SlideShare ist ein Scribd-Unternehmen logo
1 von 5
1
“Worlds Colliding”
Cybersecurity and Emergency Management
May 2017
Co-authors:
Kristina Freas, M.Sci., RN, EMT-P, CEM
And
Dave Sweigert, M.Sci., CEH, CISA, CISSP, EMT-B, HCISPP, PCIP, PMP, SEC+
ABSTRACT
In historic fashion, the federal government managed a nation-wide healthcare
sector response to the WannaCry ransomware virus. Understanding horizontal
connections between diverse stakeholder groups involved in the emergency
management of a cyber event is the focus of this article. Note: this document is
scholarly research and does not present legal, operations or management advice.
Background
On May 12, 2017 the viability of Britain’s
National Health Service (NHS) was
questionable. NHS cyberinfrastructure
was severely compromised by an
untargeted random ransomware
outbreak, spreading in 99 other
countries. Initial reports claimed the
impact of the virus on NHS was
“catastrophic” and “crippling1”.
The virus was known as “WannaCry”.
This ransomware virus, that demanded
$300 USD in Bitcoin, would galvanize a
response from the $3.2 trillion2
healthcare sector.
The U.S. Department of Health and
Human Services (DHHS) was suddenly
confronted with the possibility that the US
healthcare system could suffer the same
fate as NHS.
1
http://www.telegraph.co.uk/news/2017/05/12/nhs
-hit-major-cyber-attack-hackers-demanding-ransom/
The healthcare cyberinfrastructure, with
its cyber interdependencies that link so
many entities (direct patient healthcare,
health plans and payers, medical
materials, laboratories, public health,
emergency medical services, etc.) is
considered critical infrastructure to this
nation.
WannaCry was considered a direct threat
to this critical infrastructure (C.I.).
Here comes the cyber militia
In the hours that followed initial DHHS
activation, thousands of private-public
hospitals and healthcare organizations
(HCO) would mobilize to confront the
virus outbreak.
2
In annual transactions
2
This self-organized private-public “cyber-
militia” had mobilized (almost overnight)
to receive guidance from the emergency
managers at DHHS.
Nationwide teleconference calls provided
daily situational reports with top-level
relevant officials from key agencies
available to provide immediate feedback
(U.S. Food and Drug Administration, U.S.
Department of Homeland Security, etc.).
DHHS Office of Civil Rights (OCR)
provided updates on classification of
security and privacy incidents, then
dropped off the call to allow free and
open communications.
Caveat: Understanding the vocabulary of
the Hospital Incident Command System
(HICS) was an advantage that helped
many callers discuss their alignment
challenges with the DHHS unity of effort.
Who is ASPR?
Medical personnel might recognize two
programs guided by the Assistant
Secretary for Preparedness and
Response (ASPR): the Medical Reserve
Corps (MRC) and the Disaster Medical
Assistance Teams, which are part of the
National Disaster Medical System,
designed “to augment state and local
capabilities during an emergency or
disaster.”3
ASPR was commissioned more than a
decade ago “to strengthen the
capabilities of hospitals and health care
systems in public health emergencies
3
https://www.phe.gov/about/aspr/pages/default.as
px
4
https://www.phe.gov/about/oem/Pages/default.asp
x
and medical disasters.” ASPR also
maintains the Office of Emergency
Management (OEM).
OEM “continuously supports direct and
open communication with federal, state,
local, tribal, territorial and NGO
stakeholders.”4
Activation of Incident Command
WannaCry virus was now officially known
as the “International Cyber Threat to
Healthcare Organizations”.
DHHS, known as a Sector Specific
Agency (SSA) during such emergencies,
publicly acknowledged the threat,
spawning a viral nationwide notification
to the healthcare sector.
“HHS is aware of a significant cyber
security issue in the UK and other
international locations affecting hospitals
and healthcare information systems,”
announced DHHS, ASPR5, OEM Critical
Infrastructure Protection Lead Laura
Wolf explained in an email.
As Ms. Wolf would later remark in one of
the national teleconference calls (with as
many as 3,000 participants), “It appears
worlds are colliding – cyber security and
emergency management.”
They were indeed.
5
HHS-ASPR-OEM: Health and Human Services,
Assistant Secretary for Preparedness and Response,
Office of Emergency Management.
3
Risk Management of Cyber Incidents
Many hospitals and HCOs simply don’t
have the staff to develop a mature cyber-
security incident response and recovery
team. Sometimes known as Computer
Emergency Response Teams (CERT).
Thus, these facilities may rely on threat
warnings issued by US-CERT; U.S.
Computer Emergency Readiness Team6
(a component of DHS) or other groups.
However, teams, like CERT, are a
requirement of the HIPAA Security Rule.
Observe excerpts below from the DHHS
Security Risk Assessment Tool:
A46 - §164.308(a)(6)(ii) Required Does your
practice identify members of its incident
response team and assure workforce members
are trained and that incident response plans are
tested?
A47 - §164.308(a)(6)(ii) Required Does your
practice’s incident response plan align with its
emergency operations and contingency plan,
especially when it comes to prioritizing system
recovery actions or events to restore key
processes, systems, applications, electronic
device and media, and information (such as
ePHI)?7
Cybersecurity practitioners are well
advised to consider the above and work
toward the harmonization of emergency
response plans, emergency operations
plans, cyber incident response plans, etc.
The effect of downstream consequences
caused by cyber incident should be
addressed, just as any other threat.
6
https://www.us-cert.gov/
7
8STATE OF CYBERSECURITY & CYBER THREATS IN
HEALTHCARE ORGANIZATIONS Applied
This is especially true in a regulated
environment that maintains a regulatory
requirement to harmonize cyber incident
response and recovery plans with
emergency management plans.
“In order to assess health sector cyber
risks, it is paramount to understand the
systems to be defended, their key assets
and the impacts a successful attack may
have on them. In addition, potential
adversaries also need to be identified
along with their intentions and
capabilities. That way, threats can be
better evaluated as well as healthcare
systems vulnerabilities.8”
DHS Risk Management Cycle
The protection and prevention of
incidents to the operation of hospitals
and HCOs is addressed in the DHS
National Infrastructure Protection Plan
(N.I.P.P.).
Developing an understanding of DHS risk
management techniques helps align the
response and recovery activities of a
particular institution with many others to
help create unity of effort.
DHS offers a risk management baseline
designed specifically for C.I. resources
(like hospitals and HCOs). It is one of the
horizontal linkages that develops a
pathway amongst all responders
(supporting unity of effort).
Cybersecurity Strategy for Managers by Aurore LE
BRIS, Walid EL ASRI
4
The DHS risk approach establishes a
common framework and vocabulary
which cyber practitioners’ and the
emergency management community
should share.
The DHS risk management process
provides this sequence:
1. Defining the context: what decision
might be based on this assessment?
2. Identifying potential risk: develop a
preliminary list of risk risks.
3. Assess and Analyze Risk:
determine methodology, gather data,
validate data, and analyze outputs.
4. Developing alternatives: provide a
structured way for decision makers to
view data.
5. Decide upon a risk management
strategy: support decision making of
the right alternatives.
9
On August 24, 2009, the US Department of Health
and Human Services (HHS) published 45 CFR Parts
160 and 164 Breach Notification for Unsecured
Protected Health Information; Interim Final Rule to
6. Evaluation and monitoring: monitor
performance of risk alternatives
7. Risk communication: risk
management decisions must be
communicated.
The DHS risk management process can
be categorized as an operational
approach, designed to address
dynamic/fluid events with a wide variety
of risks.
In DHS parlance a “jurisdiction specific
risk assessment” that is a targeted risk
assessment. Targeted risk assessments
of this nature have been promoted by the
DHHS Office of Civil Rights to evaluate
whether a data breach has occurred.
Known as a “breach risk assessment”9 it
requires a risk assessment that shall
address the following (with regards to a
data breach):
1. Nature and Extent
2. Unauthorized person involved
3. Acquisition of PHI
4. Extent risk has been mitigated
In certain cases, a risk assessment such
as (see above) will eliminate the need for
a formal data breach notification to HHS
OCR.
This abbreviated, lightweight “specific
risk assessment” is a great example of a
targeted risk assessment to address a
narrow scope of threats and
vulnerabilities.
implement the breach notification provisions of the
Health Information Technology for Economic and
Clinical Health (HITECH) Act of 2009
5
Similarities of the two models:
DHS HHS/OCR
Context,
circumstances
Nature and extent
Identify potential risks Pre-identified “threat”
– unauthorized
person
Analyze and assess
the risk
Acquisition of PHI
Develop alternatives Extent risk has been
mitigated
Implementing,
evaluating,
monitoring
Not specifically
addressed
Communicating the
risk
Decision point –
formal HHS/OCR
data breach
notification or not
Leveraging unique aspects of the DHS
risk approach
The reader should now understand a
fundamental doctrine of DHS risk
management. That risk assessments
tend to be:
 Threat-focused risk assessments
 Operations-oriented assessments
Restated:
 Wider variety of threats
 Concept of fluidity
Response and recovery activities to
cyber incidents are also fluid/dynamic
and make need to address a wider
variety of threats. These actions should
be measured and improved upon.
Where to start – threat modeling
The wide variety of risk categories posed
by this sector-wide cyber-attack include:
 Risk to Critical Infrastructure and
Key Resources (CIKR): risk to
assets and systems.
 Risk to Population: Size and density
of population impacted by hospital
diversion and cancelation of services.
 Social Risk: individuals that depend
on the system under threat (hospital
and HCOs).
Here is an example of a threat list.
CIKR Corruption of medical records
Loss of access to records
Corruption of medical records
POP Elective surgeries cancelled
ER/ED on diversion
Wards evacuated
SOC Fear, loss of confidence
Confused, angst, anger
Frustration in loss of service
Conducting a threat-focused risk
assessment is one of the best ways to
examine an institution’s emergency and
cyber incident response plans for
completeness and alignment.
About the co-authors:
Kristna Freas, RN, EMT-P, CEM, is an
experienced emergency management
professional and Certified Emergency
Manager (CEM) specializing in the public
health and healthcare critical infrastructure
sector.
Dave Sweigert, EMT-B, is a Certified
Ethical Hacker. An Air Force veteran, he
holds advanced practitioner status
conferred by FEMA and CalOES. He has
written the Field Operations Guide to
Ethical Hacking to empower cyber
security professionals during emergency
incident response.

Weitere ähnliche Inhalte

Was ist angesagt?

Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...David Sweigert
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDavid Sweigert
 
Protection and immunity under Cybersecurity Information Sharing Act
Protection and immunity under Cybersecurity Information Sharing ActProtection and immunity under Cybersecurity Information Sharing Act
Protection and immunity under Cybersecurity Information Sharing ActDavid Sweigert
 
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsRoad Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsIOSR Journals
 
Examining Repeat EMS Incidents and Community Paramedicine Programs
Examining Repeat EMS Incidents and Community Paramedicine ProgramsExamining Repeat EMS Incidents and Community Paramedicine Programs
Examining Repeat EMS Incidents and Community Paramedicine ProgramsRobert M. Davis, MPA
 
vmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepapervmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepaperTony Amaddio
 
Measuring and Improving EMS System Performance: 2015
Measuring and Improving EMS System Performance: 2015Measuring and Improving EMS System Performance: 2015
Measuring and Improving EMS System Performance: 2015Robert M. Davis, MPA
 
Measuring and Improving EMS System Performance
Measuring and Improving EMS System PerformanceMeasuring and Improving EMS System Performance
Measuring and Improving EMS System PerformanceRobert M. Davis, MPA
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184David Sweigert
 
Contingency Planning Guide
Contingency Planning GuideContingency Planning Guide
Contingency Planning Guiderlynes
 
NIPP Healthacre Sector Cybersecurity Framework
NIPP Healthacre Sector Cybersecurity FrameworkNIPP Healthacre Sector Cybersecurity Framework
NIPP Healthacre Sector Cybersecurity FrameworkDavid Sweigert
 
A self organizing communication model for disaster risk management
A self organizing communication model for disaster risk managementA self organizing communication model for disaster risk management
A self organizing communication model for disaster risk managementUniversiti Technologi Malaysia (UTM)
 
Interactive_Com_Pre_Loss_Brochure
Interactive_Com_Pre_Loss_BrochureInteractive_Com_Pre_Loss_Brochure
Interactive_Com_Pre_Loss_BrochureImad Achmar
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Emergency operations center basic training
Emergency operations center basic trainingEmergency operations center basic training
Emergency operations center basic trainingTim Howson
 
Planning for contingencies
Planning for contingenciesPlanning for contingencies
Planning for contingenciesHassanein Alwan
 

Was ist angesagt? (20)

Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
Integrating disaster recovery metrics into the NIST EO 13636 Cybersecurity Fr...
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information Resources
 
Protection and immunity under Cybersecurity Information Sharing Act
Protection and immunity under Cybersecurity Information Sharing ActProtection and immunity under Cybersecurity Information Sharing Act
Protection and immunity under Cybersecurity Information Sharing Act
 
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit ClinicsRoad Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
Road Map to HIPAA Security Rules Compliance: Risk Analysis at Orbit Clinics
 
Examining Repeat EMS Incidents and Community Paramedicine Programs
Examining Repeat EMS Incidents and Community Paramedicine ProgramsExamining Repeat EMS Incidents and Community Paramedicine Programs
Examining Repeat EMS Incidents and Community Paramedicine Programs
 
vmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepapervmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepaper
 
Measuring and Improving EMS System Performance: 2015
Measuring and Improving EMS System Performance: 2015Measuring and Improving EMS System Performance: 2015
Measuring and Improving EMS System Performance: 2015
 
Measuring and Improving EMS System Performance
Measuring and Improving EMS System PerformanceMeasuring and Improving EMS System Performance
Measuring and Improving EMS System Performance
 
NIST Cybersecurity Event Recovery Guide 800-184
NIST Cybersecurity Event Recovery Guide  800-184NIST Cybersecurity Event Recovery Guide  800-184
NIST Cybersecurity Event Recovery Guide 800-184
 
Contingency Planning Guide
Contingency Planning GuideContingency Planning Guide
Contingency Planning Guide
 
NIPP Healthacre Sector Cybersecurity Framework
NIPP Healthacre Sector Cybersecurity FrameworkNIPP Healthacre Sector Cybersecurity Framework
NIPP Healthacre Sector Cybersecurity Framework
 
Emergency Operations Centres
Emergency Operations CentresEmergency Operations Centres
Emergency Operations Centres
 
A self organizing communication model for disaster risk management
A self organizing communication model for disaster risk managementA self organizing communication model for disaster risk management
A self organizing communication model for disaster risk management
 
2010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.12010; Risk Management Workshop Rev.1.1
2010; Risk Management Workshop Rev.1.1
 
Interactive_Com_Pre_Loss_Brochure
Interactive_Com_Pre_Loss_BrochureInteractive_Com_Pre_Loss_Brochure
Interactive_Com_Pre_Loss_Brochure
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Emergency operations center basic training
Emergency operations center basic trainingEmergency operations center basic training
Emergency operations center basic training
 
Class on ICS
Class on ICSClass on ICS
Class on ICS
 
Planning for contingencies
Planning for contingenciesPlanning for contingencies
Planning for contingencies
 

Ähnlich wie Post WannaCry: Hospital cybersecurity needs to link to Emergency Management

AOA_Report_TrapX_AnatomyOfAttack-Healthcare
AOA_Report_TrapX_AnatomyOfAttack-HealthcareAOA_Report_TrapX_AnatomyOfAttack-Healthcare
AOA_Report_TrapX_AnatomyOfAttack-HealthcareTony Zirnoon, CISSP
 
Workshop - Disaster Health Information Sources: The Basics
Workshop - Disaster Health Information Sources: The BasicsWorkshop - Disaster Health Information Sources: The Basics
Workshop - Disaster Health Information Sources: The BasicsRobin Featherstone
 
Webinar - Disaster Health Information Sources: The Basics
Webinar - Disaster Health Information Sources: The BasicsWebinar - Disaster Health Information Sources: The Basics
Webinar - Disaster Health Information Sources: The BasicsRobin Featherstone
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1Bryan Cline, Ph.D.
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesDavid Sweigert
 
U.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityU.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityMegan Espinoza
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALIJNSA Journal
 
Running head Critical infrastructure and key resources1.docx
Running head Critical infrastructure and key resources1.docxRunning head Critical infrastructure and key resources1.docx
Running head Critical infrastructure and key resources1.docxsusanschei
 
DB Question for Public Health in Disaster Management.docx
DB Question for Public Health in Disaster Management.docxDB Question for Public Health in Disaster Management.docx
DB Question for Public Health in Disaster Management.docxwrite22
 
DB Question for Public Health in Disaster Management.docx
DB Question for Public Health in Disaster Management.docxDB Question for Public Health in Disaster Management.docx
DB Question for Public Health in Disaster Management.docxsdfghj21
 
Running Head HEALTH RISK MANAGEMENT PROGRAMHEALTH RISK MANAGE.docx
Running Head HEALTH RISK MANAGEMENT PROGRAMHEALTH RISK MANAGE.docxRunning Head HEALTH RISK MANAGEMENT PROGRAMHEALTH RISK MANAGE.docx
Running Head HEALTH RISK MANAGEMENT PROGRAMHEALTH RISK MANAGE.docxwlynn1
 
Development of an expert system for reducing medical errors
Development of an expert system for reducing medical errorsDevelopment of an expert system for reducing medical errors
Development of an expert system for reducing medical errorsijseajournal
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowPYA, P.C.
 
Week 10 Managing the Public Health Surveillance and.docx
Week 10 Managing the Public Health Surveillance and.docxWeek 10 Managing the Public Health Surveillance and.docx
Week 10 Managing the Public Health Surveillance and.docxwrite5
 
LIVING WITH THE EARTHObjectives for this.docx
LIVING WITH THE EARTHObjectives for this.docxLIVING WITH THE EARTHObjectives for this.docx
LIVING WITH THE EARTHObjectives for this.docxcroysierkathey
 
Nursing informatics: Internet Tools and NI abroad
Nursing informatics: Internet Tools and NI abroadNursing informatics: Internet Tools and NI abroad
Nursing informatics: Internet Tools and NI abroadjhonee balmeo
 
The lessons learned from WannaCry.
The lessons learned from WannaCry.The lessons learned from WannaCry.
The lessons learned from WannaCry.dan hyde
 

Ähnlich wie Post WannaCry: Hospital cybersecurity needs to link to Emergency Management (20)

AOA_Report_TrapX_AnatomyOfAttack-Healthcare
AOA_Report_TrapX_AnatomyOfAttack-HealthcareAOA_Report_TrapX_AnatomyOfAttack-Healthcare
AOA_Report_TrapX_AnatomyOfAttack-Healthcare
 
Workshop - Disaster Health Information Sources: The Basics
Workshop - Disaster Health Information Sources: The BasicsWorkshop - Disaster Health Information Sources: The Basics
Workshop - Disaster Health Information Sources: The Basics
 
Webinar - Disaster Health Information Sources: The Basics
Webinar - Disaster Health Information Sources: The BasicsWebinar - Disaster Health Information Sources: The Basics
Webinar - Disaster Health Information Sources: The Basics
 
Ijnsa050201
Ijnsa050201Ijnsa050201
Ijnsa050201
 
UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1UoF - HITRUST & Risk Analysis v1
UoF - HITRUST & Risk Analysis v1
 
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devicesThe WannaCry Black Swan Event -- Unpatchable FDA medical devices
The WannaCry Black Swan Event -- Unpatchable FDA medical devices
 
U.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland SecurityU.S. Federal Department Of Homeland Security
U.S. Federal Department Of Homeland Security
 
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALINCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITAL
 
Health information systemsumanitarian emergencies, by Michel Thieren MD
Health information systemsumanitarian emergencies, by Michel Thieren MDHealth information systemsumanitarian emergencies, by Michel Thieren MD
Health information systemsumanitarian emergencies, by Michel Thieren MD
 
Running head Critical infrastructure and key resources1.docx
Running head Critical infrastructure and key resources1.docxRunning head Critical infrastructure and key resources1.docx
Running head Critical infrastructure and key resources1.docx
 
DB Question for Public Health in Disaster Management.docx
DB Question for Public Health in Disaster Management.docxDB Question for Public Health in Disaster Management.docx
DB Question for Public Health in Disaster Management.docx
 
DB Question for Public Health in Disaster Management.docx
DB Question for Public Health in Disaster Management.docxDB Question for Public Health in Disaster Management.docx
DB Question for Public Health in Disaster Management.docx
 
Running Head HEALTH RISK MANAGEMENT PROGRAMHEALTH RISK MANAGE.docx
Running Head HEALTH RISK MANAGEMENT PROGRAMHEALTH RISK MANAGE.docxRunning Head HEALTH RISK MANAGEMENT PROGRAMHEALTH RISK MANAGE.docx
Running Head HEALTH RISK MANAGEMENT PROGRAMHEALTH RISK MANAGE.docx
 
Development of an expert system for reducing medical errors
Development of an expert system for reducing medical errorsDevelopment of an expert system for reducing medical errors
Development of an expert system for reducing medical errors
 
Data and Network Security: What You Need to Know
Data and Network Security: What You Need to KnowData and Network Security: What You Need to Know
Data and Network Security: What You Need to Know
 
Week 10 Managing the Public Health Surveillance and.docx
Week 10 Managing the Public Health Surveillance and.docxWeek 10 Managing the Public Health Surveillance and.docx
Week 10 Managing the Public Health Surveillance and.docx
 
LIVING WITH THE EARTHObjectives for this.docx
LIVING WITH THE EARTHObjectives for this.docxLIVING WITH THE EARTHObjectives for this.docx
LIVING WITH THE EARTHObjectives for this.docx
 
Risk management in Healthcare on Cloud
Risk management in Healthcare on CloudRisk management in Healthcare on Cloud
Risk management in Healthcare on Cloud
 
Nursing informatics: Internet Tools and NI abroad
Nursing informatics: Internet Tools and NI abroadNursing informatics: Internet Tools and NI abroad
Nursing informatics: Internet Tools and NI abroad
 
The lessons learned from WannaCry.
The lessons learned from WannaCry.The lessons learned from WannaCry.
The lessons learned from WannaCry.
 

Mehr von David Sweigert

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)David Sweigert
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting David Sweigert
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisDavid Sweigert
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterDavid Sweigert
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner David Sweigert
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017David Sweigert
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9David Sweigert
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityDavid Sweigert
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)David Sweigert
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsDavid Sweigert
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartDavid Sweigert
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...David Sweigert
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public CommentDavid Sweigert
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public CommentDavid Sweigert
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIDavid Sweigert
 
Immunity from liability for sharing Cyber Threat Information
Immunity from liability for sharing Cyber Threat InformationImmunity from liability for sharing Cyber Threat Information
Immunity from liability for sharing Cyber Threat InformationDavid Sweigert
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNIDavid Sweigert
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDIDavid Sweigert
 
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceCyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceDavid Sweigert
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingDavid Sweigert
 

Mehr von David Sweigert (20)

The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
 
Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting  Law Enforcement Cyber Incident Reporting
Law Enforcement Cyber Incident Reporting
 
Sample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark AnalysisSample Network Analysis Report based on Wireshark Analysis
Sample Network Analysis Report based on Wireshark Analysis
 
National Cyber Security Awareness Month poster
National Cyber Security Awareness Month posterNational Cyber Security Awareness Month poster
National Cyber Security Awareness Month poster
 
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner Department of Defense standard 8570 - CompTia Advanced Security Practitioner
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
 
National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017National Cyber Security Awareness Month - October 2017
National Cyber Security Awareness Month - October 2017
 
California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9California Attorney General Notification Penal Code 646.9
California Attorney General Notification Penal Code 646.9
 
Congressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber SecurityCongressional support of Ethical Hacking and Cyber Security
Congressional support of Ethical Hacking and Cyber Security
 
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
 
Application of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking ThreatsApplication of Racketeering Law to Suppress CrowdStalking Threats
Application of Racketeering Law to Suppress CrowdStalking Threats
 
Canada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector ChartCanada Communications Security Establishment - Threat Vector Chart
Canada Communications Security Establishment - Threat Vector Chart
 
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
 
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team   NIMS   Public CommentCyber Incident Response Team   NIMS   Public Comment
Cyber Incident Response Team NIMS Public Comment
 
Cyber Incident Response Team - NIMS - Public Comment
Cyber Incident Response Team  -  NIMS  -  Public CommentCyber Incident Response Team  -  NIMS  -  Public Comment
Cyber Incident Response Team - NIMS - Public Comment
 
Exam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level IIExam notes for the Certified in Homeland Security -- Level II
Exam notes for the Certified in Homeland Security -- Level II
 
Immunity from liability for sharing Cyber Threat Information
Immunity from liability for sharing Cyber Threat InformationImmunity from liability for sharing Cyber Threat Information
Immunity from liability for sharing Cyber Threat Information
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNI
 
Cyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDICyber Threat Intelligence Integration Center -- ONDI
Cyber Threat Intelligence Integration Center -- ONDI
 
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat IntelligenceCyber Integration for Fusion Centers to develop Cyber Threat Intelligence
Cyber Integration for Fusion Centers to develop Cyber Threat Intelligence
 
Basics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information SharingBasics on Cyber Threat Intelligence Collection and Information Sharing
Basics on Cyber Threat Intelligence Collection and Information Sharing
 

Kürzlich hochgeladen

Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Sheetaleventcompany
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhSheetaleventcompany
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591adityaroy0215
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availablegragmanisha42
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...russian goa call girl and escorts service
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetCall Girls Service
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...gurkirankumar98700
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthanindiancallgirl4rent
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Modelsindiancallgirl4rent
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabadgragmanisha42
 
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Russian Call Girls Amritsar
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...Gfnyt.com
 
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...seemahedar019
 

Kürzlich hochgeladen (20)

Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
Call Girl Amritsar ❤️♀️@ 8725944379 Amritsar Call Girls Near Me ❤️♀️@ Sexy Ca...
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real MeetSambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
Sambalpur Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in ChandigarhChandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
Chandigarh Escorts, 😋9988299661 😋50% off at Escort Service in Chandigarh
 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
 
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service availableCall Girl Raipur 📲 9999965857 whatsapp live cam sex service available
Call Girl Raipur 📲 9999965857 whatsapp live cam sex service available
 
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...Call Girls Service In Goa  💋 9316020077💋 Goa Call Girls  By Russian Call Girl...
Call Girls Service In Goa 💋 9316020077💋 Goa Call Girls By Russian Call Girl...
 
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meetraisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
raisen Call Girls 👙 6297143586 👙 Genuine WhatsApp Number for Real Meet
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
 
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur RajasthanJaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
Jaipur Call Girls 9257276172 Call Girl in Jaipur Rajasthan
 
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking ModelsDehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
Dehradun Call Girls Service 08854095900 Real Russian Girls Looking Models
 
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In FaridabadCall Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
Call Girls Service Faridabad 📲 9999965857 ヅ10k NiGhT Call Girls In Faridabad
 
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
Local Housewife and effective ☎️ 8250192130 🍉🍓 Sexy Girls VIP Call Girls Chan...
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF  ...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Jaispreet Call Girl Services in Jaipur QRYPCF ...
 
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
Jodhpur Call Girls 📲 9999965857 Jodhpur best beutiful hot girls full satisfie...
 

Post WannaCry: Hospital cybersecurity needs to link to Emergency Management

  • 1. 1 “Worlds Colliding” Cybersecurity and Emergency Management May 2017 Co-authors: Kristina Freas, M.Sci., RN, EMT-P, CEM And Dave Sweigert, M.Sci., CEH, CISA, CISSP, EMT-B, HCISPP, PCIP, PMP, SEC+ ABSTRACT In historic fashion, the federal government managed a nation-wide healthcare sector response to the WannaCry ransomware virus. Understanding horizontal connections between diverse stakeholder groups involved in the emergency management of a cyber event is the focus of this article. Note: this document is scholarly research and does not present legal, operations or management advice. Background On May 12, 2017 the viability of Britain’s National Health Service (NHS) was questionable. NHS cyberinfrastructure was severely compromised by an untargeted random ransomware outbreak, spreading in 99 other countries. Initial reports claimed the impact of the virus on NHS was “catastrophic” and “crippling1”. The virus was known as “WannaCry”. This ransomware virus, that demanded $300 USD in Bitcoin, would galvanize a response from the $3.2 trillion2 healthcare sector. The U.S. Department of Health and Human Services (DHHS) was suddenly confronted with the possibility that the US healthcare system could suffer the same fate as NHS. 1 http://www.telegraph.co.uk/news/2017/05/12/nhs -hit-major-cyber-attack-hackers-demanding-ransom/ The healthcare cyberinfrastructure, with its cyber interdependencies that link so many entities (direct patient healthcare, health plans and payers, medical materials, laboratories, public health, emergency medical services, etc.) is considered critical infrastructure to this nation. WannaCry was considered a direct threat to this critical infrastructure (C.I.). Here comes the cyber militia In the hours that followed initial DHHS activation, thousands of private-public hospitals and healthcare organizations (HCO) would mobilize to confront the virus outbreak. 2 In annual transactions
  • 2. 2 This self-organized private-public “cyber- militia” had mobilized (almost overnight) to receive guidance from the emergency managers at DHHS. Nationwide teleconference calls provided daily situational reports with top-level relevant officials from key agencies available to provide immediate feedback (U.S. Food and Drug Administration, U.S. Department of Homeland Security, etc.). DHHS Office of Civil Rights (OCR) provided updates on classification of security and privacy incidents, then dropped off the call to allow free and open communications. Caveat: Understanding the vocabulary of the Hospital Incident Command System (HICS) was an advantage that helped many callers discuss their alignment challenges with the DHHS unity of effort. Who is ASPR? Medical personnel might recognize two programs guided by the Assistant Secretary for Preparedness and Response (ASPR): the Medical Reserve Corps (MRC) and the Disaster Medical Assistance Teams, which are part of the National Disaster Medical System, designed “to augment state and local capabilities during an emergency or disaster.”3 ASPR was commissioned more than a decade ago “to strengthen the capabilities of hospitals and health care systems in public health emergencies 3 https://www.phe.gov/about/aspr/pages/default.as px 4 https://www.phe.gov/about/oem/Pages/default.asp x and medical disasters.” ASPR also maintains the Office of Emergency Management (OEM). OEM “continuously supports direct and open communication with federal, state, local, tribal, territorial and NGO stakeholders.”4 Activation of Incident Command WannaCry virus was now officially known as the “International Cyber Threat to Healthcare Organizations”. DHHS, known as a Sector Specific Agency (SSA) during such emergencies, publicly acknowledged the threat, spawning a viral nationwide notification to the healthcare sector. “HHS is aware of a significant cyber security issue in the UK and other international locations affecting hospitals and healthcare information systems,” announced DHHS, ASPR5, OEM Critical Infrastructure Protection Lead Laura Wolf explained in an email. As Ms. Wolf would later remark in one of the national teleconference calls (with as many as 3,000 participants), “It appears worlds are colliding – cyber security and emergency management.” They were indeed. 5 HHS-ASPR-OEM: Health and Human Services, Assistant Secretary for Preparedness and Response, Office of Emergency Management.
  • 3. 3 Risk Management of Cyber Incidents Many hospitals and HCOs simply don’t have the staff to develop a mature cyber- security incident response and recovery team. Sometimes known as Computer Emergency Response Teams (CERT). Thus, these facilities may rely on threat warnings issued by US-CERT; U.S. Computer Emergency Readiness Team6 (a component of DHS) or other groups. However, teams, like CERT, are a requirement of the HIPAA Security Rule. Observe excerpts below from the DHHS Security Risk Assessment Tool: A46 - §164.308(a)(6)(ii) Required Does your practice identify members of its incident response team and assure workforce members are trained and that incident response plans are tested? A47 - §164.308(a)(6)(ii) Required Does your practice’s incident response plan align with its emergency operations and contingency plan, especially when it comes to prioritizing system recovery actions or events to restore key processes, systems, applications, electronic device and media, and information (such as ePHI)?7 Cybersecurity practitioners are well advised to consider the above and work toward the harmonization of emergency response plans, emergency operations plans, cyber incident response plans, etc. The effect of downstream consequences caused by cyber incident should be addressed, just as any other threat. 6 https://www.us-cert.gov/ 7 8STATE OF CYBERSECURITY & CYBER THREATS IN HEALTHCARE ORGANIZATIONS Applied This is especially true in a regulated environment that maintains a regulatory requirement to harmonize cyber incident response and recovery plans with emergency management plans. “In order to assess health sector cyber risks, it is paramount to understand the systems to be defended, their key assets and the impacts a successful attack may have on them. In addition, potential adversaries also need to be identified along with their intentions and capabilities. That way, threats can be better evaluated as well as healthcare systems vulnerabilities.8” DHS Risk Management Cycle The protection and prevention of incidents to the operation of hospitals and HCOs is addressed in the DHS National Infrastructure Protection Plan (N.I.P.P.). Developing an understanding of DHS risk management techniques helps align the response and recovery activities of a particular institution with many others to help create unity of effort. DHS offers a risk management baseline designed specifically for C.I. resources (like hospitals and HCOs). It is one of the horizontal linkages that develops a pathway amongst all responders (supporting unity of effort). Cybersecurity Strategy for Managers by Aurore LE BRIS, Walid EL ASRI
  • 4. 4 The DHS risk approach establishes a common framework and vocabulary which cyber practitioners’ and the emergency management community should share. The DHS risk management process provides this sequence: 1. Defining the context: what decision might be based on this assessment? 2. Identifying potential risk: develop a preliminary list of risk risks. 3. Assess and Analyze Risk: determine methodology, gather data, validate data, and analyze outputs. 4. Developing alternatives: provide a structured way for decision makers to view data. 5. Decide upon a risk management strategy: support decision making of the right alternatives. 9 On August 24, 2009, the US Department of Health and Human Services (HHS) published 45 CFR Parts 160 and 164 Breach Notification for Unsecured Protected Health Information; Interim Final Rule to 6. Evaluation and monitoring: monitor performance of risk alternatives 7. Risk communication: risk management decisions must be communicated. The DHS risk management process can be categorized as an operational approach, designed to address dynamic/fluid events with a wide variety of risks. In DHS parlance a “jurisdiction specific risk assessment” that is a targeted risk assessment. Targeted risk assessments of this nature have been promoted by the DHHS Office of Civil Rights to evaluate whether a data breach has occurred. Known as a “breach risk assessment”9 it requires a risk assessment that shall address the following (with regards to a data breach): 1. Nature and Extent 2. Unauthorized person involved 3. Acquisition of PHI 4. Extent risk has been mitigated In certain cases, a risk assessment such as (see above) will eliminate the need for a formal data breach notification to HHS OCR. This abbreviated, lightweight “specific risk assessment” is a great example of a targeted risk assessment to address a narrow scope of threats and vulnerabilities. implement the breach notification provisions of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009
  • 5. 5 Similarities of the two models: DHS HHS/OCR Context, circumstances Nature and extent Identify potential risks Pre-identified “threat” – unauthorized person Analyze and assess the risk Acquisition of PHI Develop alternatives Extent risk has been mitigated Implementing, evaluating, monitoring Not specifically addressed Communicating the risk Decision point – formal HHS/OCR data breach notification or not Leveraging unique aspects of the DHS risk approach The reader should now understand a fundamental doctrine of DHS risk management. That risk assessments tend to be:  Threat-focused risk assessments  Operations-oriented assessments Restated:  Wider variety of threats  Concept of fluidity Response and recovery activities to cyber incidents are also fluid/dynamic and make need to address a wider variety of threats. These actions should be measured and improved upon. Where to start – threat modeling The wide variety of risk categories posed by this sector-wide cyber-attack include:  Risk to Critical Infrastructure and Key Resources (CIKR): risk to assets and systems.  Risk to Population: Size and density of population impacted by hospital diversion and cancelation of services.  Social Risk: individuals that depend on the system under threat (hospital and HCOs). Here is an example of a threat list. CIKR Corruption of medical records Loss of access to records Corruption of medical records POP Elective surgeries cancelled ER/ED on diversion Wards evacuated SOC Fear, loss of confidence Confused, angst, anger Frustration in loss of service Conducting a threat-focused risk assessment is one of the best ways to examine an institution’s emergency and cyber incident response plans for completeness and alignment. About the co-authors: Kristna Freas, RN, EMT-P, CEM, is an experienced emergency management professional and Certified Emergency Manager (CEM) specializing in the public health and healthcare critical infrastructure sector. Dave Sweigert, EMT-B, is a Certified Ethical Hacker. An Air Force veteran, he holds advanced practitioner status conferred by FEMA and CalOES. He has written the Field Operations Guide to Ethical Hacking to empower cyber security professionals during emergency incident response.