Risk Management and Cybersecurity for Devices that Contain Software. Seth D. Carmody, Ph.D. 12 th Medical Device Quality Congress March 18, 2015
|
|
|
- Melvin Beasley
- 10 years ago
- Views:
Transcription
1 Risk Management and Cybersecurity for Devices that Contain Software Seth D. Carmody, Ph.D. 12 th Medical Device Quality Congress March 18, 2015
2 Main Points Establish a Cybersecurity Risk Management Program Information sharing and cyber hygiene are important Software updates for cybersecurity do not require pre-market review or recall (there are exceptions) FDA will not be prescriptive with risk analyses Resources and best practices are prevalent 2
3 Definitions Cybersecurity - is the process of preventing unauthorized access, modification, misuse or denial of use, or the unauthorized use of information that is stored, accessed, or transferred from a medical device to an external recipient. Threat - Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, or other organizations through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Content of Premarket Submissions for Management of Cybersecurity in Medical Devices pdf NIST SP ; SP A; SP ; SP ; SP ; CNSSI Note: The definition is Identical to NIST definition (SP ) with the phrase or the Nation redacted. 3
4 Definitions Cyber hygiene is a state of diligent control of a device s operation, exercised in the use environment and considered best practice by the security community. This best practice is comprised of safe and proper configuration of available features, least privilege access to control functions and cybersecurity routine servicing. These practices are undertaken in order to maintain and improve cybersecurity. Additional cyber hygiene controls are identified by FDA in the cybersecurity premarket guidance. 4
5 Healthcare Sector Challenges We re not just worried about manufacturing defects anymore! 1. Lack of Cybersecurity Culture 2. Threats 3. Perceived and Real economics 4. Procurement 5. Multiple and Diverse stakeholders 6. Technical Requirements 5
6 Security Is Hard Don t confuse effort with results JP Morgan Got hacked! Resources: $250 Million dollars/year, 1,000 personnel, set to double When not if: Anthem, Target, Home Depot, Community Health Systems, Sony Pictures Why: Mutually assured destruction (nation-states) and Money! Who: Anyone with a computing device and a motive Prof. Kevin Fu, AAMI Cybersecurity talk CEO_letter.pdf 6
7 Why does FDA care about Cybersecurity? Networked medical devices facilitate care Networked medical devices introduce new risks Centers for Disease Control and Prevention (CDC) estimates of annual patient encounters 35 million hospital discharges 100 million hospital outpatient visits 900 million physician office visits Billions of prescriptions Most of these encounters likely include a networked medical device 7
8 Also the President said so Presidential Policy Directive 8 (PPD-8): National Preparedness Post-Katrina: federal departments and agencies to work with the whole community to develop a national preparedness goal and a series of frameworks and plans related to reaching specified goals. PPD-21: Critical Infrastructure Security and Resilience Executive Order 13636: Improving Critical Infrastructure Cybersecurity a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing (2/13/2015) Critical infrastructure? 16 Sectors Secretary of Homeland Security Implements these directives. 8
9 Demonstrated Exploits VA Cath Lab temporary closure (1/10) due to malware infecting computers used during interventional cardiac procedures Hacking of implantable insulin pump, defibrillator Security researchers present CDRH with cyber vulnerabilities of medical devices 9 9
10 FDA Goals Meet our mission: safe and effective devices Raise cyber-security awareness Promote safety and security by design by clear regulatory expectation Promote proactive vulnerability management Minimize reactive approaches 10
11 Regulatory Challenges Secure design starts with a good Process Changing the device engages your established resources Software updates for cybersecurity do not require pre-market review or recall (there are exceptions) Risk management (clinical and device) engages your established resources Verification/Validation engages your established resources Cybersecurity Content for Premarket submissions are presented as a subset of your software documentation (engages your established resources) 11
12 What FDA Expects FDA expects that manufacturers include cybersecurity risk management program activities as part of their existing quality systems, as required by 21 CFR (g) and complaint handling, internal audit and corrective action requirements of 21 CFR , to appropriately address all identified vulnerabilities and exploits. 12
13 What is the scope of Risk? The Homeland Scenario (worst-case): a person s life is sustained either continuously and or periodically by a medical device (i.e. there are no mitigation(s) of risk) What is the likely scenario of a medical device hack? Collateral damage (i.e. unintended), maybe one device, maybe whole hospital. Control cyber hygiene then the homeland scenario A networked device is a device under constant threat Do not rely on compensating controls (user implemented control in the use environment (e.g. firewall)) 13
14 Cybersecurity Risk Management Program Step 1: Have one (adopt a Cybersecurity culture) Premarket Identification of assets, threats, and vulnerabilities; Assessment of the impact of threats and vulnerabilities on device functionality and end users/patients; Assessment of the likelihood of a threat and of a vulnerability being exploited; Determination of risk levels and suitable mitigation strategies; Assessment of residual risk Post Market Engage in post market surveillance and Information Sharing and Analysis Organizations (ISAOs) Assess the device impact and clinical impact of vulnerabilities and exploits Address the risk; actions taken should be commensurate with the risk Disseminate, Incorporate and Iterate and risk acceptance criteria. 14
15 Cybersecurity Risk Management Program Step 2: Produce objective evidence, show us Premarket Evidence Device design features that mitigate cybersecurity risk Subset of software documentation (Premarket Submissions for Software contained in medical devices Post Market Produce objective evidence that could include policies, procedures, CAPAs, complaints, information sharing, etc. Software description, hazards, requirements, design spec, traceability, development environment, Verification and Validation, revision history, and unresolved anomalies (vulnerabilities?) 15
16 What documentation is FDA looking for? Hazard analyses Evaluate both intentional and unintentional cybersecurity risk Provide information on the risk analyzed Controls established to mitigate risk Provide information on the controls put in place Provide information on the appropriateness of the controls to mitigate identified risk Matrix that links cybersecurity controls to the risk being mitigated Summary documentation on Plan to provide validated patches / updates Plan to assure device integrity Cybersecurity control instructions pertaining to use environment A systematic plan for providing patches and updates to operating systems or medical device software. 16
17 CDRH/FDA Activities Guidance Premarket (Final 2014) Post market (under development) Wireless Technology (Final 2013) Cybersecurity for Networked Devices with OTS Software (2005) Interoperability (under development) MDDS (Medical Device Data Systems - Final 2015) MMA (Mobile Medical Applications Final 2015) Recognized Standards Cybersecurity (2013) Interoperability (2013) Public Communication Premarket Guidance webinar (10/29/2014) FDA/DHS workshop (2014) Safety Communication to Stakeholders (2013) Cybersecurity for networked medical devices shared responsibility (2009) Organization Established CSWG of Subject Matter Experts (2013) Established Cyber Incident Response Team under EMCM (2013) Premarket Rounds Cybersecurity (11/17/2014 ) htm 17
18 CDRH/FDA Ongoing Activities Post market surveillance Regulatory clarity Premarket expectations Post market expectations Stake holder collaboration Device industry Healthcare organization Federal partners Researchers & experts Enable a platform for maintaining Cybersecurity Awareness 18
19 Best Practices and Tools Adopt a cybersecurity culture (Start with NIST): Robust Cybersecurity cultures exist across multiple economic sectors including the financial, utility, and defense sectors. Risk mitigation during total product life cycle from conception to obsolescence Information Sharing (with all stakeholders) Identify, Protect, Detect, Response, Recover Integrate and Iterate Hire/contract with, appropriate personnel Security first, implement design features as well as compensating controls Cyber hygiene (configuration, access control, etc.) htm 19
20 Cyber Security Construct Identify Identify - Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Recover Protect Protect Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services Detect Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Respond Detect Recover Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. 20
21 Cybersecurity Relationship to Vulnerability Exploit Annex E, figure E.1. ISO 14971:
22 CDRH/FDA Collaborations EMCM led New partnership with Department of Homeland Security Coordinating incident response with ICS-CERT Participating in EO13636-PPD21 Integrated Task Force WGs DHS-led Cyber-Physical Functional Exercise (Cracked Domain) planners and players Enhanced communication & partnering with HHS Integrated Task Force (ITF) HHS/Critical Infrastructure Protection Cyber Threat Analysis Center (CTAC) Strengthen collaboration with NIST through standards and Cybersecurity Framework Working Group New collaboration with National Health Information Sharing and Analysis Center (NH-ISAC) Engaging proactively with diverse stakeholders Outreach/education of hospital, healthcare & medical device community (users and industry) 22
23 Main Points Establish a Cybersecurity Risk Management Program Information sharing and cyber hygiene are important Software updates for cybersecurity do not require pre-market review or recall (there are exceptions) FDA will not be prescriptive with risk analyses Resources and best practices are prevalent 23
24 CDRH Cybersecurity Contacts Office of the Center Director (OCD) Suzanne Schwartz Office of In vitro Diagnostics and Radiological Health (OIR) Seth Carmody Office of Device Evaluation (ODE) Linda Ricci Office of Compliance (OC) John Murray Office of Science and Engineering Laboratories (OSEL) Brian Fitzgerald Thank you! Questions? 24
Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA
8 th Annual Safeguarding Health Information: Building Assurance through HIPAA Security HHS Office of Civil Rights and National Institute of Standards & Technology Wednesday September 2, 2015 Suzanne B.
Cybersecurity for Medical Devices
Cybersecurity for Medical Devices Suzanne O Shea Kathleen Rice January 29, 2015 Why Is This Important? Security Risks in the Sensors of Implantable Medical Devices Over the last year, we ve seen an uptick
MEDICAL DEVICE Cybersecurity.
MEDICAL DEVICE Cybersecurity. 2 MEDICAL DEVICE CYBERSECURITY Introduction Wireless technology and the software in medical devices have greatly increased healthcare providers abilities to efficiently and
FDA Releases Final Cybersecurity Guidance for Medical Devices
FDA Releases Final Cybersecurity Guidance for Medical Devices By Jean Marie R. Pechette and Ken Briggs Overview and General Principles On October 2, 2014, the Food and Drug Administration ( FDA ) finalized
Risk based 12/1/2015. Digital Health Bakul Patel Associate Director for Digital Health Office of Center Director.
Digital Health Bakul Patel Associate Director for Digital Health Office of Center Director Center for Devices and Radiological Health 1 Oversight Approach Platform independent Promote innovation Promote
CONCEPTS IN CYBER SECURITY
CONCEPTS IN CYBER SECURITY GARY KNEELAND, CISSP SENIOR CONSULTANT CRITICAL INFRASTRUCTURE & SECURITY PRACTICE 1 OBJECTIVES FRAMEWORK FOR CYBERSECURITY CYBERSECURITY FUNCTIONS CYBERSECURITY CONTROLS COMPARATIVE
Medical Device Software
Medical Device Software Bakul Patel Senior Policy Advisor 1 Overview Medical devices and software Oversight principles and Current approach Trends, Challenges and opportunities Addressing challenges 2
Cyberprivacy and Cybersecurity for Health Data
Experience the commitment Cyberprivacy and Cybersecurity for Health Data Building confidence in health systems Providing better health care quality at lower cost will be the key aim of all health economies
GAO MEDICAL DEVICES. FDA Should Expand Its Consideration of Information Security for Certain Types of Devices. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters August 2012 MEDICAL DEVICES FDA Should Expand Its Consideration of Information Security for Certain Types of Devices
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
a Medical Device Privacy Consortium White Paper
a Medical Device Privacy Consortium White Paper Introduction The Medical Device Privacy Consortium (MDPC) is a group of leading companies addressing health privacy and security issues affecting the medical
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
Capabilities for Cybersecurity Resilience
Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!
cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman
International standards and guidance that address Medical Device Software
International standards and guidance that address Medical Device Software Sherman Eagles Technical Fellow Medtronic CRDM Convener IEC 62A/ISO 210 JWG3 Co-convener IEC 62A/ISO 215 JWG7 Standards in the
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS
A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS CYBER ATTACKS INFILTRATE CRITICAL INFRASTRUCTURE SECTORS Government and enterprise critical infrastructure sectors such as energy, communications
NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015
NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015 Overview The University of Pittsburgh NIST Cybersecurity Framework Pitt NIST Cybersecurity Framework Program Wrap Up Questions
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
EVALUATION OF AUTOMATIC CLASS III DESIGNATION FOR STUDIO on the Cloud Data Management Software DECISION SUMMARY
A. DEN Number: DEN140016 EVALUATION OF AUTOMATIC CLASS III DESIGNATION FOR STUDIO on the Cloud Data Management Software B. Purpose for Submission: DECISION SUMMARY De novo request for adjunct data management
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.
Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Topics: Explain why it is important for firms of all sizes to address cybersecurity risk. Demonstrate awareness
Assessing the Effectiveness of a Cybersecurity Program
Assessing the Effectiveness of a Cybersecurity Program Lynn D. Shiang Delta Risk LLC, A Chertoff Group Company Objectives Understand control frameworks, assessment structures and scoping of detailed reviews
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
GEARS Cyber-Security Services
Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments
The Shifting Sands of Medical Software Regulation
The Shifting Sands of Medical Software Regulation Suzanne O Shea Ralph Hall September 10, 2014 What Software is Regulated by FDA? FDA regulates medical devices. FDA regulates software that meets the definition
How To Write Software
1 Medical Device Software - Software Life Cycle Processes IEC 62304 2 Credits John F. Murray Software Compliance Expert U.S. Food and Drug Administration Marcie R. Williams Medical Device Fellow Ph.D.
NIST National Institute of Standards and Technology
NIST National Institute of Standards and Technology Lets look at SP800-30 Risk Management Guide for Information Technology Systems (September 2012) What follows are the NIST SP800-30 slides, which are
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Medical Product Software Development and FDA Regulations Software Development Practices and FDA Compliance
Medical Product Development and FDA Regulations IEEE Orange County Computer Society March 27, 2006 Carl R. Wyrwa Medical Product Development and FDA Regulations Introduction Regulated FDA Overview Medical
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
State Homeland Security Strategy (2012)
Section 1 > Introduction Purpose The purpose of the State Homeland Security Strategy (SHSS) is to identify statewide whole community priorities to achieve and sustain a strengthened ability to prevent,
Using Linux in Medical Devices: What Developers and
Using Linux in Medical Devices: What Developers and Manufacturers Need to Know By Ken Herold, Engineering Specialist, Wind River INNOVATORS START HERE. EXECUTIVE Overview Linux is the operating system
Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection
Understanding Compliance vs. Risk-based Information Protection 1 Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection Why risk analysis is crucial to HIPAA compliance and
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
REGULATIONS FOR THE SECURITY OF INTERNET BANKING
REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY
CYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
Cyber Incident Response
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Cyber Incident Response No: NYS-S13-005 Updated: 03/20/2015 Issued By: NYS ITS
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.
The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013. The Executive Order calls for the development of a voluntary risk based Cybersecurity Framework
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
Cybersecurity@RTD Program Overview and 2015 Outlook
Cybersecurity@RTD Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD Information Technology Department of Finance & Administration
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Legislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
DHS Cyber Security & Resilience Resources: Cyber Preparedness, Risk Mitigation, & Incident Response
February 2015 DHS Cyber Security & Resilience Resources: Cyber Preparedness, Risk Mitigation, & Incident Response Cyber Security Advisor Program Office of Cybersecurity & Communications National Protection
CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015
CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015 TODAY S PRESENTER Viviana Campanaro, CISSP Director, Security and
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013 Inquiries about this report may be addressed
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.
Implementation of ANSI/AAMI/IEC 62304 Medical Device Software Lifecycle Processes.. www.pharmout.net Page 1 of 15 Version-02 1. Scope 1.1. Purpose This paper reviews the implementation of the ANSI/AAMI/IEC
Medical Software Development. International standards requirements and practice
Medical Software Development International standards requirements and practice Food and Drug Administration What? A public health agency Why? Protect American consumers How? By enforcing the Federal Food,
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
G-Cloud Definition of Services Security Penetration Testing
G-Cloud Definition of Services Security Penetration Testing Commercial in Confidence G-Cloud Services An Overview Inner Security is a leading CREST registered information security services provider. We
CDM Hardware Asset Management (HWAM) Capability
CDM Hardware Asset Management (HWAM) Capability Department of Homeland Security Office of Cybersecurity and Communications Federal Network Resilience Table of Contents 1 PURPOSE AND SCOPE... 2 2 THREAT
Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
No. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
Cybersecurity for Meaningful Use. 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013
Cybersecurity for Meaningful Use 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013 Healthcare Sector Vulnerable to Hackers By Robert O Harrow Jr.,
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
CYBERSPACE SECURITY CONTINUUM
CYBERSPACE SECURITY CONTINUUM A People, Processes, and Technology Approach to Meeting Cyber Security Challenges in the 21 st Century 1 InterAgency Board 1550 Crystal Drive Suite 601, Arlington VA 22202
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Guidance on Risk Analysis Requirements under the HIPAA Security Rule
Guidance on Risk Analysis Requirements under the HIPAA Security Rule Introduction The Office for Civil Rights (OCR) is responsible for issuing annual guidance on the provisions in the HIPAA Security Rule.
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013
Cybersecurity and the Cloud 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013 Well, I'll hazard I can do more damage on my laptop sitting in my
An Independent Member of Baker Tilly International
Healthcare Security and Compliance July 23, 2015 Presenters Kelley Miller, CISA, CISM - Principal [email protected] Barbie Thomas, MBA, CHC [email protected] 2 Agenda Introductions Cybersecurity
Security Risk Management For Health IT Systems and Networks
Health IT Standards Committee Meeting Security Risk Management For Health IT Systems and Networks NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Setting the stage. NATIONAL INSTITUTE OF STANDARDS AND
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY
IG MATURITY MODEL FOR FY 2015 FISMA 1 Ad-hoc 1.1 program is not formalized and activities are performed in a reactive manner resulting in an adhoc program that does not meet 2 requirements for a defined
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Risk Assessment for Medical Devices. Linda Braddon, Ph.D. Bring your medical device to market faster 1
Risk Assessment for Medical Devices Linda Braddon, Ph.D. Bring your medical device to market faster 1 My Perspective Work with start up medical device companies Goal: Making great ideas into profitable
SCAC Annual Conference. Cybersecurity Demystified
SCAC Annual Conference Cybersecurity Demystified Me Thomas Scott SC Deputy Chief Information Security Officer PMP, CISSP, CISA, GSLC, FEMA COOP Practitioner [email protected] 803-896-6395 What is Cyber
