Day Two: Monday, May 20, 2019
Monday, May 20th, 2019
Security executives realize that many of the devices were not created with security in mind but to monitor, diagnose and treat patients. The devices create easy entry point for hackers from which they can hop to servers filled with patient data. Healthcare data’s value is much greater than that of a stolen credit card because the accuracy of the data is higher and less changeable. Medical devices have long product life cycles, need continuous availability and may have outdated software, which was not created with the open Internet in mind. The business and clinical teams must work closely together to lessen risk and ensure patient safety.
•Establishing and enforcing policies and standards for medical device procurement
•Capturing a complete asset inventory
•Implementing layers of security- advanced micro segmentation
•Deploying behavior-based solutions
•Balancing security, business and medical priorities