1
Cybersecurity in Healthcare
Steven Goriah, DHA, CHCIO, FACHE, CISM
Vice President Information Technology
CISO
Westchester Medical Center Health Network
Cybersecurity in Healthcare
• 82 % of hospitals reported a significant security incidents in the
past 12 Months
• E-mail (e.g., phishing email) continues to be the most frequently
reported initial point of compromise (69%) n=166
• E-mail can contain a wealth of information, including sensitive
patient clinical and financial information
3
2019 HIMSS CYBERSECURITY SURVEY
LifeBridge Health
• The attack potentially breached the data of around 500,000 patients.
Health Management Concepts
• This ransomware attack fast became a full-blown data breach over
500,000 patients.
UnityPoint Health
• Two security breaches last year. The second compromised the data of
1.4 million patients.
4
Largest Healthcare Data Breaches of 2018
It’s all about Risk Management. Which is riskier?
“More people are killed every year by
pigs than by sharks, which shows you
how good we are at evaluating risk.”
How do we approach such a complex
situation for Healthcare?
6
What is the Role of a Framework?
• Provides a common language and systematic
methodology for managing cybersecurity risk.
• Includes activities to be incorporated in a
cybersecurity program that can be tailored to
meet any organization’s needs.
• Designed to complement, not replace, an
organization's cybersecurity program and risk
management processes.
7
• ISO 27000 Series
• CObIT 5
• NIST SP 800 Series
• HITRUST v9
Usable Cybersecurity Frameworks
(most popular of the more than 200 available)
8
HITURST
CSFcontains 149 security and privacy controls parsed
amongst 46 control objectives within 14 broad control
categories
9
Choose a Suitable Framework Wisely
Choose a Framework (one or more) –
The Only Bad Choice is No Choice!
10
High-level HITRUST and NIST CSF Comparison
HITRUST NIST
Purpose A scalable, prescriptive and certifiable
framework specific created in response to
multiple compliance requirements, many of
which are subject to interpretation
In response to the President’s Executive Order
13636, Improving Critical Infrastructure
Cybersecurity (2013). It’s a framework – based on
existing standards, guidelines, and practices - for
reducing cyber risks to critical infrastructure
Industry Healthcare-specific Applies broadly across multiple industries
Objective A framework that can be leveraged to
communicate, compare and benchmark
cybersecurity AND can be used for
certification
A framework that can be leveraged to
communicate, compare, and benchmark cyber
security
Illustrative
Sources
ISO, HIPAA, NIST, CMS, MARS-E, IRS, PCI,
CSA-CCM, state laws, etc.
COBIT, NIST, ISA, CCS, ISO, HIPAA (new)
11
HITRUST CSF and NIST CsF
• HITRUST CSF and NIST CsF
are complementary
frameworks
• While an organization can
leverage either frameworks
on its own, there is value in
• Leveraging HITRUST as the HPH
standard and
• Using the NIST CsF being the
mechanism to communicate
maturity and comparison
between industries
12
13
Comparison of ISO, NIST, and HITRUST
Footnotes on next page (published by HITRUST in 2014)
Implementation Advice
• Allow for flexibility in implementation and bring in concepts of
maturity models
• Reflect how your organization will implement core functions and
manage its risk
• Be progressive, building on previous tiers
• Define the characteristics at the organization level and determine
how a category will be implemented
14
Get the Board Involved
• Audit and Compliance Committee
• IT Subcommittee of the Board
• Finance Committee
15
but not too involved…
Keep the Reporting Simple But Consistent…
• Use terms that Board members can understand
• Should be easy enough to understand without explanations
• Provide the explanations
• Propose a model and get the Chair’s endorsement
• Use terms broad enough to accommodate evolving needs
• Avoid the temptation to change
• Use graphs and iconography that work in color and black & white
16
• Communicate, but test for comprehension at every step with every
stakeholder group
• Plan and ADJUST
• Clarify Roles and ADJUST
• Eliminate Ambiguity and ADJUST
• Embrace Accountability
• Execute and ADJUST
• Continue Praying
Be Deliberate
17
and ADJUST
Individual/Body CIO CMIO ISGC
Task
Support Implementation of EHR R A I
Engage physicians in information system selection/development A R C
Manage vendors R C I
Negotiate contracts R C I
Design clinical systems/review clinical processes C R I
Build clinical systems/change workflow processes R C I
Test clinical systems/workflow changes R C I
Validate (testing with users) clinical systems/workflow changes C R I
Develop training curriculum (design education tools and content) I R I
Deploy training (deliver education) R C I
Select end-user devices C R I
Govern Information Management activities A C R
Participate in Executive Leadership R I C
Report to the Institutional Board R C I
Participate in HIE activities C C R
Responsible for performance of task
Assists responsible person, may do bulk of work
Consulted - opinions are sought
Informed - kept up-to-date on progress
RACI Matrix for CIO, CMIO, and IS Governance Council (ISGC)
mm/dd/yyyy
Role Clarification and Responsibility is
Essential – RACI Diagram
18
• Many positive advances are occurring in healthcare cybersecurity
practices.
• Cybersecurity professionals have more resources and budget
available to help ensure that their organizations stay ahead of the
threats.
• Cybersecurity professionals feel empowered to drive change in
healthcare organizations
19
2019 HIMSS CYBERSECURITY SURVEY
20
It’s critical to create a culture of privacy and security.
Thank You!
21

More Related Content

PPTX
Introduction to security
PDF
Cybersecurity Challenges in Healthcare
PPTX
Healthcare and Cyber security
PDF
Cybersecurity in Banking Sector
PPTX
Cyber Security Seminar.pptx
PPTX
Introduction to cyber security amos
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PPTX
Cyber security and current trends
Introduction to security
Cybersecurity Challenges in Healthcare
Healthcare and Cyber security
Cybersecurity in Banking Sector
Cyber Security Seminar.pptx
Introduction to cyber security amos
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cyber security and current trends

What's hot (20)

ODP
Cyber Security for Financial Institutions
PPTX
Cyber Security in Society
PDF
Application Security - Your Success Depends on it
PPTX
PPTX
Cyber security
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
PPSX
Security policies
PDF
Cyber Security and Data Protection
PPT
Introduction to Cyber Security
PDF
Network Security Presentation
PPTX
Computer forensics and steganography
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PDF
Cybersecurity Awareness Training Presentation v1.3
PPTX
Cyber Security in AI (Artificial Intelligence)
PPTX
Data security
PPTX
Cyber crime and security
PPTX
INFORMATION SECURITY
PDF
The role of big data, artificial intelligence and machine learning in cyber i...
PPTX
Cybercrime: A Seminar Report
Cyber Security for Financial Institutions
Cyber Security in Society
Application Security - Your Success Depends on it
Cyber security
Cyber Security Awareness (Reduce Personal & Business Risk)
Security policies
Cyber Security and Data Protection
Introduction to Cyber Security
Network Security Presentation
Computer forensics and steganography
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Awareness Training Presentation v1.3
Cyber Security in AI (Artificial Intelligence)
Data security
Cyber crime and security
INFORMATION SECURITY
The role of big data, artificial intelligence and machine learning in cyber i...
Cybercrime: A Seminar Report
Ad

Similar to Tech Refresh - Cybersecurity in Healthcare (20)

PDF
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
PPTX
The IT Analysis Paralysis
PDF
Critical Success Factors in Leading Healthcare IT Projects
PDF
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
PDF
Himss Cybersecurity; Health informatics, Cloud & Devices
PDF
Challenges & Opportunities in Managing Cyber Risks
PDF
Cyber Risk in Healthcare Industry- Are you Protected?
PDF
Healthcare - Customer-Centric Healthcare Best Practices for CIO and CISOs
PPTX
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
PPTX
How to Use the NIST CSF to Recover from a Healthcare Breach
PDF
DHHS ASPR Cybersecurity Threat Information Resources
PDF
Healthcare Cybersecurity Whitepaper FINAL
PDF
UoF - HITRUST & Risk Analysis v1
PDF
A New Approach to Healthcare Security
PDF
Healthcare Cybersecurity Services : Key Components, Benefits, Challenges | G...
DOCX
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
PDF
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
DOCX
Cyb 690 cybersecurity program template directions the foll
PDF
Addressing Cybersecurity Strategically
PDF
Detroit ISSA Healthcare Cybersecurity
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
The IT Analysis Paralysis
Critical Success Factors in Leading Healthcare IT Projects
mHealth Israel_Cyber Risk in Healthcare_Mary Alice Annecharico_CIO Henry Ford...
Himss Cybersecurity; Health informatics, Cloud & Devices
Challenges & Opportunities in Managing Cyber Risks
Cyber Risk in Healthcare Industry- Are you Protected?
Healthcare - Customer-Centric Healthcare Best Practices for CIO and CISOs
Closing-the-gap-meeting-acute-workforce-needs-in-healthcare-cyber security-an...
How to Use the NIST CSF to Recover from a Healthcare Breach
DHHS ASPR Cybersecurity Threat Information Resources
Healthcare Cybersecurity Whitepaper FINAL
UoF - HITRUST & Risk Analysis v1
A New Approach to Healthcare Security
Healthcare Cybersecurity Services : Key Components, Benefits, Challenges | G...
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
Whitepaper next generation_patient_safety_bertine_mc_kenna.01
Cyb 690 cybersecurity program template directions the foll
Addressing Cybersecurity Strategically
Detroit ISSA Healthcare Cybersecurity
Ad

More from CompTIA (20)

PDF
CompTIA IT Employment Tracker – December 2021
PDF
CompTIA IT Employment Tracker – November 2021
PDF
CompTIA IT Employment Tracker – October 2021
PDF
CompTIA IT Employment Tracker – September 2021
PDF
CompTIA IT Employment Tracker – July 2021
PDF
CompTIA IT Employment Tracker – June 2021
PPTX
Trends in Automation 2021
PDF
CompTIA IT Employment Tracker – May 2021
PDF
CompTIA IT Employment Tracker – April 2021
PPTX
IT Operations and Emerging Technology
PDF
CompTIA IT Employment Tracker – March 2021
PPTX
Help Desk Trends
PDF
CompTIA IT Employment Tracker – February 2021
PPTX
CompTIA 2021 IT Industry Outlook
PPTX
CompTIA IT Employment Tracker - January 2021
PDF
CompTIA IT Employment Tracker – November 2020
PDF
CompTIA IT Employment Tracker – October 2020
PDF
CompTIA IT Employment Tracker – September 2020
PDF
CompTIA IT Employment Tracker – August 2020
PPTX
CompTIA IT Employment Tracker – July 2020
CompTIA IT Employment Tracker – December 2021
CompTIA IT Employment Tracker – November 2021
CompTIA IT Employment Tracker – October 2021
CompTIA IT Employment Tracker – September 2021
CompTIA IT Employment Tracker – July 2021
CompTIA IT Employment Tracker – June 2021
Trends in Automation 2021
CompTIA IT Employment Tracker – May 2021
CompTIA IT Employment Tracker – April 2021
IT Operations and Emerging Technology
CompTIA IT Employment Tracker – March 2021
Help Desk Trends
CompTIA IT Employment Tracker – February 2021
CompTIA 2021 IT Industry Outlook
CompTIA IT Employment Tracker - January 2021
CompTIA IT Employment Tracker – November 2020
CompTIA IT Employment Tracker – October 2020
CompTIA IT Employment Tracker – September 2020
CompTIA IT Employment Tracker – August 2020
CompTIA IT Employment Tracker – July 2020

Recently uploaded (20)

PDF
WHO Global TUBERCULOSIS Report 2018-2019
PDF
Gastro Retentive Drug Delivery System.pdf
PPTX
1. FAMILY PLANNING-1-2, nursing students
PPT
Doppler - 5.ppt .........................
PPTX
RENAL IMAGING MODALITIES-RENAL NURSING.pptx
PPTX
PPTX
Direct ELISA - procedure and application.pptx
PPTX
Drugs used in treatment of Malaria. Antimalarial Drugs.pptx
PPTX
The Principle of Naturopathy Self-healing, toxin removal and balance
PPTX
Cardiac catheterization.pptx for nursing
PPTX
Approach_to_Child_with_Poisoning_Presentation (1).pptx
PPTX
Case report session Apendisitis Akut people.pptx
PPTX
MONOCHORIONIC TWIN PREGNANCY details.pptx
PDF
CASE PRESENTATION1.pdf bipolar disorder in which both mania and depression h...
PPTX
ee5a0480-e162-45e0-bf18-eaba79c6cfae.pptx
PDF
mycobacterial infection tuberculosis (TB)
PPTX
Skeletal System presentation for high school
PPTX
Pharmaco vigilance for BAMS according to NCISM
PPTX
Anaesthetic management of Congenital heart diseases
PPTX
Maternal and child health. The normal new born.pptx
WHO Global TUBERCULOSIS Report 2018-2019
Gastro Retentive Drug Delivery System.pdf
1. FAMILY PLANNING-1-2, nursing students
Doppler - 5.ppt .........................
RENAL IMAGING MODALITIES-RENAL NURSING.pptx
Direct ELISA - procedure and application.pptx
Drugs used in treatment of Malaria. Antimalarial Drugs.pptx
The Principle of Naturopathy Self-healing, toxin removal and balance
Cardiac catheterization.pptx for nursing
Approach_to_Child_with_Poisoning_Presentation (1).pptx
Case report session Apendisitis Akut people.pptx
MONOCHORIONIC TWIN PREGNANCY details.pptx
CASE PRESENTATION1.pdf bipolar disorder in which both mania and depression h...
ee5a0480-e162-45e0-bf18-eaba79c6cfae.pptx
mycobacterial infection tuberculosis (TB)
Skeletal System presentation for high school
Pharmaco vigilance for BAMS according to NCISM
Anaesthetic management of Congenital heart diseases
Maternal and child health. The normal new born.pptx

Tech Refresh - Cybersecurity in Healthcare

  • 1. 1 Cybersecurity in Healthcare Steven Goriah, DHA, CHCIO, FACHE, CISM Vice President Information Technology CISO Westchester Medical Center Health Network
  • 3. • 82 % of hospitals reported a significant security incidents in the past 12 Months • E-mail (e.g., phishing email) continues to be the most frequently reported initial point of compromise (69%) n=166 • E-mail can contain a wealth of information, including sensitive patient clinical and financial information 3 2019 HIMSS CYBERSECURITY SURVEY
  • 4. LifeBridge Health • The attack potentially breached the data of around 500,000 patients. Health Management Concepts • This ransomware attack fast became a full-blown data breach over 500,000 patients. UnityPoint Health • Two security breaches last year. The second compromised the data of 1.4 million patients. 4 Largest Healthcare Data Breaches of 2018
  • 5. It’s all about Risk Management. Which is riskier? “More people are killed every year by pigs than by sharks, which shows you how good we are at evaluating risk.”
  • 6. How do we approach such a complex situation for Healthcare? 6
  • 7. What is the Role of a Framework? • Provides a common language and systematic methodology for managing cybersecurity risk. • Includes activities to be incorporated in a cybersecurity program that can be tailored to meet any organization’s needs. • Designed to complement, not replace, an organization's cybersecurity program and risk management processes. 7
  • 8. • ISO 27000 Series • CObIT 5 • NIST SP 800 Series • HITRUST v9 Usable Cybersecurity Frameworks (most popular of the more than 200 available) 8 HITURST CSFcontains 149 security and privacy controls parsed amongst 46 control objectives within 14 broad control categories
  • 9. 9 Choose a Suitable Framework Wisely
  • 10. Choose a Framework (one or more) – The Only Bad Choice is No Choice! 10
  • 11. High-level HITRUST and NIST CSF Comparison HITRUST NIST Purpose A scalable, prescriptive and certifiable framework specific created in response to multiple compliance requirements, many of which are subject to interpretation In response to the President’s Executive Order 13636, Improving Critical Infrastructure Cybersecurity (2013). It’s a framework – based on existing standards, guidelines, and practices - for reducing cyber risks to critical infrastructure Industry Healthcare-specific Applies broadly across multiple industries Objective A framework that can be leveraged to communicate, compare and benchmark cybersecurity AND can be used for certification A framework that can be leveraged to communicate, compare, and benchmark cyber security Illustrative Sources ISO, HIPAA, NIST, CMS, MARS-E, IRS, PCI, CSA-CCM, state laws, etc. COBIT, NIST, ISA, CCS, ISO, HIPAA (new) 11
  • 12. HITRUST CSF and NIST CsF • HITRUST CSF and NIST CsF are complementary frameworks • While an organization can leverage either frameworks on its own, there is value in • Leveraging HITRUST as the HPH standard and • Using the NIST CsF being the mechanism to communicate maturity and comparison between industries 12
  • 13. 13 Comparison of ISO, NIST, and HITRUST Footnotes on next page (published by HITRUST in 2014)
  • 14. Implementation Advice • Allow for flexibility in implementation and bring in concepts of maturity models • Reflect how your organization will implement core functions and manage its risk • Be progressive, building on previous tiers • Define the characteristics at the organization level and determine how a category will be implemented 14
  • 15. Get the Board Involved • Audit and Compliance Committee • IT Subcommittee of the Board • Finance Committee 15 but not too involved…
  • 16. Keep the Reporting Simple But Consistent… • Use terms that Board members can understand • Should be easy enough to understand without explanations • Provide the explanations • Propose a model and get the Chair’s endorsement • Use terms broad enough to accommodate evolving needs • Avoid the temptation to change • Use graphs and iconography that work in color and black & white 16
  • 17. • Communicate, but test for comprehension at every step with every stakeholder group • Plan and ADJUST • Clarify Roles and ADJUST • Eliminate Ambiguity and ADJUST • Embrace Accountability • Execute and ADJUST • Continue Praying Be Deliberate 17 and ADJUST
  • 18. Individual/Body CIO CMIO ISGC Task Support Implementation of EHR R A I Engage physicians in information system selection/development A R C Manage vendors R C I Negotiate contracts R C I Design clinical systems/review clinical processes C R I Build clinical systems/change workflow processes R C I Test clinical systems/workflow changes R C I Validate (testing with users) clinical systems/workflow changes C R I Develop training curriculum (design education tools and content) I R I Deploy training (deliver education) R C I Select end-user devices C R I Govern Information Management activities A C R Participate in Executive Leadership R I C Report to the Institutional Board R C I Participate in HIE activities C C R Responsible for performance of task Assists responsible person, may do bulk of work Consulted - opinions are sought Informed - kept up-to-date on progress RACI Matrix for CIO, CMIO, and IS Governance Council (ISGC) mm/dd/yyyy Role Clarification and Responsibility is Essential – RACI Diagram 18
  • 19. • Many positive advances are occurring in healthcare cybersecurity practices. • Cybersecurity professionals have more resources and budget available to help ensure that their organizations stay ahead of the threats. • Cybersecurity professionals feel empowered to drive change in healthcare organizations 19 2019 HIMSS CYBERSECURITY SURVEY
  • 20. 20 It’s critical to create a culture of privacy and security.