How To Be A Successful Health Care Security Consultant



Similar documents
Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Emerging Technologies That Support Transitions of Care. 8 June 2016 Elaine Remmlinger, Senior Partner, and Robin Settle, Partner

CyberSecurity Solutions. Delivering

CommonWell Health Alliance Interoperability for the Common Good. Scott Stuewe - Director, Cerner Network NCHICA Annual Conference

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

Health Information Technology: A tool for optimizing health

Cerner s Approach to Interoperability:

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

ADVANCED DISTRIBUTION MANAGEMENT SYSTEMS OFFICE OF ELECTRICITY DELIVERY & ENERGY RELIABILITY SMART GRID R&D

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January kpmg.com

Implementing Effective Data Exchange with The CommonWell Health Alliance

Perspectives on Cybersecurity in Healthcare June 2015

Cyber Security An Exercise in Predicting the Future

future data and infrastructure

2014 PCD Domain Update. Jeff McGeath Iatric Systems IHE PCD Technical Committee Co-Chair

Achieving meaningful use of healthcare information technology

Java and the Internet of Things

Request for Proposal (RFP) Supporting Efficient Care Coordination for New Yorkers: Bulk Purchase of EHR Interfaces for Health Information

Understanding Certification: Evaluating Certified EHR Technology

I D C S P O T L I G H T. Ac c e l e r a t i n g Cloud Ad o p t i o n w i t h Standard S e c u r i t y M e a s u r e s

Solving for the Future: Addressing Major Societal Challenges Through Innovative Technology and Cloud Computing

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Validian. Next Generation Information Policy Management & Intrusion Prevention: Securing Mobile, Cloud & Distributed Computing

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

Jefferies Healthcare Conference

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

STREAM Cyber Security

Glinda Cummings World Wide Tivoli Security Product Manager

Developing Secure Software in the Age of Advanced Persistent Threats

HIMSS and AHIMA: Trends in HIE Organizational Staffing. CMS ehealth Forum December 6, 2013

5 Key Trends in Connected Health

Physical Infrastructure Management Solutions

Achieving Workforce Optimization: Merging Strategy and Technology

Facilitated Self-Evaluation v1.0

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability

Nurses at the Forefront: Care Delivery and Transformation through Health IT

How To Buy Nitro Security

Health Care Solutions

IoT Security Platform

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Meaningful Use of EHRs:

Cyber Supply Chain Risk Management Portal

Cybersecurity. Are you prepared?

Top 20 Critical Security Controls

Managing the Unpredictable Human Element of Cybersecurity

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

Merge Healthcare Investor Presentation

STATEMENT OF KAREN UTTERBACK, MSN, RN VICE PRESIDENT, MARKETING AND PRODUCT STRATEGY MCKESSON TECHNOLOGY SOLUTIONS

October 24, Mitigating Legal and Business Risks of Cyber Breaches

Cybersecurity Supply-Chain

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

Critical Controls for Cyber Security.

Clinical Health Informatics: An Overview for Nurses Chapter 4

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

Cybersecurity Delivering Confidence in the Cyber Domain

Data Center Solutions

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Information and Communication Technology in Health Care To Infinity and Beyond. Pam Bush, RN, BScN

How does Big Data disrupt the technology ecosystem of the public cloud?

ASHP Professional Development Section Advisory Group. Professional Development Opportunities for Informatics Pharmacists

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Selecting the right cybercrime-prevention solution

CYBER SECURITY TRAINING SAFE AND SECURE

Securing and protecting the organization s most sensitive data

Transcription:

Cybersecurity and Interoperability: Working together for Patient Safety Sponsored by

In his current role, Bill provides executive leadership and oversight to Information Security programs and to the Governance, Risk Management, and Compliance (GRC) process, in support of CareFusion s strategic business needs. Before joining CareFusion, Bill s work experience spanned entrepreneurial start-ups, small business consulting, and Security leadership roles for various institutions, some of which include: EMC, Wells Fargo, On Semiconductor and Motorola. Prior to that, Bill spent several years in the trade publishing industry, as both a writer and editor, as well as survived a brief descent into madness in advertising and public relations.

Today s Session Sponsored by Introducing our panelists Scott Stuewe Cerner Director, Cerner Network and Chair of the Commonwell Health Alliance Program Management Committee

Today s Session Sponsored by Introducing our panelists Gavin O brien NIST / NCCoE Computer Scientist at the National Institute of Standards and Technology (NIST) and National Cybersecurity Center of Excellence (NCCoE)

Today s Session Sponsored by Introducing our panelists Kurt Grutzmacher CYLANCE Technical Director, Offensive Security Scenarios

Today s Session Sponsored by Introducing our panelists Peter DeVault Epic Director of Interoperability HIT Policy Committee s Information Exchange Workgroup

And now We d like to ask each of our panelists to provide an introductory statement.

Introductory statement Scott Stuewe Today s Session Sponsored by

Committed to IHE And to Interoperability Cerner actively supports IHE efforts to foster national adoption of a consistent set of information standards to enable interoperability of health IT systems. 1998 1 st bedside medical device connection -Mayo 2003 Autoprogramming for infusion pumps introduced 2007 Launched Cerner Certification Program for medical devices 2008 Industry First EHRintegrated connectivity and alerting solution to market 2009 Alarming solution introduced 2010 1 st CareAware Infusion Suite implementati on -Wellspan 2011 Alarming solution integrated with nurse call system 1995 2000 2005 2010 2015 2007 Worked with clients to create SharedHealth, a medicaid driven HIE 2009 Since their inception, participated in the ONC Health IT Policy and Standards Committee Developed Interoperability Certification program 2014 Demonstrated the use of FHIR standards with Boston Children s Hospital at HIMSS14 Created the Cerner Network business unit focused on interoperability Donated 200,000+ lines of Java code since 2009 to the Direct Project Participating in Argonaut Project Deployed workflow-driven Direct capabilities to all US clients

Safeguard doors Protect data at rest Protect data in transit

Introductory statement Gavin O Brien Today s Session Sponsored by

NCCoE VISION ADVANCE CYBERSECURITY A secure cyber infrastructure that inspires technological innovation and fosters economic growth MISSION ACCELERATE ADOPTION OF SECURE TECHNOLOGIES Collaborate with innovators to provide real-world, standards-based cybersecurity capabilities that address business needs GOAL 1 Welcome to the NCCoE PROVIDE PRACTICAL CYBERSECURITY Help people secure their data and digital infrastructure by equipping them with practical ways to implement standards-based cybersecurity solutions that are modular, repeatable and scalable GOAL 2 INCREASE RATE OF ADOPTION Enable companies to rapidly deploy commercially available cybersecurity technologies by reducing technological, educational and economic barriers to adoption GOAL 3 ACCELERATE INNOVATION Empower innovators to creatively address businesses most pressing cybersecurity challenges in a state-ofthe-art, collaborative environment

NIST ITL The NCCoE is part of the NIST Information Technology Laboratory and operates in close collaboration with the Computer Security Division. As a part of the NIST family, the center has access to a foundation of prodigious expertise, resources, relationships and experience. PARTNERSHIPS Established in 2012 through a partnership between NIST, the State of Maryland and Montgomery County, the NCCoE meets businesses most pressing cybersecurity needs with reference designs that can be deployed rapidly. NIST CYBERSECURITY THOUGHT LEADERSHIP Cryptography Identity management Key management Risk management Secure virtualization Software assurance Security automation Security for cloud and mobility Hardware roots of trust Vulnerability management Secure networking Usability and security Welcome to the NCCoE

HEALTHCARE SECTOR PROJECTS EHR and Mobile Devices Medical Devices: Wireless Infusion Pumps 240-314-6800 hit_nccoe@nist.gov http://nccoe.nist.gov 9600 Gudelsky Drive Rockville, MD 20850

Introductory statement Kurt Grutzmacher Today s Session Sponsored by

Who am I? Kurt Grutzmacher! Technical Director at Cylance, Inc. 17+ Years Offensive Security Experience Previous work at Cisco Systems, Pacific Gas & Electric and Federal Reserve System Hacker of embedded systems (aka the Internet Of Things )

Product/Solutions Portfolio Alert Management Services Compromise Assessment V-API V-Forensics V-Gateway V-Helpdesk Endpoint Agent Cloud management Silent / small footprint Execution Control Detects Zero Day Malware Daily Activity Monitoring Alert Processing Deep Malware Analysis Weekly Alert Reports Gap Protection Block PUPs & RATS Services Engagement Finds Compromised Credentials Threat Priority Supports All O/S Detection Only Detection and Protection Ongoing Prevention Management Detection & Prevention Analytics

How do we do it? Algorithmic Science EXTRACT TRANSFORM, VECTORIZE & TRAIN COLLECT GOOD CLASSIFY & CLUSTER BAD

Introductory statement Peter DeVault Today s Session Sponsored by

54% of the U.S. Population (174 million patients) 183 million worldwide (2.5%) ~342 customers 315,500 EHR physicians RED > 40% of patients are or will be covered by EpicCare PINK 1-40% of patients are or will be covered by EpicCare GREY Non-Clinical Customers

8.3 million Patient Records Exchanged Monthly More than 12,500 Live Interfaces 69 billion messages in 2014 664 different vendors via Standards-Based Exchange of CCD/C-CDA Documents both Epic to Epic and Epic to non-epic

Today s Session Sponsored by Please think of questions to ask our panelists Scott Stuewe Director, Cerner Network Chair of the Commonwell Health Alliance Program Management Committee Gavin O brien Computer Scientist at the National Institute of Standards and Technology (NIST) Kurt Grutzmacher Technical Director, Offensive Security Scenarios Peter DeVault Director of Interoperability, Epic HIT Policy Committee s Information Exchange Workgroup

Final Audience Q&A Thank you!!! Today s Session Sponsored by