managing cybersecurity risk in the emerging healthcare eco-system leslie sistla director, technology...

21
Managing Cybersecurity Risk in the Emerging Healthcare Eco-System Leslie Sistla Director, Technology Strategy, Worldwide Health Industry - Microsoft Richard Seiersen, GM Cyber Security & Privacy- GE Healthcare January 5, 2015

Upload: eugene-hubbard

Post on 22-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Managing Cybersecurity Risk in the Emerging Healthcare Eco-SystemLeslie Sistla Director, Technology Strategy, Worldwide Health Industry - MicrosoftRichard Seiersen, GM Cyber Security & Privacy- GE HealthcareJanuary 5, 2015

2

©2015 General Electric Company – All rights reserved.

The results expressed in this document may not be applicable to a particular site or installation and individual results may vary. This document and its contents are provided to you for informational purposes only and do not constitute a representation, warranty or performance guarantee. GE disclaims liability for any loss, which may arise from reliance on or use of information, contained in this document. All illustrations are provided as fictional examples only. Your product features and configuration may be different than those shown. Information contained herein is proprietary to GE. No part of this publication may be reproduced for any purpose without written permission of GE.

DESCRIPTIONS OF FUTURE FUNCTIONALITY REFLECT CURRENT PRODUCT DIRECTION, ARE FOR INFORMATIONAL PURPOSES ONLY AND DO NOT CONSTITUTE A COMMITMENT TO PROVIDE SPECIFIC FUNCTIONALITY. TIMING AND AVAILABILITY REMAIN AT GE’S DISCRETION AND ARE SUBJECT TO CHANGE AND APPLICABLE REGULATORY CLEARANCE.

GE, the GE Monogram, Centricity, and imagination at work are trademarks of General Electric Company.

All other product names and logos are trademarks or registered trademarks of their respective companies.

Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries.

General Electric Company, by and through its GE Healthcare division.

3

The content of this presentation represents the views of the author and presenters.

GE, the GE Monogram, Centricity and Imagination at Work are trademarks of General Electric Company.

4

Agenda

• Speaker Introductions• What are healthcare’s cyber security risks?• What is the “Emerging Healthcare Eco-

System”?• How do we manage risks in the eco-system?• Microsoft’s Trustworthy Computing Initiative

5

Speaker Introductions

 

 

Richard has ~20 years experience in Cyber Security. Most recently, he was the Director of Cyber Security for Kaiser Permanente and prior to that he held leadership roles in several silicon valley security start-ups. Richard is passionate about analytics and the role it can play in cyber security. He led one of the industries first data science teams focused on advanced persistent threat detection as well as the application of stream analytics to “data loss prevention”. He is currently co-authoring a book on cyber analytics called “How To Measure Anything in Cybersecurity Risk” (2016 Wiley & Sons).

Richard Seiersen: GM Cyber Security and Privacy, GE Healthcare

Leslie has over 20 years experience in the healthcare/technology industry. As the industry technology strategist for the WW Public Sector-Health, Leslie is responsible for guiding the evolution of a growing ecosystem of enterprise solutions spanning a wide range of integrated health management systems, cloud, device management, and service lifecycle management/delivery in collaboration with customers, partners, industry organizations, and Microsoft product groups.

Leslie Sistla, Director, Technology Strategy | Worldwide Health Industry

6

What Are Healthcare’s Cybersecurity Risks?

Media Feeding Cyber Risk Awareness

FDA, facing cybersecurity threats, tightens medical-device standards

Cybersecurity Risk Example

PublicCloud

9

What Is The Emerging Healthcare Eco-System

1010

Medical Technology

Support Network Multiple Institution

Data Sharing

Multi-Vendor Public Cloud

Emerging Healthcare Eco-System

HospitalNetwork

Data Flows

11

How Do We Manage These Risks?

How Do We Manage These Risks?

Secure By Design Secure By Default Secure In Deploy

13

How Do We Manage These Risks?

Secure By Design Secure By Default Secure In Deploy

14

Partners Make Us Safer: Microsoft’s Trustworthy Computing Initiative

15

16

17

18

19

20

21

Questions