It was great to present to the students and faculty of Pueblo Community College in southern Colorado this past week. The opportunities for those entering the profession from ICT cybersecurity and Healthcare programs like those at PCC are tremendous. My thanks to the faculty for organizing such a great event and to Mike Archuleta, CIO at nearby Mt San Rafael Hospital and fellow Health Informatics and Cybersecurity Luminary who also presented to students.
Healthcare currently faces many unique challenges. It is an industry currently undergoing the most dramatic transformation in its history. Covid-19 ravaged hospital finances and forced providers to pivot from lucrative consults and elective surgeries to pandemic emergency care. This in turn led to the need for another (long overdue) pivot towards telehealth, telemedicine and remote health services as patients were told to avoid hospitals. And of course, this all happened during an industry-wide move towards digital transformation, interoperability, a massive growth in the number of medical and other healthcare IoT devices, and enhanced adoption and deployment of artificial intelligence across the industry, each bringing its own unique security challenges.
As if these transformational challenges were not enough, healthcare is also one of 16 US Critical Infrastructure Sectors under PPD-21, and therefore a potential target of nation-state cyber-warfare attacks against the United States. Given a long history of such attacks by the Russian GRU against other countries and a proclivity by the Kremlin to give carte blanch to Russian Mafia proxies engaged in cybercrime, risks are high that an imminent attack could be launched against US healthcare.
A cyberattack against healthcare is not just an act of cyber extortion or cyber warfare, it risks the lives and safety of patients. When HIT and HIoT systems are not available because of cyberattack, patient morbidity and mortality rates increase, just as they did under the North Korean 'Wannacry' or Russian GRU 'Not Petya' attacks of 2017.
In 2022, the ability of hospitals and other providers to withstand a devastating ransomware or other cyberattack has improved, but providers are in no way impregnable. The industry lacks the material and people resources necessary to mount a full defense. It is therefore vulnerable and in need of supplementary security services. Services that are perhaps best addressed by managed security services providers (MSSPs) and others with deep security domain expertise.
Clinical, technological and security resourcing across healthcare has been stretched to the limit exacerbated by clinicians leaving the industry en-masse and a global shortage of cybersecurity professionals in which healthcare has found it increasingly hard to compete for scarce resources. There has also been a skills mismatch as re-skilling of staff has not kept up with the adoption and implementation of new technologies.
Given the growing challenges of securing healthcare and keeping patients safe, I challenged four leading technology and security executives with these problems at the recent Denver Managed Security Services Forum. Hear their thoughts in the video recording below.
Panelists:
Mike Archuleta, Chief Information Officer, Mt San Rafael Hospital
Kevin Coston, Sr. Technical Security Specialist Healthcare, Microsoft
Randall Frietzsche, Enterprise Chief Information Security Officer, Denver Health
Howard Haile, Chief Information Security Officer, SCL Health
Moderator:
Richard Staynings, Chief Security Strategist, Cylera
Cyber Thoughts is dedicated to the disclosure and discussion of cybersecurity events, trends and concerns impacting the global healthcare and life sciences industry. If this is an area of interest for you, please feel free to subscribe to the email RSS feed below, so you don’t miss anything.
Cyber Thoughts welcomes the participation of readers via the comments section of articles and from qualified guest bloggers, healthcare practitioners and cybersecurity thought leaders.
Original stories and articles may be republished for free provided that attribution is provided to the source and author.
There is a danger that our appetite for new medical technology and digital maturity is allowed to outpace our adoption of cyber maturity leading to huge gaps in our security.
Anatomy of an Attack
Ever wondered how a hacker gets inside your network?
It's remarkably easy. Watch this carefully! (You might want to maximize the window so as not to miss anything).
Hacking IoT is easy!
Still think that your IoT isn’t a risk to your business network and applications.
It’s remarkably easy. Watch this carefully! (You might want to maximize the window so as not to miss anything).
Beekeeper Attack
Share this with elderly friends and relatives. This is how hackers steal all your money.
Translate
A Career in Cybersecurity
Considering your career options and interested in getting into a role in cybersecurity? This may be for you.
Featured Interview
Livestream interview from the HIMSS AsiaPac Conference in Bangkok, Thailand.