How To Be A Successful Health Care Security Consultant

Size: px
Start display at page:

Download "How To Be A Successful Health Care Security Consultant"

Transcription

1 Cybersecurity and Interoperability: Working together for Patient Safety Sponsored by

2 In his current role, Bill provides executive leadership and oversight to Information Security programs and to the Governance, Risk Management, and Compliance (GRC) process, in support of CareFusion s strategic business needs. Before joining CareFusion, Bill s work experience spanned entrepreneurial start-ups, small business consulting, and Security leadership roles for various institutions, some of which include: EMC, Wells Fargo, On Semiconductor and Motorola. Prior to that, Bill spent several years in the trade publishing industry, as both a writer and editor, as well as survived a brief descent into madness in advertising and public relations.

3 Today s Session Sponsored by Introducing our panelists Scott Stuewe Cerner Director, Cerner Network and Chair of the Commonwell Health Alliance Program Management Committee

4 Today s Session Sponsored by Introducing our panelists Gavin O brien NIST / NCCoE Computer Scientist at the National Institute of Standards and Technology (NIST) and National Cybersecurity Center of Excellence (NCCoE)

5 Today s Session Sponsored by Introducing our panelists Kurt Grutzmacher CYLANCE Technical Director, Offensive Security Scenarios

6 Today s Session Sponsored by Introducing our panelists Peter DeVault Epic Director of Interoperability HIT Policy Committee s Information Exchange Workgroup

7 And now We d like to ask each of our panelists to provide an introductory statement.

8 Introductory statement Scott Stuewe Today s Session Sponsored by

9 Committed to IHE And to Interoperability Cerner actively supports IHE efforts to foster national adoption of a consistent set of information standards to enable interoperability of health IT systems st bedside medical device connection -Mayo 2003 Autoprogramming for infusion pumps introduced 2007 Launched Cerner Certification Program for medical devices 2008 Industry First EHRintegrated connectivity and alerting solution to market 2009 Alarming solution introduced st CareAware Infusion Suite implementati on -Wellspan 2011 Alarming solution integrated with nurse call system Worked with clients to create SharedHealth, a medicaid driven HIE 2009 Since their inception, participated in the ONC Health IT Policy and Standards Committee Developed Interoperability Certification program 2014 Demonstrated the use of FHIR standards with Boston Children s Hospital at HIMSS14 Created the Cerner Network business unit focused on interoperability Donated 200,000+ lines of Java code since 2009 to the Direct Project Participating in Argonaut Project Deployed workflow-driven Direct capabilities to all US clients

10 Safeguard doors Protect data at rest Protect data in transit

11 Introductory statement Gavin O Brien Today s Session Sponsored by

12 NCCoE VISION ADVANCE CYBERSECURITY A secure cyber infrastructure that inspires technological innovation and fosters economic growth MISSION ACCELERATE ADOPTION OF SECURE TECHNOLOGIES Collaborate with innovators to provide real-world, standards-based cybersecurity capabilities that address business needs GOAL 1 Welcome to the NCCoE PROVIDE PRACTICAL CYBERSECURITY Help people secure their data and digital infrastructure by equipping them with practical ways to implement standards-based cybersecurity solutions that are modular, repeatable and scalable GOAL 2 INCREASE RATE OF ADOPTION Enable companies to rapidly deploy commercially available cybersecurity technologies by reducing technological, educational and economic barriers to adoption GOAL 3 ACCELERATE INNOVATION Empower innovators to creatively address businesses most pressing cybersecurity challenges in a state-ofthe-art, collaborative environment

13 NIST ITL The NCCoE is part of the NIST Information Technology Laboratory and operates in close collaboration with the Computer Security Division. As a part of the NIST family, the center has access to a foundation of prodigious expertise, resources, relationships and experience. PARTNERSHIPS Established in 2012 through a partnership between NIST, the State of Maryland and Montgomery County, the NCCoE meets businesses most pressing cybersecurity needs with reference designs that can be deployed rapidly. NIST CYBERSECURITY THOUGHT LEADERSHIP Cryptography Identity management Key management Risk management Secure virtualization Software assurance Security automation Security for cloud and mobility Hardware roots of trust Vulnerability management Secure networking Usability and security Welcome to the NCCoE

14 HEALTHCARE SECTOR PROJECTS EHR and Mobile Devices Medical Devices: Wireless Infusion Pumps Gudelsky Drive Rockville, MD 20850

15 Introductory statement Kurt Grutzmacher Today s Session Sponsored by

16 Who am I? Kurt Grutzmacher! Technical Director at Cylance, Inc. 17+ Years Offensive Security Experience Previous work at Cisco Systems, Pacific Gas & Electric and Federal Reserve System Hacker of embedded systems (aka the Internet Of Things )

17 Product/Solutions Portfolio Alert Management Services Compromise Assessment V-API V-Forensics V-Gateway V-Helpdesk Endpoint Agent Cloud management Silent / small footprint Execution Control Detects Zero Day Malware Daily Activity Monitoring Alert Processing Deep Malware Analysis Weekly Alert Reports Gap Protection Block PUPs & RATS Services Engagement Finds Compromised Credentials Threat Priority Supports All O/S Detection Only Detection and Protection Ongoing Prevention Management Detection & Prevention Analytics

18 How do we do it? Algorithmic Science EXTRACT TRANSFORM, VECTORIZE & TRAIN COLLECT GOOD CLASSIFY & CLUSTER BAD

19 Introductory statement Peter DeVault Today s Session Sponsored by

20 54% of the U.S. Population (174 million patients) 183 million worldwide (2.5%) ~342 customers 315,500 EHR physicians RED > 40% of patients are or will be covered by EpicCare PINK 1-40% of patients are or will be covered by EpicCare GREY Non-Clinical Customers

21 8.3 million Patient Records Exchanged Monthly More than 12,500 Live Interfaces 69 billion messages in different vendors via Standards-Based Exchange of CCD/C-CDA Documents both Epic to Epic and Epic to non-epic

22 Today s Session Sponsored by Please think of questions to ask our panelists Scott Stuewe Director, Cerner Network Chair of the Commonwell Health Alliance Program Management Committee Gavin O brien Computer Scientist at the National Institute of Standards and Technology (NIST) Kurt Grutzmacher Technical Director, Offensive Security Scenarios Peter DeVault Director of Interoperability, Epic HIT Policy Committee s Information Exchange Workgroup

23 Final Audience Q&A Thank you!!! Today s Session Sponsored by

Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device

Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device The Healthcare Sector at the NCCoE MARCH, 3 2016 THE NATIONAL CYBERSECURITY LAB HELPS SECURE HIT 1. About Us: The National Cybersecurity

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Emerging Technologies That Support Transitions of Care. 8 June 2016 Elaine Remmlinger, Senior Partner, and Robin Settle, Partner

Emerging Technologies That Support Transitions of Care. 8 June 2016 Elaine Remmlinger, Senior Partner, and Robin Settle, Partner Emerging Technologies That Support Transitions of Care 8 June 2016 Elaine Remmlinger, Senior Partner, and Robin Settle, Partner Topics of Discussion Drivers of Transitions of Care Technology Perspective:

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

CommonWell Health Alliance Interoperability for the Common Good. Scott Stuewe - Director, Cerner Network NCHICA Annual Conference

CommonWell Health Alliance Interoperability for the Common Good. Scott Stuewe - Director, Cerner Network NCHICA Annual Conference CommonWell Health Alliance Interoperability for the Common Good Scott Stuewe - Director, Cerner Network NCHICA Annual Conference Imagine the internet without Google Interoperability Interoperability occurs

More information

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage. Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee

More information

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big

More information

Health Information Technology: A tool for optimizing health

Health Information Technology: A tool for optimizing health Health Information Technology: A tool for optimizing health December 2014 Susan Otter, Director of Health Information Technology, OHA Gina Bianco, Executive Director, Jefferson Health Information Exchange

More information

Cerner s Approach to Interoperability:

Cerner s Approach to Interoperability: Cerner s Approach to Interoperability: Enterprise Device Communication Health Information Exchange Network TM Introduction The seismic shift taking place in the health care industry has created an environment

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D Eric Lightner Director Federal Smart Grid Task Force July 2015 2 OE Mission The Office of Electricity

More information

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM Common Gaps in Security Programs Outsourcing highly skilled security resources can be cost prohibitive. Annual assessments don t provide the coverage necessary. Software

More information

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for

More information

Implementing Effective Data Exchange with The CommonWell Health Alliance

Implementing Effective Data Exchange with The CommonWell Health Alliance Implementing Effective Data Exchange with The CommonWell Health Alliance Ralph Tenney - CIO, St. John Providence Health System, Detroit Rick McCarthy CIO, St. Vincent s Medical Center, Bridgeport. Bobby

More information

Perspectives on Cybersecurity in Healthcare June 2015

Perspectives on Cybersecurity in Healthcare June 2015 SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright

More information

Cyber Security An Exercise in Predicting the Future

Cyber Security An Exercise in Predicting the Future Cyber Security An Exercise in Predicting the Future Paul Douglas, August 25, 2014 AUDIT & ACCOUNTING + CONSULTING + TAX SERVICES + TECHNOLOGY I www.pncpa.com I www.pntech.net What is Cyber Security? Measures

More information

future data and infrastructure

future data and infrastructure White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal

More information

2014 PCD Domain Update. Jeff McGeath Iatric Systems IHE PCD Technical Committee Co-Chair

2014 PCD Domain Update. Jeff McGeath Iatric Systems IHE PCD Technical Committee Co-Chair 2014 PCD Domain Update Jeff McGeath Iatric Systems IHE PCD Technical Committee Co-Chair Patient Care Device (PCD) Domain Formed in 2005 to address issues related to integration of Point-of-Care Medical

More information

Achieving meaningful use of healthcare information technology

Achieving meaningful use of healthcare information technology IBM Software Information Management Achieving meaningful use of healthcare information technology A patient registry is key to adoption of EHR 2 Achieving meaningful use of healthcare information technology

More information

Java and the Internet of Things

Java and the Internet of Things Java and the Internet of Things Henrik Stahl Vice President Java Product Management 1 9 Million+ Java developers worldwide #1 Choice for developers #1 Development platform 5 of Top 5 OEMs ship Java ME

More information

Request for Proposal (RFP) Supporting Efficient Care Coordination for New Yorkers: Bulk Purchase of EHR Interfaces for Health Information

Request for Proposal (RFP) Supporting Efficient Care Coordination for New Yorkers: Bulk Purchase of EHR Interfaces for Health Information Request for Proposal (RFP) Supporting Efficient Care Coordination for New Yorkers: Bulk Purchase of EHR Interfaces for Health Information ISSUE DATE: April 10, 2013 RESPONSE DUE DATE: May 3, 2013 Region:

More information

Understanding Certification: Evaluating Certified EHR Technology

Understanding Certification: Evaluating Certified EHR Technology Understanding Certification: Evaluating Certified EHR Technology Alisa Ray, Executive Director, Certification Commission for Health Information Technology Marisa L Wilson, DNSc, MHSc, RN-BC, Assistant

More information

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s I D C S P O T L I G H T Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s March 2012 Adapted from Worldwide Cloud Security 2011 2015 Forecast: A Comprehensive

More information

Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing

Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing As economic challenges persist in communities, nations, and regions around the world, the

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing Validian Next Generation Information Policy Management & Intrusion Prevention: www.validian.com Securing Mobile, Cloud & Distributed Computing Validian Top Down IPMP & Cyber Security My name is Bruce Benn

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

Jefferies Healthcare Conference

Jefferies Healthcare Conference Jefferies Healthcare Conference Marc Naughton Executive Vice President and Chief Financial Officer June 2, 2015 Safe Harbor Statement This presentation may contain forward-looking statements, including

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop

More information

STREAM Cyber Security

STREAM Cyber Security STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software

More information

Glinda Cummings World Wide Tivoli Security Product Manager

Glinda Cummings World Wide Tivoli Security Product Manager Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!

More information

Developing Secure Software in the Age of Advanced Persistent Threats

Developing Secure Software in the Age of Advanced Persistent Threats Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer

More information

HIMSS and AHIMA: Trends in HIE Organizational Staffing. CMS ehealth Forum December 6, 2013

HIMSS and AHIMA: Trends in HIE Organizational Staffing. CMS ehealth Forum December 6, 2013 HIMSS and AHIMA: Trends in HIE Organizational Staffing CMS ehealth Forum December 6, 2013 Scott MacLean Introductions Chair, HIMSS Board of Directors Deputy CIO, Director of IS Operations, Partners HealthCare

More information

5 Key Trends in Connected Health

5 Key Trends in Connected Health 5 Key Trends in Connected Health One of the most exciting market opportunities in healthcare today is the near limitless set of innovative solutions that can be created through the integration of the Internet,

More information

Physical Infrastructure Management Solutions

Physical Infrastructure Management Solutions Physical Infrastructure Management Solutions Physical Infrastructure Challenges Require Innovative Solutions The Need for In-Depth Network Intelligence. With increased acceptance of virtualization, cloud

More information

Achieving Workforce Optimization: Merging Strategy and Technology

Achieving Workforce Optimization: Merging Strategy and Technology Achieving Workforce Optimization: Merging Strategy and Technology The healthcare industry is experiencing unprecedented change, and leaders are facing some of the most difficult challenges in the history

More information

Facilitated Self-Evaluation v1.0

Facilitated Self-Evaluation v1.0 Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.

More information

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability T. Jepsen, N. Buckley, D. Witters, K. Stine INTRODUCTION The IEEE-USA Medical Technology Policy Committee sponsored

More information

Nurses at the Forefront: Care Delivery and Transformation through Health IT

Nurses at the Forefront: Care Delivery and Transformation through Health IT Nurses at the Forefront: Care Delivery and Transformation through Health IT Ann OBrien RN MSN CPHIMS National Senior Director of Clinical Informatics Kaiser Permanente Robert Wood Johnson Executive Nurse

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

Health Care Solutions

Health Care Solutions Health Care Solutions Increase Service Levels, Meet Expectations A Unified Approach to Health Care Automation Processes Hospitals, clinics, extended care facilities, and physician s offices are facing

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013 SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

Meaningful Use of EHRs:

Meaningful Use of EHRs: Meaningful Use of EHRs: First Steps To Improved Patient Outcomes www.ciscohealthpath.com Jointly sponsored by Postgraduate Institute for Medicine. Learn How to Achieve Meaningful Use In Your Practice With

More information

Cyber Supply Chain Risk Management Portal

Cyber Supply Chain Risk Management Portal Cyber Supply Chain Risk Management Portal Dr. Sandor Boyson, Director, Supply Chain Management Center& Holly Mann, Chief InformaBon Officer R.H. Smith School Of Business The Cyber Supply Chain Challenge

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

Top 20 Critical Security Controls

Top 20 Critical Security Controls Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need

More information

Managing the Unpredictable Human Element of Cybersecurity

Managing the Unpredictable Human Element of Cybersecurity CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151

More information

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

SOLUTION BRIEF. Next Generation APT Defense for Healthcare SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their

More information

Merge Healthcare Investor Presentation

Merge Healthcare Investor Presentation Merge Healthcare Investor Presentation January 2015 1 Forward Looking Statement The matters discussed in this presentation may include forward-looking statements, which could involve a number of risks

More information

STATEMENT OF KAREN UTTERBACK, MSN, RN VICE PRESIDENT, MARKETING AND PRODUCT STRATEGY MCKESSON TECHNOLOGY SOLUTIONS

STATEMENT OF KAREN UTTERBACK, MSN, RN VICE PRESIDENT, MARKETING AND PRODUCT STRATEGY MCKESSON TECHNOLOGY SOLUTIONS STATEMENT OF KAREN UTTERBACK, MSN, RN VICE PRESIDENT, MARKETING AND PRODUCT STRATEGY MCKESSON TECHNOLOGY SOLUTIONS BEFORE THE OFFICE OF THE NATIONAL COORDINATOR FOR HEALTH INFORMATION TECHNOLOGY POLICY

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

Cybersecurity Supply-Chain

Cybersecurity Supply-Chain Cybersecurity Supply-Chain Workforce Management and Skills Gap Development TRANSFORMING THE NEXT GENERATION WORKFORCE Students learn the skills employers look for! Global Problem - Critical Issues Winning

More information

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved. SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Clinical Health Informatics: An Overview for Nurses Chapter 4

Clinical Health Informatics: An Overview for Nurses Chapter 4 Clinical Health Informatics: An Overview for Nurses Chapter 4 W R I T T E N B Y D O N N A O V E N S, C M A A, C T T, H I T P R O E D I T E D B Y : V A L E R I E F I S H E R, R N, M A H E A L T H W O R

More information

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments

More information

Cybersecurity Delivering Confidence in the Cyber Domain

Cybersecurity Delivering Confidence in the Cyber Domain Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your

More information

Data Center Solutions

Data Center Solutions Data Center Solutions New Data Center Challenges Require New Solutions Data Center Architecture. Inside and Out. Data centers are mission-critical facilities. A silo-based approach to designing, deploying

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services MSSP you us are a Managed Security Service Provider looking to offer Advanced Malware Protection Services Lastline is the only company with 10+ years of academic research focused on detecting advanced

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

Information and Communication Technology in Health Care To Infinity and Beyond. Pam Bush, RN, BScN

Information and Communication Technology in Health Care To Infinity and Beyond. Pam Bush, RN, BScN Information and Communication Technology in Health Care To Infinity and Beyond Pam Bush, RN, BScN Agenda Electronic Health Record- EHR- what is it EHR Requirements to Support Clinical Practice EHR how

More information

How does Big Data disrupt the technology ecosystem of the public cloud?

How does Big Data disrupt the technology ecosystem of the public cloud? How does Big Data disrupt the technology ecosystem of the public cloud? Copyright 2012 IDC. Reproduction is forbidden unless authorized. All rights reserved. Agenda Market trends 2020 Vision Introduce

More information

ASHP Professional Development Section Advisory Group. Professional Development Opportunities for Informatics Pharmacists

ASHP Professional Development Section Advisory Group. Professional Development Opportunities for Informatics Pharmacists ASHP Professional Development Section Advisory Group Professional Development Opportunities for Informatics Pharmacists Introduction Many opportunities exist to help informatics pharmacists gain the knowledge

More information

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security 1 Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

More information

The Need for Intelligent Network Security: Adapting IPS for today s Threats

The Need for Intelligent Network Security: Adapting IPS for today s Threats The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network

More information

Selecting the right cybercrime-prevention solution

Selecting the right cybercrime-prevention solution IBM Software Thought Leadership White Paper Selecting the right cybercrime-prevention solution Key considerations and best practices for achieving effective, sustainable cybercrime prevention Contents

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Securing and protecting the organization s most sensitive data

Securing and protecting the organization s most sensitive data Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered

More information