Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science
|
|
- Janis Martin
- 5 years ago
- Views:
Transcription
1 Communicating mhealth Security & Privacy Risks Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science SITH2, Dartmouth College, May 15, 2012 Supported in part by a Sloan Research Fellowship, NSF CNS , HHS 90TR0003/01. Any opinions, findings, and conclusions expressed in this material are those of the authors and do not necessarily reflect the views of the NSF. UNIVERSITY OF MASSACHUSETTS AMHERST Department of Computer Science
2 Correctness is easy. Security is hard. Photo by Kevin Fu 2
3 Disclosures n Support from NSF, HHS, DHS, IOM, Microsoft Research, Symantec, McAfee n Visiting scientist, FDA n Board member, NIST ISPAB n Patent pending technology: Ultra-low power flash memory Zero-power security Hat: zazzle.com n This presentation is based on both my own research and the research of others. None of the opinions, findings, or conclusions necessarily reflect the views of my past or present employers. 3
4 mhealth S&P Risks n Bacon theory of wireless mhealth risks Great benefits Great risks n Risks of complacency, unaccountability Sterile technique for mhealth? Culture change? 4
5 Networking + Wireless! Photos from: Medtronic 5
6 Benefits of Wireless, But... Photo by Kevin Medtronic museum 6
7 Wirelessly Induce Fatal Heart Rhythm MHz MICS band, nominal range several meters n Command shock sends 35 J in ~1 msec to the T-wave n Designed to induce ventricular fibrillation n No RF amplification necessary n [Halperin et al., IEEE Symposium on Security & Privacy 2008] spqr.cs.umass.edu Prof. Kevin Fu mhealth Security & Privacy 7
8 Wireless Makes Everything Better? 8 [Photos: uncyclopedia.wikia.com/wiki/bacon & Cisco & bacondujour.blogspot.com]
9 How significant are intentional, malicious malfunctions in software?
10 The Tylenol Scare of 1982 [Source: trutv crime library] 10
11 21 CFR and Security (a)general. The Food and Drug Administration has the authority under the Federal Food, Drug, and Cosmetic Act (the act) to establish a uniform national requirement for tamper-evident packaging of OTC drug products that will improve the security of OTC drug packaging 11
12 Bad People Do Exist: Vandals 12
13
14 Disease to Malware:Days to Hours Slide from Howie Shrobe and others FluTE: Chao et al., PLoS Computational Biology,
15 Privacy: Wardrobe Malfunctions 15
16 Medical Device Cybersecurity 1. Implantable medical devices should be trustworthy 2. Improved security will enable medical device innovation Physicians should their wash hands. Doctors are gentlemen and therefore their hands are always clean. Dr. Ignaz Semmelweis Dr. Charles Meigs
17 Medical Device Cybersecurity 1. Implantable medical devices should be trustworthy 2. Improved security will enable medical device innovation Physicians Medical should devices their should wash be secure. hands. Doctors are You re gentlemen so negative. and therefore There are their no security hands are always problems. clean. Dr. Ignaz Semmelweis Dr. Charles Meigs
Archimedes Center for Medical Device Security. Supported in part by NSF CNS , CNS , HHS 90TR0003/01, and a Sloan Research Fellowship.
Archimedes Center for Medical Device Security Kevin Fu, Ph.D. Associate Professor Security & Privacy Research Group Computer Science & Engineering University of Michigan http://secure-medicine.org/ Supported
More informationPanel on Economic Incentives for Medical Device Cybersecurity
Panel on Economic Incentives for Medical Device Cybersecurity Wednesday, February 1, 2012 9:00 am - 10:30 am Marriott Residence Inn, 1199 Vermont Avenue NW Brian Fitzgerald Deputy Director, Division of
More informationMedical Device Cybersecurity: FDA Perspective
Medical Device Cybersecurity: FDA Perspective Suzanne B. Schwartz MD, MBA Associate Director for Science and Strategic Partnerships Office of the Center Director (OCD) Center for Devices and Radiological
More informationState of US Telemedicine Industry
State of US Telemedicine Industry Prepared for ETSI Sophia Antipolis, France 6 May 2014 Agenda Current State of Healthcare in the US Industry dynamics Adoption of telemedicine/mhealth/digital health Healthcare
More informationMEDICAL DEVICE SECURITY. A Focus on Patient Safety February, 2018
MEDICAL DEVICE SECURITY A Focus on Patient Safety February, 2018 WHO I AM Adam Brand I Am The Cavalry Director Privacy and Security, Protiviti Focus on Medical Device Healthcare Security Custom EEG Manufacturing,
More informationSome example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington
Some example UW security lab projects, related to emerging technologies Tadayoshi Kohno CSE 484, University of Washington Wireless Implantable Medical Devices Computation and wireless capabilities lead
More informationTeam Science in mhealth Research
Team Science in mhealth Research Sherry Pagoto, PhD Co-Founder, UMass Center of mhealth and Social Media Associate Professor of Medicine Division of Preventive and Behavioral Medicine University of Massachusetts
More informationMementos. pmnr ä~äoê~íoêó. System Support for Long-Running Computations on RFID-Scale Devices
Mementos pmnr ä~äoê~íoêó System Support for Long-Running Computations on RFID-Scale Devices Benjamin Ransford*, UMass Amherst Jacob Sorber, Dartmouth College Kevin Fu, UMass Amherst http://spqr.cs.umass.edu/mementos
More informationFDA & Medical Device Cybersecurity
FDA & Medical Device Cybersecurity Closing Keynote, February 19, 2017 Suzanne B. Schwartz, M.D., MBA Associate Director for Science & Strategic Partnerships Center for Devices and Radiological Health US
More informationCS Computer Security in the Physical World:
CS 598 - Computer Security in the Physical World: Project Submission #1 & Pacemakers and Implantable Cardiac Defibrillators Professor Adam Bates Fall 2016 Oct 4th Deliverable Choose one of your project
More information1
April 21, 2016 Dr. Suzanne Schwartz Center for Devices and Radiological Health Food and Drug Administration 10903 New Hampshire Ave., Bldg. 66, Rm. 5418 Silver Spring, MD 20993-0002 Dear Dr. Suzanne Schwartz,
More informationSecurity and Smartness for Medical Sensor Networks in Personalized Mobile Health Systems
Security and Smartness for Medical Sensor Networks in Personalized Mobile Health Systems I. Nikolaevskiy, D. Korzun, Andrei Gurtov Aalto University 23.04.2014 FRUCT 15 Motivation for Medical ICT Population
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationIn addition, below we offer our responses to the questions posed in the Federal Register Notice announcing the availability of the Draft Guidance:
701 Pennsylvania Avenue, NW Suite 800 Washington, D.C. 20004 2654 Tel: 202 783 8700 Fax: 202 783 8750 www.advamed.org September 24, 2015 Division of Dockets Management (HFA305) Food and Drug Administration
More informationKostas Giokas MONITORING OF COMPLIANCE ON AN INDIVIDUAL TREATMENT THROUGH MOBILE INNOVATIONS
Kostas Giokas MONITORING OF COMPLIANCE ON AN INDIVIDUAL TREATMENT THROUGH MOBILE INNOVATIONS AIM RESEARCH TEAM BIOMEDICAL ENGINEERING LABORATORY NATIONAL TECHNICAL UNIVERSITY OF ATHENS WHAT IS MHEALTH?
More informationFDA CDRH perspective on new technologies in inhaler products
2017 IPAC RS/ISAM Joint Workshop New Frontiers in Inhalation Technology FDA CDRH perspective on new technologies in inhaler products Linda Ricci Associate Director ODE DH Office of Device Evaluation Center
More informationProtecting Global Medical Telemetry Infrastructure
Protecting Global Medical Telemetry Infrastructure Benessa Defend, Mastooreh Salajegheh, Kevin Fu, and Sozo Inoue University of Massachusetts Amherst and Kyushu University {defend,negin,kevinfu}@cs.umass.edu,
More informationSecrets of successful medical device connectivity. Agenda 4/5/17. * The secrets:
Secrets of successful medical device connectivity Bill Saltzstein Code Playbook Vancouver 2017 Agenda * The secrets: * All medical devices shall be connected * You shall understand the requirements requirements
More informationMobile Health Apps: A Primer
Mobile Health Apps: A Primer René Quashie Senior Counsel Epstein Becker Green July 2014 2014 Epstein Becker & Green, P.C. All Rights Reserved. ebglaw.com 1 Agenda 1. mhealth Publishers 2. Status of the
More informationMEDICAL DEVICE CYBERSECURITY: FDA APPROACH
MEDICAL DEVICE CYBERSECURITY: FDA APPROACH CYBERMED SUMMIT JUNE 9TH, 2017 SUZANNE B. SCHWARTZ, MD, MBA ASSOCIATE DIRECTOR FOR SCIENCE & STRATEGIC PARTNERSHIPS CENTER FOR DEVICES AND RADIOLOGICAL HEALTH
More informationThe Human Touch: Develop a Patient-Centric Injection Device
The Human Touch: Develop a Patient-Centric Injection Device Molly Story, PhD 27 September 2017 Photo credits: Why should we care about being patient-centric? The FDA tells us: Our drugs must be safe and
More informationBelow we ve highlighted several of the key points from the final guidance document.
On September 6, 2017, the Food and Drug Administration (FDA or the Agency) released its final guidance document, Design Considerations and Pre-Market Submission Recommendations for Interoperable Medical
More informationThe Evolving Role of Primary Care and Technology in Cardiology
The Evolving Role of Primary Care and Technology in Cardiology Peter Tilkemeier, MD, MMM, FACC Chair, Department of Medicine Greenville Health System Professor, University of South Carolina School of Medicine
More informationIntrinsically Secure, Open, and Safe Cyber physically Enabled, Life critical Essential Services (ISOSCELES) Adventium Labs
Intrinsically Secure, Open, and Safe Cyber physically Enabled, Life critical Essential Services (ISOSCELES) ACSAC 2016 Todd Carpenter Chief Engineer todd.carpenter@adventiumlabs.com This material is based
More informationBriefing on Report: Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA HL7 Mobile Health Workgroup
Briefing on Report: Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA HL7 Mobile Health Workgroup September 21, 2016 Devi Mehta, JD, MPH, Privacy Policy Analyst,
More informationCenter for Devices and Radiological Health Premarket Approval Application Critical to Quality
This document is scheduled to be published in the Federal Register on 09/12/2017 and available online at https://federalregister.gov/d/2017-19258, and on FDsys.gov 4164-01-P DEPARTMENT OF HEALTH AND HUMAN
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More information14th AMC Security & Privacy Conference June 12, 2018
Emerging Security & Privacy Issues Arising From the Proliferation of Devices in the Health Care Workplace 14th AMC Security & Privacy Conference June 12, 2018 SPEAKERS 2 Robert C. Van Arnam Partner & Chair,
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationSmartphone Applications as Adjuncts to Medical Devices: A Case Study in mhealth Regulation
The image part with relationship ID rid2 was not found in the file. The image part with relationship ID rid14 was not found in the file. Smartphone Applications as Adjuncts to Medical Devices: A Case Study
More information10/18/2016. Preparing Your Organization for a HHS OIG Information Security Audit. Models for Risk Assessment
Preparing Your Organization for a HHS OIG Information Security Audit David Holtzman, JD, CIPP/G CynergisTek, Inc. Brian C. Johnson, CPA, CISA HHS OIG Section 1: Models for Risk Assessment Section 2: Preparing
More informationCyber Risk and Networked Medical Devices
Cyber Risk and Networked Medical Devices Hot Topics Deloitte & Touche LLP February 2016 Copyright Scottsdale Institute 2016. All Rights Reserved. No part of this document may be reproduced or shared with
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationA Wireless Identification System to Assist Sight- Constrained People
A Wireless Identification System to Assist Sight- Constrained People Dec06-06 5 December 2006 Client: Mr. Curtis Chong Iowa Department for the Blind Faculty Advisor: Dr. Zhengdao Wang Team: Jerad Harmsen
More informationThe Next Frontier in Medical Device Security
The Next Frontier in Medical Device Security Session #76, February 21, 2017 Denise Anderson, President, NH-ISAC Dr. Dale Nordenberg, Executive Director, MDISS 1 Speaker Introduction Denise Anderson, MBA
More informationHow mhealth s Mobile-to-Mobile Platform can be Translated to the Medical Home Model
How mhealth s Mobile-to-Mobile Platform can be Translated to the Medical Home Model WILLIAM C. THORNBURY, M.D. FAAFP Founder, mevisit Technologies (on all master slides) Disclosure Statement Dr. Thornbury
More informationIntroduction to EZ430 RF2500
Michigan State University Introduction to EZ430 RF2500 ECE480 Design Team 8 Daniel Sun 3/17/2015 Introduction The EZ430 RF2500 is an TI product that allows the user to practice real time control programming
More informationThe Use of Mobile Phones in Health Care Selected US Army Medical Department Projects and Research Focus
The Use of Mobile Phones in Health Care Selected US Army Medical Department Projects and Research Focus Colonel Ronald Poropatich, MD United States Army Medical Research and Materiel Command (USAMRMC)
More informationAn Update on the Activities and Progress of the mhealth Regulatory Coalition Prepared for the 2011 Medical Device Connectivity Conference
An Update on the Activities and Progress of the mhealth Regulatory Coalition Prepared for the 2011 Medical Device Connectivity Conference Dane Stout The Anson Group September 8, 2011 MRC Background Formed
More informationRegulating Information: Cybersecurity, Internet of Things, & Exploding Rules. David Bodenheimer Evan Wolff Kate Growley
Regulating Information: Cybersecurity, Internet of Things, & Exploding Rules David Bodenheimer Evan Wolff Kate Growley Regulating Information The Internet of Things: Peering into the Future Cybersecurity
More informationSuzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA
Preventing the Unthinkable: Issues in MedTech Cyber Security Trends and Policies MassMEDIC Cambridge, Mass Thursday Oct 1, 2015 Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations &
More informationHIPAA Your Privacy Rights
This Notice Describes How Medical Information About You May Be Used And Disclosed And How You Can Get Access To This Information. Please Review It Carefully. PASS of Atlanta is required by law to keep
More informationMobile Health (mhealth) Applications in a Health Care Environment
Mobile Health (mhealth) Applications in a Health Care Environment Brandon Goulter, Facility Compliance Professional Steven Baruch, Senior Compliance Director Agenda Overview of Mobile Health Applications
More information2015 Annual Convention
2015 Annual Convention Date: Saturday, October 10, 2015 Time: 8:00 am 9:00 am Location: Gaylord National Harbor Resort and Convention Center, Chesapeake 7/8/9 Title: Activity Type: Speaker: Mobile Health
More informationThe MovingLife Project
The MovingLife Project MObile ehealth for the VINdication of Global LIFEstyle change and disease management solutions Stakeholders Conference The MovingLife Roadmaps Brussels 18 April 2013 Alessio Gugliotta
More informationApril 28, Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers Lane, Room 1061 Rockville, MD 20852
701 Pennsylvania Avenue, NW Suite 800 Washington, D.C. 20004 2654 Tel: 202 783 8700 Fax: 202 783 8750 www.advamed.org Division of Dockets Management (HFA-305) Food and Drug Administration 5630 Fishers
More informationDevelopment of a Process Assessment Model for Assessing Security of IT Networks Incorporating Medical Devices against ISO/IEC
Development of a Process Assessment Model for Assessing Security of IT Networks Incorporating Medical Devices against ISO/IEC 15026-4 Anita Finnegan, Fergal Mc Caffery and Gerry Coleman Regulated Software
More informationCompliance. TODAY August Creative passion, collaboration, and soft skills in Compliance
Compliance TODAY August 2016 A PUBLICATION OF THE HEALTH CARE COMPLIANCE ASSOCIATION WWW.HCCA-INFO.ORG Creative passion, collaboration, and soft skills in Compliance an interview with Walter E. Johnson
More informationCelebrating UTSA s National Leadership. Cybersecurity and the. Biosciences. June 5, 2018
Celebrating UTSA s National Leadership Cybersecurity and the Biosciences June 5, 2018 San Antonio s National Leadership in Biomedical Research & Development San Antonio has 3,300+ MDs and PhDs and more
More informationWithdrawal of Notice of Intent to Temporarily Place Mitragynine and 7- AGENCY: Drug Enforcement Administration, Department of Justice
This document is scheduled to be published in the Federal Register on 10/13/2016 and available online at https://federalregister.gov/d/2016-24659, and on FDsys.gov Billing Code 4410-09-P DEPARTMENT OF
More informationEmerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI Web Hull Privacy, Data Protection, & Compliance Advisor
Emerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI 2016 Web Hull Privacy, Data Protection, & Compliance Advisor Web.Hull@icloud.com 1 Topics 1. mhealth Challenges & Landscape 2.
More informationTopics 4/11/2016. Emerging Challenges in mhealth: Keeping Information Safe & Secure. Here s the challenge It s just the beginning of mhealth
Emerging Challenges in mhealth: Keeping Information Safe & Secure HCCA CI 2016 Web Hull Privacy, Data Protection, & Compliance Advisor Web.Hull@icloud.com 1 Topics 1. mhealth Challenges & Landscape 2.
More informationHMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING. Created By:
HMIS (HOMELESS MANAGEMENT INFORMATION SYSTEM) SECURITY AWARENESS TRAINING Created By: Overview The purpose of this presentation is to emphasize the importance of security when using HMIS. Client information
More informationLeading Innovation in Health Care Delivery
Leading Innovation in Health Care Delivery Presented by: Chris Trimble Adjunct Professor Dartmouth College 2015: Chris Trimble. These slides may be freely distributed, with this copyright notice, so long
More informationMedical Device Cybersecurity A Marriage of Safety and Security
Medical Device Cybersecurity A Marriage of Safety and Security 121 st AFDO Annual Education Conference Medical Devices Track June 20 th, 2017 By: Armin Torres, Principal Consultant 1 Cyber Security Overview
More informationApr. 10, Vulnerability disclosure and handling processes strengthen security programs
Joint Comments on "Framework for Improving Critical Infrastructure Cybersecurity" version 1.1 Before the National Institute of Standards and Technology Apr. 10, 2017 We the undersigned companies, civil
More informationNiccolo Machiavelli (1523)
Nothing is more difficult to undertake, more perilous to conduct or more uncertain in its outcome, than to take the lead in introducing a new order of things. For the innovator has for enemies all those
More informationComputer-aided Pre-clinical Trials for Implantable Medical Devices: Test Automation Platform
Computer-aided Pre-clinical Trials for Implantable Medical Devices: Test Automation Platform NSF Summer Undergraduate Fellowship in Sensor Technologies Kevin Volkel, Sunfest Fellow (Electrical Engineering)
More informationMy Heart Skips a Beat Increased Cybersecurity and Issues with Implanted Medical Devices
My Heart Skips a Beat Increased Cybersecurity and Issues with Implanted Medical Devices Mary R. Topfer Jacqueline Cavallaro Harris Beach PLLC 100 Wall Street New York, NY 10005 MTopfer@harrisbeach.com
More informationData Backup and Contingency Planning Procedure
HIPAA Security Procedure HIPAA made Easy Data Backup and Contingency Planning Procedure Please fill in date implemented and updates for your facility: Goal: This document will serve as our back-up storage
More informationE-santé mentale: définitions, enjeux, expériences Paris, 13 Juin 2017
E-santé mentale: définitions, enjeux, expériences Paris, 13 Juin 2017 Questions éthiques en e-santé mentale Kyriaki G. Giota, Chercheuse en psychologie Université de Thessaly, Grèce Dr. Kyriaki Giota,
More information3/3/2017. Medical device security The transition from patient privacy to patient safety. Scott Erven. Who i am. What we ll be covering today
www.pwc.com Medical device security The transition from patient privacy to patient safety Scott Erven Who i am Scott Erven - Managing Director Healthcare Industries Advisory Cybersecurity & Privacy Medical
More informationUse by permission DAN LOHRMANN, CHIEF STRATEGIST & CSO SECURITY MENTOR, INC. SEPTEMBER 6, 2017
DAN LOHRMANN, CHIEF STRATEGIST & CSO SECURITY MENTOR, INC. SEPTEMBER 6, 2017 WHAT S ON THE AGENDA... INTRO ON CULTURE CYBER THREAT TRENDS GLOBAL CHALLENGE IOT + OTHER REGULATIONS COMING THREE STORIES HOW
More informationCybersecurity for Medical Device Manufacturers: Ensuring Safety and Functionality
Cybersecurity for Medical Device Manufacturers: Ensuring Safety and Functionality Fubin Wu and Sherman Eagles The need for effective cybersecurity to ensure safety and functionality of networks used for
More informationMedical device security The transition from patient privacy to patient safety
www.pwc.com Medical device security The transition from patient privacy to patient safety Scott Erven Who i am Scott Erven - Managing Director Healthcare Industries Advisory Cybersecurity & Privacy Medical
More informationCertification Commission for Healthcare Information Technology. CCHIT A Catalyst for EHR Adoption
Certification Commission for Healthcare Information Technology CCHIT A Catalyst for EHR Adoption Alisa Ray, Executive Director, CCHIT Sarah Corley, MD, Chief Medical Officer, NextGen Healthcare Systems;
More informationOff-label unsolicited requests How to respond?
Off-label unsolicited requests How to Due to the rapid growth of the internet and social media tools, it is easier for both consumers and healthcare professionals to quickly seek information about medical
More informationWIRELESS MOBILE MEDICAL DEVICES
Abstract WIRELESS MOBILE MEDICAL DEVICES Rapid developments in wireless technologies have ushered in a new era of medical devices that are improving patient quality-of-life and lowering costs for both
More informationClinical and ICT Cybersecurity Overview and Cases A242-3
Clinical and ICT Cybersecurity Overview and Cases A242-3 Elliot B. Sloane, PhD, CCE - Elected Fellow of ACCE, AIMBE, and HIMSS President and Founder Center for Healthcare Information Research and Policy,
More informationFederal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats
May 20, 2015 Georgetown University Law Center Federal Initiatives to Protect Controlled Unclassified Information in Nonfederal Information Systems Against Cyber Threats Robert S. Metzger Rogers Joseph
More informationWITS 2017 Panel Discussion: Government Academia Collaboration
WITS 2017 Panel Discussion: Government Academia Collaboration Panelists: Sudip Bhattacharjee, University of Connecticut Paul Pavlou, Temple University Sudha Ram, University of Arizona Ritu Agrawal, University
More informationEmbedded Systems. Cristian Rotariu
Embedded Systems Cristian Rotariu Dept. of of Biomedical Sciences Grigore T Popa University of Medicine and Pharmacy of Iasi, Romania cristian.rotariu@bioinginerie.ro May 2016 Introduction An embedded
More informationContinuity of Care Document Redesign
Continuity of Care Document Redesign Submitted to the Office of the National Coordinator for Health Information Technology via healthdesign.challenge.gov Created by Jeff Flahaven, Senior UX Designer 12/1/2012
More informationHIPAA Highlights and Impact to your Telehealth Program. Wednesday, Sept 27, 2017
HIPAA Highlights and Impact to your Telehealth Program Wednesday, Sept 27, 2017 Susan Clarke, HCISPP (ISC) 2 certified Healthcare Information Security and Privacy Practitioner. 15+ years of Healthcare
More informationPrivacy and Security in the Age of Meaningful Use
Privacy and Security in the Age of Meaningful Use David S. Finn Health IT Officer Lewis Etheridge Principal Systems Engineer, Symantec Healthcare Privacy & Security in the Age of Meaningful Use SYMANTEC
More informationModeling Factors Associated with Healthcare Data Breaches. Session #155, March 3, 2018 Dr. Alex McLeod, Dr. Diane Dolezel, Texas State University
Modeling Factors Associated with Healthcare Data Breaches Session #155, March 3, 2018 Dr. Alex McLeod, Dr. Diane Dolezel, Texas State University 1 Conflict of Interest Alex McLeod, PhD Diane, Dolezel,
More informationThe Shape of Things to Come Medical Devices and The Internet of Things (IoT)
The Shape of Things to Come Medical Devices and The Internet of Things (IoT) SLA Pharmaceutical & Health Technology Division Annual Spring Meeting 2017 Susan Z Keckler Senior Manager Medical Communications
More informationPOSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS
POSTMARKET MANAGEMENT OF CYBERSECURITY IN MEDICAL DEVICES FINAL GUIDANCE MARCH 29, 2017 14TH ANNUAL MEDICAL DEVICE QUALITY CONGRESS 1 Fact vs. Myth Let s Play: Fact vs. Myth The FDA is the federal entity
More informationImportant Medical Device Advisory
Important Medical Device Advisory Battery Performance Alert and Cybersecurity Firmware Updates for Certain ICD & CRT-D Devices April 16, 2018 Dear Doctor, As part of a planned series of system updates
More informationDesignated Cyber Security Protection Solution for Medical Devices
Designated Cyber Security Protection Solution for Medical s The Challenge Types of Cyber Attacks Against In recent years, cyber threats have become Medical s increasingly sophisticated in terms of attack
More informationConfiguring LATITUDE NXT Wave Communicators. Bottom View
A Closer Look SUMMARY Boston Scientific s LATITUDE NXT Patient Management System enables a clinician to periodically monitor patient and device information remotely via a LATITUDE NXT Wave Communicator
More informationA Brief Chronology of Medical Device Security
A Brief Chronology of Medical Device Security DOI:10.1145/2890488 With the implantation of software-driven devices comes unique privacy and security threats to the human body. BY A.J. BURNS, M. ERIC JOHNSON,
More informationHIPAA Risk Assessment: Been There... Should ve Done It the First Time
HIPAA Risk Assessment: Been There... Should ve Done It the First Time April 20 & 21, 2012 David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec 1 Agenda 1 2 3 4 5 A little background... Well, a
More informationEnterprise Cybersecurity Best Practices Part Number MAN Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationHITRUST Common Security Framework - Are you prepared?
ALLINIAL HITRUST Common Security Framework - Are you prepared? Michael Kanarellis, HITRUST CCSFP May 17, 2017 MEMBER OF PKF ALLINIAL NORTH GLOBAL, AMERICA, AN ASSOCIATION AN OF LEGALLY OF LEGALLY INDEPENDENT
More informationEscalated Threats to PHI Require a New Approach to Privacy and Security Wednesday, March 2, 2016
Escalated Threats to PHI Require a New Approach to Privacy and Security Wednesday, March 2, 2016 Kurt J. Long, CEO & Founder, FairWarning, Inc. Robert Rost, IT Operations Director of Defensive Services,
More informationInternet of Things. Reply. Sept 2015
Internet of Things Reply Sept 2015 2 IoT Definition A network of networks of uniquely identifiable end points (or things) that communicate without human interaction (by either wired or wireless access)
More informationInformation Governance, the Next Evolution of Privacy and Security
Information Governance, the Next Evolution of Privacy and Security Katherine Downing, MA, RHIA, CHPS, PMP Sr. Director AHIMA IG Advisors Follow me @HIPAAQueen 2017 2017 Objectives Part Part I IG Topic
More informationRunning head: Personal Medical Devices 1. Personal Medical Devices. Ann Funk. East Carolina University
Running head: Personal Medical Devices 1 Personal Medical Devices Ann Funk East Carolina University Personal Medical Devices 2 ABSTRACT Technology in any field has been growing at a rapid pace, but one
More informationCybersecurity and Hospitals: A Board Perspective
Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,
More informationEuroRec Functional Statements Repository. EHR-QTN Workshop Vilnius, January 26, 2011 Dr. Jos Devlies, Belgium
EuroRec Functional Statements Repository EHR-QTN Workshop Vilnius, January 26, 2011 Dr. Jos Devlies, Belgium Health IT has a great potential To increase efficiency of care by Reducing useless and duplicated
More informationResearch Report. Radio Frequency Identification Devices (RFIDs) Effect of RFIDs on lifesaving equipment
Research Report Radio Frequency Identification Devices (RFIDs) Effect of RFIDs on lifesaving equipment Background It has been suggested in the Journal of the Medical Association that lifesaving equipment
More informationTechnology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014
Technology Workshop HIPAA Security Risk Assessment: What s Next? January 9, 2014 Welcome! Thank you for joining us today. In today s call we ll cover the Security Assessment and next steps. If you want
More informationICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist
ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist What is ICT Supply Chain Risk Management? Information and Communication Technology (ICT) products are assembled,
More informationMobile Health and Remote Monitoring in the Pharmacy
Mobile Health and Remote Monitoring in the Pharmacy JOEY MAT TINGLY, PHARMD, MBA Speaker Contact and Disclosure Joey Mattingly, PharmD, MBA Assistant Professor Department of Pharmacy Practice & Science
More informationIs Your Compliance Strategy Putting Your Business at Risk?
Is Your Compliance Strategy Putting Your Business at Risk? January 20, 2015 2015 NASDAQ-LISTED: EGHT Today s Speakers Michael McAlpen Exec. Dir. of Security & Compliance, 8x8, Inc. David Leach Business
More informationSpectraPulse Ultra Wideband Wireless Microphone System
SpectraPulse Ultra Wideband Wireless Microphone System Wireless XLR Desk Stand Set-up and Operation 2 3 This device complies with Part 15 of the FCC rules. Operation is subject to the following conditions:
More informationSecurity of Safety-Critical Devices
1 Security of Safety-Critical Devices Frankie Catota and Adam Durity April 8, 2014 Outline Introduction Medical devices Risks Defense Approaches Perception Vehicle safety Other safety-critical areas Economics
More informationImplementing and Enforcing the HIPAA Security Rule
Implementing and Enforcing the HIPAA Security Rule John Parmigiani National Practice Director Regulatory and Compliance Services CTG HealthCare Solutions, Inc. Introductions Final Security Rule How we
More information