Skip to main content

Search site

Find podcasts, news, articles, webinars, and contributors in one search.

Today in Health IT
Today in Health IT artwork

Top of Mind for Healthcare CIOs #2 – Cybersecurity

Video version

YouTube video will appear here when available.

Watch on YouTube
0:000:00

About This Episode

Top 5 issues facing Healthcare CIOs. Today, #2 Cybersecurity.

Transcript

Speaker 00:00:03 Today in health. Speaker 00:00:03 It, this story is the second item of our top of mind issues for healthcare CEOs. Speaker 00:00:10 Cybersecurity. Speaker 00:00:12 My name is bill Russell. Speaker 00:00:13 I'm a former CIO for a 16 hospital system and creator of this week in health. Speaker 00:00:16 It. Speaker 00:00:17 A channel dedicated to keeping health it staff current and engaged. Speaker 00:00:21 Just quick reminder, this time. Speaker 00:00:24 Very quick. Speaker 00:00:25 We have four shows for next year, this week health news to stay current. Speaker 00:00:29 This week health conference for keynote interviews and emerging products. Speaker 00:00:34 This week health community, where we hear from you about interesting solutions Speaker 00:00:39 to the problems facing healthcare from the people who are solving them. Speaker 00:00:43 And finally this week health academy, where you can go or send people to learn Speaker 00:00:48 about the intersection of technology and healthcare, you can sign up at this week. Speaker 00:00:52 health.com/shows. Speaker 00:00:55 All right. Speaker 00:00:55 We said, we're going to run through this week. Speaker 00:00:58 The top five. Speaker 00:00:59 Top of mind issues. Speaker 00:01:01 For CEO's from the conferences I was at recently doing interviews Speaker 00:01:05 and having conversations. Speaker 00:01:06 Those were labor, cyber, digital automation, and caravan use we'll cover Speaker 00:01:12 the next three over the next three days. Speaker 00:01:15 We covered labor yesterday. Speaker 00:01:17 And went into detail on the battle for staff and retention. Speaker 00:01:23 Today's cybersecurity. Speaker 00:01:26 2020. Speaker 00:01:27 Or 2021, take your pick. Speaker 00:01:30 It's hard to really determine where this actually happened, but let's just Speaker 00:01:33 say over the last 24 months, It felt like a scene from the garden of Eden. Speaker 00:01:38 We ate the apple and we found out we were naked exposed at Speaker 00:01:42 risk healthcare is vulnerable. Speaker 00:01:45 There were warnings clearly before that there was one a cry. Speaker 00:01:48 Was a wake up call, but it wasn't until hospitals started being held hostage. Speaker 00:01:53 And being taken offline for days that we started to realize that there was Speaker 00:01:58 more involved here than a slight ding to our reputation or a small fine. Speaker 00:02:04 I'm not saying that it wasn't aware of the risk before, but we couldn't Speaker 00:02:07 sell it at most of the health systems. Speaker 00:02:10 The events of the past 24 months gave us credibility. Speaker 00:02:14 In our claims that the sky actually was falling. Speaker 00:02:17 No longer was the, Cisco. Speaker 00:02:19 . Chicken little Speaker 00:02:20 the worst had actually come to pass and we were right. Speaker 00:02:23 But you know what? Speaker 00:02:25 It's not that great being right systems went down sometimes for weeks at a time. Speaker 00:02:29 And sometimes with data loss that will never be recovered. Speaker 00:02:33 There was at least one incident that claimed that a cyber Speaker 00:02:36 event had caused a death. Speaker 00:02:38 Again, not that neat being right. Speaker 00:02:41 So what now you don't want me to recount all the incidents, Skylake Speaker 00:02:44 scripts and countless others that may not have been as prominent. Speaker 00:02:47 I've told you that I would cover these by putting my CIO hat back on. Speaker 00:02:53 And telling you how I would be approaching this challenge today. Speaker 00:02:56 If I were in the chair. Speaker 00:02:57 Let me start by saying this. Speaker 00:02:58 There is no one size fits all solution here. Speaker 00:03:01 My listeners come from health systems with thousands of it, Speaker 00:03:04 staff to Jess, 20 it staff. Speaker 00:03:07 These call for different tactics, different investments, and AMC Speaker 00:03:12 may have risks that a single hospital CIO may not have. Speaker 00:03:16 So let's explore some of the common things before I explore Speaker 00:03:18 some of the distinct challenges. Speaker 00:03:21 All right. Speaker 00:03:21 I think the approach I would take right now is we are under attack. Speaker 00:03:25 At all times we are under attack. Speaker 00:03:27 That is our posture. Speaker 00:03:28 And that is what I would take from this day forward. Speaker 00:03:31 Every day being treated as we're under attack. Speaker 00:03:34 Let's have our standup calls. Speaker 00:03:36 Let's have all those procedures in place. Speaker 00:03:38 Where we are treating it. Speaker 00:03:39 Like we are under attack today. Speaker 00:03:40 Do we have our defenses in place? Speaker 00:03:42 Do we know what's going on? Speaker 00:03:43 Which brings me to my second item here, which is, I would know the threats. Speaker 00:03:48 No who's after the information that you have know who's going to benefit the most Speaker 00:03:52 from shutting down your health system. Speaker 00:03:54 No. Speaker 00:03:54 The tactics that they're using stay current on their approaches and how they Speaker 00:03:59 are infiltrating systems like yours. Speaker 00:04:02 The third thing is assess your defense. Speaker 00:04:05 So really assess them. Speaker 00:04:06 You have to be honest at this point. Speaker 00:04:09 One of the things that I found over the years is that people will say Speaker 00:04:15 things like we're all vulnerable. Speaker 00:04:17 That's great. Speaker 00:04:18 And that all may be true, but at the end of the day, you have to Speaker 00:04:22 honestly assess your defenses. Speaker 00:04:23 And I'm going to come back to this in a little bit. Speaker 00:04:26 And talk about what you do with that honest assessment. Speaker 00:04:29 But at this point, Really look at it. Speaker 00:04:33 Ask yourself, the question, are we vulnerable? Speaker 00:04:36 Don't just say well, everyone's like this. Speaker 00:04:38 No. Speaker 00:04:39 How vulnerable are you? Speaker 00:04:40 How prepared are you? Speaker 00:04:42 And you have to have that assessment done. Speaker 00:04:44 And it has to be honest, if you need a third-party to do Speaker 00:04:47 it, which in most cases we do. Speaker 00:04:49 Have that done by the third party? Speaker 00:04:51 Number four assume they are already in your network. Speaker 00:04:55 And at that point, Understand your ability to identify their Speaker 00:05:00 movements from within your network. Speaker 00:05:02 Assume they're in because they probably are. Speaker 00:05:05 Already in your network and understand that this capability Speaker 00:05:09 of identifying what they're doing. Speaker 00:05:11 And how they're moving within your network is a must have moving forward. Speaker 00:05:17 The next thing I would say is assume you will be completely ransomed at Speaker 00:05:21 some point and plan accordingly. Speaker 00:05:24 All right. Speaker 00:05:24 So there's enough information out there. Speaker 00:05:26 We do a great webinar. Speaker 00:05:27 With the people from sky lakes, the CIO was kind enough to come on and Speaker 00:05:32 share his experience in some detail. Speaker 00:05:34 So if you want to know what it's going to feel like. Speaker 00:05:36 He shares what it feels like. Speaker 00:05:37 And what goes on in those first couple of minutes of the cyber Speaker 00:05:42 attack as you're watching systems just shut down one after another. Speaker 00:05:45 Not being able to gain access to your systems and having to rely Speaker 00:05:50 on vendors that you previously had worked with, but they're part of your Speaker 00:05:53 cybersecurity insurance contract. Speaker 00:05:56 And so they come in and actually ask you to step away from Speaker 00:05:59 the keyboard while they do Speaker 00:06:00 they're forensics on the event itself. Speaker 00:06:03 If you have that information assume you're going to be ransomed. Speaker 00:06:07 What is your plan to come back online? Speaker 00:06:09 What is your plan? Speaker 00:06:10 Are you going to pay the ransom? Speaker 00:06:11 Are you not going to pay the ransom? Speaker 00:06:13 Are you going to start a recovery? Speaker 00:06:15 Do you have the systems in place? Speaker 00:06:16 Have you air gapped your backups? Speaker 00:06:18 Is it enough to air guy, your backups? Speaker 00:06:20 Do you have immutable backups? Speaker 00:06:22 It's a, is it enough to have immutable backups? Speaker 00:06:24 What, what is going to work and what is not going to work. Speaker 00:06:27 But plan accordingly, you're going to get ransomed plan accordingly. Speaker 00:06:30 That's how I would be thinking about it right now as a CIO. Speaker 00:06:33 All right, let's move on. Speaker 00:06:34 So from the point of an honest assessment plan, your investments wisely. Speaker 00:06:41 Acknowledge what you can and cannot do well. Speaker 00:06:44 And I'm going to get to this in a little bit, but the smaller Speaker 00:06:46 health systems, there's an awful lot of things you cannot do well. Speaker 00:06:50 And you're going to want to look outside your four walls for some Speaker 00:06:53 help, and who's going to help you. Speaker 00:06:54 Today to prepare for an event and in the future, if you actually have Speaker 00:06:58 an event so acknowledge what you can and cannot do well and go find help. Speaker 00:07:04 Second thing is be open and honest with the executive team. Speaker 00:07:07 And the board went asked. Speaker 00:07:08 Hide nothing from the leadership. Speaker 00:07:11 You don't want to be found, hiding important information from those that Speaker 00:07:14 could have made a difference that can make the investments to shore Speaker 00:07:18 up your foundation in your system. Speaker 00:07:20 I wouldn't want to be that CIO. Speaker 00:07:22 Who's trying to explain. Speaker 00:07:24 Why they did not have an honest assessment or why they withheld any Speaker 00:07:27 information about that environment? Speaker 00:07:29 Honest open here's where we're at. Speaker 00:07:32 The executive team needs to be brought into the loop. Speaker 00:07:34 The governance team needs to be brought into the loop. Speaker 00:07:37 So that they can determine what the risk is to the organization Speaker 00:07:41 and what needs to happen. Speaker 00:07:42 So that's table stakes. Speaker 00:07:44 I assume everyone knows that. Speaker 00:07:45 I just wanted to say it again out loud. Speaker 00:07:47 And then the next thing is ask for help, seek help, be open to help. Speaker 00:07:51 This is not the kind of thing. Speaker 00:07:53 That every health system is going to have the resources and the wherewithal. Speaker 00:07:58 We need to utilize the resources that are out there. Speaker 00:08:01 That are designed to help us and designed. Speaker 00:08:04 To bring us together as a community to fight this. Speaker 00:08:07 This threat. Speaker 00:08:08 All right. Speaker 00:08:08 The next thing I would say is planted complete strategy. Speaker 00:08:11 I remember standing at a conference, listening to CISOs share. Speaker 00:08:16 And person after person talked about their education program. Speaker 00:08:19 And while I was impressed with the programs they had Speaker 00:08:21 developed, I couldn't help. Speaker 00:08:23 But to think how unsophisticated the approach was to cybersecurity. Speaker 00:08:27 You have to prevent, detect, remediate and recover. Speaker 00:08:30 And that's not even a complete list of the things that need to Speaker 00:08:33 be discussed and planned for. Speaker 00:08:35 My point being you can't have a single threaded approach to cybersecurity. Speaker 00:08:41 It needs to be multifaceted. Speaker 00:08:43 You need a technology layer, you need a people and education layer. Speaker 00:08:47 You need a remediation layer, you need a recovery layer. Speaker 00:08:50 You need all those things in place. Speaker 00:08:52 If you are going to be able to be effective in the world Speaker 00:08:56 that we currently live in. Speaker 00:08:57 All right, let me get moving here. Speaker 00:08:58 I'm running out of time. Speaker 00:09:00 So next thing I would say is no, what your contracts say? Speaker 00:09:03 It's interesting. Speaker 00:09:04 How many times this came up in conversations, post breach event? Speaker 00:09:08 I didn't realize what my BAA agreement actually called for. Speaker 00:09:11 I didn't realize what my cybersecurity policy gave power. Speaker 00:09:14 During an incident to others and called for me to utilize Speaker 00:09:18 companies, I wasn't familiar with. Speaker 00:09:20 We didn't have an agreement that protected us from an incident Speaker 00:09:22 at our community connect site. Speaker 00:09:24 It's things like that, know what your contracts say? Speaker 00:09:26 Those are just a few stream of consciousness. Speaker 00:09:27 Thoughts . Let me address some of the specifics for smaller players. Speaker 00:09:31 You can't do this on your own. Speaker 00:09:33 You have to find the right partners that can help you to Speaker 00:09:35 build a sustainable program. Speaker 00:09:37 You can't do it with one cyber person and an engineer. Speaker 00:09:41 It's not even remotely possible line up the players that can Speaker 00:09:44 help you get them lined up today. Speaker 00:09:46 Prior to an event. Speaker 00:09:48 For an AMC, you have to be aware that nation states want the Speaker 00:09:51 information that your research teams are working on nation states. Speaker 00:09:55 You know, the ones. Speaker 00:09:56 The, the ones I'm talking about, the ones with well-funded armies of cyber Speaker 00:10:00 specialists, the tactics are varied. Speaker 00:10:03 And while a traditional phishing attack may not work in this Speaker 00:10:08 case, they have other ways. Speaker 00:10:09 And in those cases, you have to be tracking the motion of critical Speaker 00:10:13 information around your network. Speaker 00:10:14 You have to have complete visibility into the motion of your Speaker 00:10:18 critical data assets at all times. Speaker 00:10:21 This is going to serve you well, since attacks are no longer just Speaker 00:10:24 being initiated from afar, disgruntled employees are now offered money Speaker 00:10:29 to get back at their employers. Speaker 00:10:31 Place this code on your network and we will take care of the Speaker 00:10:34 rest ransomware as a service. Speaker 00:10:36 Oh. Speaker 00:10:37 And by the way, if we successfully ransom your organization, we will Speaker 00:10:41 give you a cut of the cryptocurrency. Speaker 00:10:43 You have to track the movement of the data. Speaker 00:10:47 In order to do that, you have to have a very accurate data inventory as well. Speaker 00:10:52 All right. Speaker 00:10:52 As I said this is going to be exhausted. Speaker 00:10:54 I just wanted to share a few thoughts. Speaker 00:10:55 This is top of mind for CEOs and it should be, it should have been Speaker 00:10:59 for CEOs and it should have been. Speaker 00:11:01 Probably for at least the last decade. Speaker 00:11:04 Now we know. Speaker 00:11:05 So let's try to make 20, 22, a transformative year in this area. Speaker 00:11:11 All right. Speaker 00:11:12 That's all for today. Speaker 00:11:12 If you know someone that might benefit from our channel, Speaker 00:11:14 please forward them a note. Speaker 00:11:15 They can subscribe on our website this week out.com or wherever you Speaker 00:11:18 listen to podcasts, apple, Google, overcast, Spotify, Stitcher. Speaker 00:11:22 You get the picture. Speaker 00:11:23 We want to thank our channel sponsors who are investing in our mission to develop Speaker 00:11:27 the next generation of health leaders. Speaker 00:11:29 VMware Hill-Rom Starbridge advisors, McAfee and Aruba networks. Speaker 00:11:34 Thanks for listening.

Found this useful? Share it with your network