compliance
• Payment penalties for non
compliance
• Focus on
• Access to Care
• Care coordination
• Preventive Care
• Improve the quality of health care
• Decrease the cost of health care
Cisco Confidential 7
US Healthcare Reforms
Meaningful Use Stages
2014
Stage 1
Data Capture and
Sharing
Stage 2
Advance Clinical
Processes
Stage 3
Improved
outcomes
8SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Value Adds
Health Care Reforms: Key Healthcare IT Transitions
With relevance to Security
Paper
Charts
Electronic
Medical Record
Data access to
Providers in
network only
Data access
to Providers
and Patients
Devices Inside
Hospitals
Devices
Every where
Any time Access
Any where Access
Closer PoC Access
9SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Value Adds
Health Care Reforms: Key Healthcare IT Transitions
With relevance to Security
Siloes of
Hospital Data
Shared Data
Exchange
Controlled
Enterprise
Networks
Transition to
Cloud, Hybrid
Models
Dedicated
Workstations
BYOD, Mobile
Devices and
Apps More Choices
More Data
More Services
10SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Transitions
Key Healthcare IT Transitions
The Hacker’s Delight
Electronic
Medical Record
Data access
to Providers
and Patients
Devices
Every where
Any time Access
Any where Access
Closer PoC Access
Value Adds
Any time Attack, Confidentiality,
Availability, Integrity Attacks, Data in
Motion, Data in Rest Attacks, Privacy
Critical Attack Vectors close to point
of care, Hijacking and Personal
Injury, Channel Attacks, Reduced
Perimeter Defense
Security Challenges
Any where Attack, More Vulnerable
access points, More Attack Vectors,
Reduced Perimeter Defense, Identity
Based attacks
11SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Transitions Value Adds
Key Healthcare IT Transitions
The Hacker’s Delight
Shared Data
Exchange
Transition to
Cloud, Hybrid
Models
BYOD, Mobile
Devices and
Apps
Increased
Data Path,
Dependency
More Choices
More Data
More Services
More Service Paths, Expanded
Business Associates, Availability,
Integrity Attacks, Data in Rest Attacks
More Devices, Less Control, More
Threats and Vulnerabilities from
Shared Access, Increased Loss and
Theft Probabilities
Security Challenges
More Data Paths, More Attack
Vectors, Borderless Vulnerabilities,
Expanded Trust Entities,
Dependencies
12SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Healthcare Internet of Everything
Process
Things
People
Data
Healthcare
IoE
13SecConX Conference 2014 – Session 4 - Rajesh Vargheese
IoE enabled E-Health Architecture
Increased
Data Path,
Dependency
Cloud enabled, Access
from anywhere, anytime,
any device
Access to care teams and
information enabling
patient engagement
Integrated Platform for
seamless access to
devices and applications
14SecConX Conference 2014 – Session 4 - Rajesh Vargheese
The Journey of the e-Health Data
Home
Hospital A
Hospital B
Exchange
Hospital C
15SecConX Conference 2014 – Session 4 - Rajesh Vargheese
IoE Cloud Based E-Health Architecture
Sample Security Touch points
1. Endpoint Device Security
2. Network Security
3. Cloud based Application
Security
4. Data Storage Security
5. Enterprise Application Access
Security
6. Federated Partner Cloud
Services Access Security
16SecConX Conference 2014 – Session 4 - Rajesh Vargheese
The Healthcare Attack Vectors
Device
Application
Network
Infrastructure
Portal, EMR Access control
- AAA, HIE, API interfaces,
Web Security
Communication Devices,
Medical Devices, OS,
Malware, Patch, Location
Channel Attack, Data in
motion, Trust, Integrity,
Confidentiality, Wireless
Hard drives, Data in Rest,
Theft, Physical Access
17SecConX Conference 2014 – Session 4 - Rajesh Vargheese
The Closest Attack Vector
Medical Devices, Implantable Devices
References:
http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/21/yes-terrorists-could-have-hacked-dick-cheneys-heart/
http://go.bloomberg.com/tech-blog/2012-02-29-hacker-shows-off-lethal-attack-by-controlling-wireless-medical-device/
http://www.fda.gov/medicaldevices/safety/alertsandnotices/ucm356423.htm
18SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Healthcare Security Risk Mitigation
• Start with an Information
Security Risk Assessment
• Follow Information Security best
practices with policies
• Control what you can, Monitor and
mitigate the unknown
• Password management – multi
factor authentication
• Mobile device access control and
containerization – separate personal
and business data
• Implement data loss wipe
strategies
• Patch Management
• Threats are constantly evolving
• Leverage an adaptive learning
defense system
• Advanced Malware Protection
• Safety is a Shared Responsibility
• Educate, Enable, at the same time
enforce policies
• Understand Healthcare
Uniqueness
• Half leaked can be more damaging
• Understand PHI life cycle
• Encryption of data in motion and
rest, Business associates
19SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Healthcare Regulations
• HIPAA (Health Insurance
Portability and Accountability
Act)
• HITECH (Health Information
Technology for Economic
and Clinical Health Act)
• HIPAA compliance is a
requirement for meaningful
use.
• HITECH provides financial
incentives for meeting
Meaningful use goals
• Enforced by Department of
Health Human Services
through Office of Civil Rights
20SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Healthcare Data Breaches
Reference: http://datalossdb.org/statistics
21SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Influencing Healthcare Outcomes
Significance of Privacy and Security Health
Outcomes
Evidence
Based
Information
Sharing
Willingness to
Share
AvailabilityIntegrityConfidentiality
Trust
Regulation, Ethics, Rights, Accountability, Safeguards
22SecConX Conference 2014 – Session 4 - Rajesh Vargheese
Conclusion
• Healthcare Reforms is
creating Key Healthcare IT
transitions
• Internet of everything is
connecting the unconnected
• These transitions create new
security challenges
• An Information Security Risk
Mitigation Plan is not an
option, it is a must
• Protect PHI Data and
understand data Life Cycle
• Data breaches are extremely
costly and has a negative
impact
• Leverage best practices of
Information security
• Privacy and Security has an
impact on Healthcare
Outcomes
Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityBen Quirk
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trendsDImension Data
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurancemindleaftechnologies
 
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST CertificationHitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST CertificationSchellman & Company
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack Medigate
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidancePam Gilmore
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesSplunk
 
Owasp top 10_proactive_controls_v3
Owasp top 10_proactive_controls_v3Owasp top 10_proactive_controls_v3
Owasp top 10_proactive_controls_v3RazaMehmood7
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and complianceInuit AB
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationMedigate
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus
 

Was ist angesagt? (20)

Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Moving healthcare applications to the cloud
Moving healthcare applications to the cloudMoving healthcare applications to the cloud
Moving healthcare applications to the cloud
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
M ivedix ontrack
M ivedix ontrackM ivedix ontrack
M ivedix ontrack
 
HIPAA_CheatSheet
HIPAA_CheatSheetHIPAA_CheatSheet
HIPAA_CheatSheet
 
MindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insuranceMindLeaf - HIPAA privacy and cybersecurity insurance
MindLeaf - HIPAA privacy and cybersecurity insurance
 
Common Security Framework Summary
Common Security Framework SummaryCommon Security Framework Summary
Common Security Framework Summary
 
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST CertificationHitrust: Navigating to 2017, Your Map to HITRUST Certification
Hitrust: Navigating to 2017, Your Map to HITRUST Certification
 
Medical Devices Under Attack
Medical Devices Under Attack Medical Devices Under Attack
Medical Devices Under Attack
 
Get Ready Now for HITRUST 2017
Get Ready Now for HITRUST 2017Get Ready Now for HITRUST 2017
Get Ready Now for HITRUST 2017
 
Securing Wearable Device Data
Securing Wearable Device DataSecuring Wearable Device Data
Securing Wearable Device Data
 
THE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity GuidanceTHE FDA and Medical Device Cybersecurity Guidance
THE FDA and Medical Device Cybersecurity Guidance
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
Owasp top 10_proactive_controls_v3
Owasp top 10_proactive_controls_v3Owasp top 10_proactive_controls_v3
Owasp top 10_proactive_controls_v3
 
Developing a 360° view of risk and compliance
Developing a 360° view of risk and complianceDeveloping a 360° view of risk and compliance
Developing a 360° view of risk and compliance
 
What You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network SegmentationWhat You Need to Know About Intelligent Network Segmentation
What You Need to Know About Intelligent Network Segmentation
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 

Ähnlich wie Security Crossroads of Healthcare reforms and IoT enabled E-health

building-a-secure-medical-app-with-dot-net.pdf
building-a-secure-medical-app-with-dot-net.pdfbuilding-a-secure-medical-app-with-dot-net.pdf
building-a-secure-medical-app-with-dot-net.pdfPixelQA
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks International
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsESET North America
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsKristie Allison
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanAngie Willis
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...Health IT Conference – iHT2
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks
 
Cybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfCybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfLarisaAlbanians
 
Gpt power of cloud & mhealth 031914
Gpt power of cloud & mhealth 031914Gpt power of cloud & mhealth 031914
Gpt power of cloud & mhealth 031914Samantha Haas
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...Health IT Conference – iHT2
 
How Interconnection Can Support Next Generation Health Digital Platforms
How Interconnection Can Support Next Generation Health Digital PlatformsHow Interconnection Can Support Next Generation Health Digital Platforms
How Interconnection Can Support Next Generation Health Digital PlatformsEquinix
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
Healthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureHealthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureVARUN KESAVAN
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front doorRyan Coleman
 
AWS Health Tech Day • SourceFuse
AWS Health Tech Day • SourceFuseAWS Health Tech Day • SourceFuse
AWS Health Tech Day • SourceFuseSourceFuse
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...Dana Gardner
 

Ähnlich wie Security Crossroads of Healthcare reforms and IoT enabled E-health (20)

building-a-secure-medical-app-with-dot-net.pdf
building-a-secure-medical-app-with-dot-net.pdfbuilding-a-secure-medical-app-with-dot-net.pdf
building-a-secure-medical-app-with-dot-net.pdf
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
MobileSecurity WhitePaper
MobileSecurity WhitePaperMobileSecurity WhitePaper
MobileSecurity WhitePaper
 
Expressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber SecurityExpressworks Perspective on Human Behavior and Cyber Security
Expressworks Perspective on Human Behavior and Cyber Security
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
Cybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdfCybersecurity Measures and Privacy Protection.pdf
Cybersecurity Measures and Privacy Protection.pdf
 
Gpt power of cloud & mhealth 031914
Gpt power of cloud & mhealth 031914Gpt power of cloud & mhealth 031914
Gpt power of cloud & mhealth 031914
 
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ..."Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
"Case Studies from the Field: Putting Cyber Security Strategies into Action" ...
 
How Interconnection Can Support Next Generation Health Digital Platforms
How Interconnection Can Support Next Generation Health Digital PlatformsHow Interconnection Can Support Next Generation Health Digital Platforms
How Interconnection Can Support Next Generation Health Digital Platforms
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
Healthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of futureHealthcare Maneuverability: Equipping the mobile clinician of future
Healthcare Maneuverability: Equipping the mobile clinician of future
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
AWS Health Tech Day • SourceFuse
AWS Health Tech Day • SourceFuseAWS Health Tech Day • SourceFuse
AWS Health Tech Day • SourceFuse
 
HP Whitepaper BYOD in Healthcare
 HP Whitepaper BYOD in Healthcare  HP Whitepaper BYOD in Healthcare
HP Whitepaper BYOD in Healthcare
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
How a Widely Distributed Dental Firm Protects Sensitive Data While Making It ...
 

Kürzlich hochgeladen

Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknowgragteena
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...gragteena
 
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Niamh verma
 
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Modelsindiancallgirl4rent
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅gragmanisha42
 
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Russian Call Girls Amritsar
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591adityaroy0215
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Niamh verma
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Sheetaleventcompany
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
 

Kürzlich hochgeladen (20)

Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Book me...
 
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
 
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Chandigarh Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Hyderabad Just Call 9907093804 Top Class Call Girl Service Available
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
 
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
Russian Call Girls Kota * 8250192130 Service starts from just ₹9999 ✅
 
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
 
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
#9711199012# African Student Escorts in Delhi 😘 Call Girls Delhi
 
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130  Available With RoomVIP Kolkata Call Girl New Town 👉 8250192130  Available With Room
VIP Kolkata Call Girl New Town 👉 8250192130 Available With Room
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Subhash Nagar Delhi reach out to us at 🔝9953056974🔝
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
 
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Thane Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
Call Girl In Zirakpur ❤️♀️@ 9988299661 Zirakpur Call Girls Near Me ❤️♀️@ Sexy...
 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
 

Security Crossroads of Healthcare reforms and IoT enabled E-health

  • 1. At the Security Crossroads of Healthcare Reforms and IoT enabled e-Health Rajesh Vargheese CTO, Cisco Healthcare Solutions 4/16/2014 SecConX Conference 2014
  • 2. 2SecConX Conference 2014 – Session 4 - Rajesh Vargheese Agenda • Healthcare Reforms • Key Healthcare IT transitions • Transitions created security challenges • Internet of everything enabled e-Health • E-Health Architecture and Security touch points • PHI Data and Healthcare Attack Vectors • Healthcare Regulations and Data breaches • Influencing Healthcare outcomes • Conclusion and Q & A
  • 3. 3SecConX Conference 2014 – Session 4 - Rajesh Vargheese Let’s start with a Stretching Exercise Show of Hands How many of you use some form of fitness device? How many of you have access to a patient portal? How many of you have a healthcare mobile app?
  • 4. 4SecConX Conference 2014 – Session 4 - Rajesh Vargheese How many of you were able to do this 10 years ago?
  • 5. 5SecConX Conference 2014 – Session 4 - Rajesh Vargheese Healthcare Information Technology Transition The Last 10 years The progress that Healthcare IT has made in the last 10 years is much more that the last 50 years combined.
  • 6. 6SecConX Conference 2014 – Session 4 - Rajesh Vargheese US Healthcare Reforms • A paradigm shift in fixing healthcare challenges • Technology has a key role • The Carrot and the Stick Approach • Incentives for compliance • Payment penalties for non compliance • Focus on • Access to Care • Care coordination • Preventive Care • Improve the quality of health care • Decrease the cost of health care
  • 7. Cisco Confidential 7 US Healthcare Reforms Meaningful Use Stages 2014 Stage 1 Data Capture and Sharing Stage 2 Advance Clinical Processes Stage 3 Improved outcomes
  • 8. 8SecConX Conference 2014 – Session 4 - Rajesh Vargheese Value Adds Health Care Reforms: Key Healthcare IT Transitions With relevance to Security Paper Charts Electronic Medical Record Data access to Providers in network only Data access to Providers and Patients Devices Inside Hospitals Devices Every where Any time Access Any where Access Closer PoC Access
  • 9. 9SecConX Conference 2014 – Session 4 - Rajesh Vargheese Value Adds Health Care Reforms: Key Healthcare IT Transitions With relevance to Security Siloes of Hospital Data Shared Data Exchange Controlled Enterprise Networks Transition to Cloud, Hybrid Models Dedicated Workstations BYOD, Mobile Devices and Apps More Choices More Data More Services
  • 10. 10SecConX Conference 2014 – Session 4 - Rajesh Vargheese Transitions Key Healthcare IT Transitions The Hacker’s Delight Electronic Medical Record Data access to Providers and Patients Devices Every where Any time Access Any where Access Closer PoC Access Value Adds Any time Attack, Confidentiality, Availability, Integrity Attacks, Data in Motion, Data in Rest Attacks, Privacy Critical Attack Vectors close to point of care, Hijacking and Personal Injury, Channel Attacks, Reduced Perimeter Defense Security Challenges Any where Attack, More Vulnerable access points, More Attack Vectors, Reduced Perimeter Defense, Identity Based attacks
  • 11. 11SecConX Conference 2014 – Session 4 - Rajesh Vargheese Transitions Value Adds Key Healthcare IT Transitions The Hacker’s Delight Shared Data Exchange Transition to Cloud, Hybrid Models BYOD, Mobile Devices and Apps Increased Data Path, Dependency More Choices More Data More Services More Service Paths, Expanded Business Associates, Availability, Integrity Attacks, Data in Rest Attacks More Devices, Less Control, More Threats and Vulnerabilities from Shared Access, Increased Loss and Theft Probabilities Security Challenges More Data Paths, More Attack Vectors, Borderless Vulnerabilities, Expanded Trust Entities, Dependencies
  • 12. 12SecConX Conference 2014 – Session 4 - Rajesh Vargheese Healthcare Internet of Everything Process Things People Data Healthcare IoE
  • 13. 13SecConX Conference 2014 – Session 4 - Rajesh Vargheese IoE enabled E-Health Architecture Increased Data Path, Dependency Cloud enabled, Access from anywhere, anytime, any device Access to care teams and information enabling patient engagement Integrated Platform for seamless access to devices and applications
  • 14. 14SecConX Conference 2014 – Session 4 - Rajesh Vargheese The Journey of the e-Health Data Home Hospital A Hospital B Exchange Hospital C
  • 15. 15SecConX Conference 2014 – Session 4 - Rajesh Vargheese IoE Cloud Based E-Health Architecture Sample Security Touch points 1. Endpoint Device Security 2. Network Security 3. Cloud based Application Security 4. Data Storage Security 5. Enterprise Application Access Security 6. Federated Partner Cloud Services Access Security
  • 16. 16SecConX Conference 2014 – Session 4 - Rajesh Vargheese The Healthcare Attack Vectors Device Application Network Infrastructure Portal, EMR Access control - AAA, HIE, API interfaces, Web Security Communication Devices, Medical Devices, OS, Malware, Patch, Location Channel Attack, Data in motion, Trust, Integrity, Confidentiality, Wireless Hard drives, Data in Rest, Theft, Physical Access
  • 17. 17SecConX Conference 2014 – Session 4 - Rajesh Vargheese The Closest Attack Vector Medical Devices, Implantable Devices References: http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/21/yes-terrorists-could-have-hacked-dick-cheneys-heart/ http://go.bloomberg.com/tech-blog/2012-02-29-hacker-shows-off-lethal-attack-by-controlling-wireless-medical-device/ http://www.fda.gov/medicaldevices/safety/alertsandnotices/ucm356423.htm
  • 18. 18SecConX Conference 2014 – Session 4 - Rajesh Vargheese Healthcare Security Risk Mitigation • Start with an Information Security Risk Assessment • Follow Information Security best practices with policies • Control what you can, Monitor and mitigate the unknown • Password management – multi factor authentication • Mobile device access control and containerization – separate personal and business data • Implement data loss wipe strategies • Patch Management • Threats are constantly evolving • Leverage an adaptive learning defense system • Advanced Malware Protection • Safety is a Shared Responsibility • Educate, Enable, at the same time enforce policies • Understand Healthcare Uniqueness • Half leaked can be more damaging • Understand PHI life cycle • Encryption of data in motion and rest, Business associates
  • 19. 19SecConX Conference 2014 – Session 4 - Rajesh Vargheese Healthcare Regulations • HIPAA (Health Insurance Portability and Accountability Act) • HITECH (Health Information Technology for Economic and Clinical Health Act) • HIPAA compliance is a requirement for meaningful use. • HITECH provides financial incentives for meeting Meaningful use goals • Enforced by Department of Health Human Services through Office of Civil Rights
  • 20. 20SecConX Conference 2014 – Session 4 - Rajesh Vargheese Healthcare Data Breaches Reference: http://datalossdb.org/statistics
  • 21. 21SecConX Conference 2014 – Session 4 - Rajesh Vargheese Influencing Healthcare Outcomes Significance of Privacy and Security Health Outcomes Evidence Based Information Sharing Willingness to Share AvailabilityIntegrityConfidentiality Trust Regulation, Ethics, Rights, Accountability, Safeguards
  • 22. 22SecConX Conference 2014 – Session 4 - Rajesh Vargheese Conclusion • Healthcare Reforms is creating Key Healthcare IT transitions • Internet of everything is connecting the unconnected • These transitions create new security challenges • An Information Security Risk Mitigation Plan is not an option, it is a must • Protect PHI Data and understand data Life Cycle • Data breaches are extremely costly and has a negative impact • Leverage best practices of Information security • Privacy and Security has an impact on Healthcare Outcomes

Hinweis der Redaktion

  1. SLIDE MESSAGE: So it is time for a different kind of change.