Improving Cybersecurity in the Health Care Industry: Report of the Health Care Industry Cybersecurity Task Force - Risks to Medical Devices and IT Systems, Working in the Open Culture of Health Care

Nonfiction, Health & Well Being, Medical, Reference, Hospital Administration & Care, Patient Care, Health Care Delivery
Cover of the book Improving Cybersecurity in the Health Care Industry: Report of the Health Care Industry Cybersecurity Task Force - Risks to Medical Devices and IT Systems, Working in the Open Culture of Health Care by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463951088
Publisher: Progressive Management Publication: June 3, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463951088
Publisher: Progressive Management
Publication: June 3, 2018
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction.

Now more than ever, all health care delivery organizations have a greater responsibility to secure their systems, medical devices, and patient data. Most health care organizations face significant resource constraints as operating margins can be below one percent. Many organizations cannot afford to retain in-house information security personnel, or designate an information technology (IT) staff member with cybersecurity as a collateral duty. These organizations often lack the infrastructure to identify and track threats, the capacity to analyze and translate the threat data they receive into actionable information, and the capability to act on that information. Many organizations also have not crossed the digital divide in not having the technology resources and expertise to address current and emerging cybersecurity threats. These organizations may not know that they have experienced an attack until long after it has occurred. Additionally, both large and small health care delivery organizations struggle with numerous unsupported legacy systems that cannot easily be replaced (hardware, software and operating systems) with large numbers of vulnerabilities and few modern countermeasures. Industry will need to dramatically reduce the use of less defensible legacy and unsupported products, and more effectively reduce risk in future products through robust development and support strategies.

To identify a wide range of threats that affect the health care industry, the Task Force relied on information gathered during public meetings, briefings and consultations with experts on a variety of topics across health care and other critical infrastructure sectors, internal Task Force meetings, and responses to blog posts. The Task Force's activities resulted in the development of recommendations that will collectively help increase security across the health care industry. The Task Force identified six high-level imperatives by which to organize its recommendations and action items. The imperatives are: 1. Define and streamline leadership, governance, and expectations for health care industry cybersecurity. 2. Increase the security and resilience of medical devices and health IT. 3. Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities. 4. Increase health care industry readiness through improved cybersecurity awareness and education. 5. Identify mechanisms to protect research and development efforts and intellectual property from attacks or exposure. 6. Improve information sharing of industry threats, weaknesses, and mitigations.

Members of the Task Force * Executive Summary * I. Health Care Industry Cybersecurity Task Force Charge and Approach * II. The State of Cybersecurity within the Health Care Industry * III. Risks across the Health Care Industry * IV. Imperatives, Recommendations, and Action Items * Imperative 1. Define and streamline leadership, governance, and expectations for health care industry cybersecurity * Imperative 2. Increase the security and resilience of medical devices and health IT * Imperative 3. Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities * Imperative 4. Increase health care industry readiness through improved cybersecurity awareness and education * Imperative 5. Identify mechanisms to protect R&D efforts and intellectual property from attacks or exposure * Imperative 6. Improve information sharing of industry threats, risks, and mitigations * V. Future Considerations

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction.

Now more than ever, all health care delivery organizations have a greater responsibility to secure their systems, medical devices, and patient data. Most health care organizations face significant resource constraints as operating margins can be below one percent. Many organizations cannot afford to retain in-house information security personnel, or designate an information technology (IT) staff member with cybersecurity as a collateral duty. These organizations often lack the infrastructure to identify and track threats, the capacity to analyze and translate the threat data they receive into actionable information, and the capability to act on that information. Many organizations also have not crossed the digital divide in not having the technology resources and expertise to address current and emerging cybersecurity threats. These organizations may not know that they have experienced an attack until long after it has occurred. Additionally, both large and small health care delivery organizations struggle with numerous unsupported legacy systems that cannot easily be replaced (hardware, software and operating systems) with large numbers of vulnerabilities and few modern countermeasures. Industry will need to dramatically reduce the use of less defensible legacy and unsupported products, and more effectively reduce risk in future products through robust development and support strategies.

To identify a wide range of threats that affect the health care industry, the Task Force relied on information gathered during public meetings, briefings and consultations with experts on a variety of topics across health care and other critical infrastructure sectors, internal Task Force meetings, and responses to blog posts. The Task Force's activities resulted in the development of recommendations that will collectively help increase security across the health care industry. The Task Force identified six high-level imperatives by which to organize its recommendations and action items. The imperatives are: 1. Define and streamline leadership, governance, and expectations for health care industry cybersecurity. 2. Increase the security and resilience of medical devices and health IT. 3. Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities. 4. Increase health care industry readiness through improved cybersecurity awareness and education. 5. Identify mechanisms to protect research and development efforts and intellectual property from attacks or exposure. 6. Improve information sharing of industry threats, weaknesses, and mitigations.

Members of the Task Force * Executive Summary * I. Health Care Industry Cybersecurity Task Force Charge and Approach * II. The State of Cybersecurity within the Health Care Industry * III. Risks across the Health Care Industry * IV. Imperatives, Recommendations, and Action Items * Imperative 1. Define and streamline leadership, governance, and expectations for health care industry cybersecurity * Imperative 2. Increase the security and resilience of medical devices and health IT * Imperative 3. Develop the health care workforce capacity necessary to prioritize and ensure cybersecurity awareness and technical capabilities * Imperative 4. Increase health care industry readiness through improved cybersecurity awareness and education * Imperative 5. Identify mechanisms to protect R&D efforts and intellectual property from attacks or exposure * Imperative 6. Improve information sharing of industry threats, risks, and mitigations * V. Future Considerations

More books from Progressive Management

Cover of the book Rearming for the Cold War 1945-1960: History of Acquisition in the Department of Defense - Nuclear Weapons, Missiles and Rockets, Nuclear Navy, Air Force Bombers, Atomic Army by Progressive Management
Cover of the book Gangs and Crime in America: Organized Crime, Combating Central American Gangs, Latin Kings, Jamaican Posse, Mara Salvatrucha (MS-13),18th Street, Hell's Angels, Los Zetas, El Salvador and Guatemala by Progressive Management
Cover of the book Commanding an Air Force Squadron in the 21st Century: A Practical Guide of Tips and Techniques for Today's Squadron Commander - Leadership, Unit Cohesion, Morale, Inspections, Art of Command, Families by Progressive Management
Cover of the book SOF (Special Operations Forces) Power Workshop: A Way Forward for Special Operations Theory and Strategic Art - Environment and Warfare, Development of Unified Theory, Challenges and Obstacles by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Opposing Force OPFOR Worldwide Equipment Guide (WEG) Part 7 - Ground Systems - Engineers, Mines, Command and Control, Information Warfare, Chemical, Biological, Nuclear by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Afoot in the Desert, Desert Survival, Deserts of the World Marine Corps Field Manual - FMFRP 0-53 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Essential Guide to Military Desertion and AWOL: Overview, Review of Professional Literature for Commanders, DoD Instruction on Unauthorized Absence, Army Regulation, Navy Rules by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Opposing Force OPFOR Worldwide Equipment Guide (WEG) Part 8 - Ground Systems - Logistics, Obscurants and Flame, Improvised Systems, Upgrades, Countermeasures by Progressive Management
Cover of the book U.S. Marines in Iraq, 2004-2005: Into the Fray - U.S. Marines in the Global War on Terrorism, Al-Anbar, Al-Fallujah Battles, Protecting Self Rule and the Emerging Iraq, Chronology of Events by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Apollo 16 Technical Crew Debriefing with Unique Observations about the Fifth Lunar Mission - Astronauts Young, Duke and Mattingly by Progressive Management
Cover of the book Forging the Sword: Defense Production During the Cold War - DoD Industrial Facilities, Aircraft, Ammunition, Tank Plants, Shipyards, Reagan Buildup, Redstone, Pine Bluff, Picatinny Arsenal by Progressive Management
Cover of the book History of the Office of the Secretary of Defense, Volume Four, Into the Missile Age 1956-1960: New Look, Suez and Hungary, Shock of Sputnik, IRBM and ICBM, Satellites by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Generating Force Support for Operations (FM 1-01) - The Army's Generating Force, Enabling Strategic Reach (Professional Format Series) by Progressive Management
Cover of the book Directors of Central Intelligence (DCI) as Leaders of the U.S. Intelligence Community, 1946-2005, Central Intelligence Agency (CIA) Report - Dulles, Helms, Colby, Bush, Casey, Webster, Gates, Tenet by Progressive Management
Cover of the book National Defense Intelligence College Paper: Courting a Reluctant Ally - An Evaluation of U.S./UK Naval Intelligence Cooperation, 1935-1941, Franklin Roosevelt, OSS, Commander Ian Fleming by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy