Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
30
31
2
4
5
10
11
12
13
14
15
20
21
22
23
24
25
26
27
12:00 AM - Arab Health 2020
29
1
2
5th International Conference On Recent Advances In Medical Science ICRAMS
2020-01-01 - 2020-01-02    
All Day
2020 IIER 775th International Conference on Recent Advances in Medical Science ICRAMS will be held in Dublin, Ireland during 1st - 2nd January, 2020 as [...]
01 Jan
2020-01-01 - 2020-01-02    
All Day
The Academics World 744th International Conference on Recent Advances in Medical and Health Sciences ICRAMHS aims to bring together leading academic scientists, researchers and research [...]
03 Jan
2020-01-03 - 2020-01-04    
All Day
Academicsera – 599th International Conference On Pharma and FoodICPAF will be held on 3rd-4th January, 2020 at Malacca , Malaysia. ICPAF is to bring together [...]
The IRES - 642nd International Conference On Food Microbiology And Food SafetyICFMFS
2020-01-03 - 2020-01-04    
All Day
The IRES - 642nd International Conference on Food Microbiology and Food SafetyICFMFS aimed at presenting current research being carried out in that area and scheduled [...]
World Congress On Medical Imaging And Clinical Research WCMICR-2020
2020-01-03 - 2020-01-04    
All Day
The WCMICR conference is an international forum for the presentation of technological advances and research results in the fields of Medical Imaging and Clinical Research. [...]
International Conference On Agro-Ecology And Food Science ICAEFS
2020-01-06    
All Day
The key intention of ICAEFS is to provide opportunity for the global participants to share their ideas and experience in person with their peers expected [...]
RW- 743rd International Conference On Medical And Biosciences ICMBS
2020-01-07 - 2020-01-08    
All Day
RW- 743rd International Conference on Medical and Biosciences ICMBS is a prestigious event organized with a motivation to provide an excellent international platform for the [...]
International Conference On Nursing Ethics And Medical Ethics ICNEME
2020-01-08 - 2020-01-09    
All Day
An elegant and rich premier global platform for the International Conference on Nursing Ethics and Medical Ethics ICNEME that uniquely describes the Academic research and [...]
International Conference On Medical And Health SciencesICMHS-2020
2020-01-09 - 2020-01-10    
All Day
The ICMHS conference is an international forum for the presentation of technological advances and research results in the fields of Medical and Health Sciences. The [...]
12th Annual ICJR Winter Hip And Knee Course
2020-01-16 - 2020-01-19    
All Day
Make plans to join us in Vail, Colorado, for the 12th Annual Winter Hip And Knee Course, the premier winter meeting focused on primary and [...]
3rd Big Sky Cardiology Update 2020
2020-01-17 - 2020-01-18    
All Day
ABOUT 3RD BIG SKY CARDIOLOGY UPDATE 2020 Following the success of the 2nd edition, I am pleased to invite you to the “3rd Big Sky [...]
A4M India Conference
2020-01-18 - 2020-01-20    
All Day
ABOUT A4M INDIA CONFERENCE Taking place for the first time in New Delhi, India, this two-day event will serve as a foundational course in the [...]
International Conference On Oncology & Cancer Research ICOCR-2020
2020-01-19 - 2020-01-20    
All Day
The ICOCR conference is an international forum for the presentation of technological advances and research results in the fields of Oncology & Cancer Research. The [...]
Arab Health 2020
2020-01-27 - 2020-01-30    
All Day
ABOUT ARAB HEALTH 2020 Arab Health is an industry-defining platform where the healthcare industry meets to do business with new customers and develop relationships with [...]
12th International Conference on Acute Cardiac Care
2020-01-28 - 2020-01-29    
All Day
ABOUT 12TH INTERNATIONAL CONFERENCE ON ACUTE CARDIAC CARE Acute Cardiac Care has been undergoing a substantial transformation in recent years as the population ages and [...]
30 Jan
2020-01-30 - 2020-01-31    
All Day
The ICMHS conference is an international forum for the presentation of technological advances and research results in the fields of Medical and Health Sciences. The [...]
Annual Lower and Upper Canada Anesthesia Symposium 2020 (LUCAS)
2020-01-31 - 2020-02-02    
All Day
ABOUT ANNUAL LOWER & UPPER CANADA ANESTHESIA SYMPOSIUM 2020 (LUCAS) On behalf of the Departments of Anesthesia of McGill University, Queen’s University, and the University [...]
RF - 577th International Conference On Medical & Health Science - ICMHS 2020
2020-02-02 - 2020-02-03    
All Day
577th International Conference on Medical & Health Science - ICMHS 2020. It will be held during 2nd-3rd February, 2020 at Berlin , Germany. ICMHS 2020 [...]
ISER- 747th International Conference On Science, Health And Medicine ICSHM
2020-02-02 - 2020-02-03    
All Day
ISER- 747th International Conference on Science, Health and Medicine ICSHM is a prestigious event organized with a motivation to provide an excellent international platform for [...]
Events on 2020-01-08
Events on 2020-01-09
Events on 2020-01-16
Events on 2020-01-17
Events on 2020-01-18
A4M India Conference
18 Jan 20
Haridwar
Events on 2020-01-27
Arab Health 2020
27 Jan 20
Dubai
Events on 2020-01-28
Events on 2020-01-30
Events on 2020-01-31
Latest News

Cloud-connected devices need a fresh scan for security issues

Medical devices increasingly represent a weakness in security for most healthcare organizations, which typically use hundreds of diverse devices from dozens of manufacturers. Equipment ranging from infusion pumps to hospital beds to Bluetooth-enabled devices can be 10 or more years old, working on old, vulnerable operating or application systems, and they’re often in close proximity to patients and essential in providing life-saving treatment.

Because an increasing number of these devices are connected to the cloud, it’s time to take a structured approach to ensuring that security risks are managed closely, said James L. Angle, an information security architect at Trinity Health, a Livonia, Michigan-based Catholic healthcare system. Angle detailed the growing risk of cloud-linked devices’ security risks, as well as an approach for tightening up defenses based on their proximity to patients during his recent HIMSS20 Digital presentation, Managing the Risk for Medical Devices Connected to the Cloud.

Mitigating device security risks should begin before they’re purchased, Angle said. He outlined five “degrees of separation” medical devices can have from patients, and security professionals’ strategy for strengthening security varies among the different categories. They are:

Devices implanted in the patient

1: Devices that touch the patient, such as a blood-gas monitor in an ICU

2: Devices that don’t touch the patient, but take vital measurements, such as a blood pressure monitor

3: Devices that don’t touch the patient, but still provide data vital to proper patient diagnosis

4: Devices that are separate and are more of an operational tool vs. one that’s diagnostic or clinical

Before any devices are purchased, security professionals need to be involved, collecting documents such as the manufacturer’s disclosure statement on medical device security, augmenting those formal statements with additional security questions, Angle said. Based on that information, it’s crucial to conduct a risk assessment and threat assessment.

“Pay special attention to [security] controls that the manufacturers say are in place,” Angle noted. “Look at all the related software, both for the device’s operating system and application system. Some of these devices have database software connected to it. Identify all the connections for the data; know where the data is being processed and where the patient data is being stored – in multiple devices on site, network storage media or in the cloud. Each one of those has different security requirements.”

Various organizations provide a technical framework outlining security postures for devices that handle health information – these include the National Institute of Standards Technology, HITRUST and the International Organization for Standardization. “When you’re doing a control assessment, it’s important to use a recognized framework,” he said.

Contracts for device purchases should ensure that all threats and vulnerabilities are addressed, even though not all of them can be corrected or remediated. For example, contracts should specify how quickly patches are applied to resolve security issues, ranging from two weeks for high-priority patches to four weeks for low-priority fixes.

“A lot of times, vendors will not let you apply the patch to their devices – they want to do it themselves. If it takes them a year to come out and apply the patch, that’s a problem.” Once devices are purchased and in use, it falls to operations management to manage security protection, which is crucial for devices that are managed via cloud services or upload data to the cloud. Different levels of attention are necessary the closer devices are to patients.

For example, implanted devices “present a unique set of issues,” Angle said. “The device on its own typically does not connect directly to the Internet or the cloud – a pacemaker usually does so through another device, for example, like a handheld device that you hold up next to the patient, which then reads information off the pacemaker, which then connects to a base station or a smart device. In that case, you have multiple points to check for security.”

With implanted devices, typical concerns include how the devices accomplish identity and access management, and how the health organization ensures that new vulnerabilities are remediated. IAM is critical on implanted devices because patients can be in settings where devices might be easily accessed and hacked.

Depending on their proximity to patients, medical devices can be difficult to patch, Angle said in outlining challenges for the various degrees of separation from patients. IAM issues are common to almost all types of devices, and it can be difficult to run antivirus programs and apply necessary patches while they are in service.

Manufacturers of some devices don’t allow antivirus software to be installed on them, and they may have weak or no IAM, which makes it difficult to layer on essential security for devices that connect to the cloud. In these cases, devices can be somewhat insulated by segmenting them on the network and controlling the data flow to and from the device, Angle said.

For devices that connect to the cloud, healthcare organizations should collect log files wherever possible and implement a cloud access security broker solution. “What this does is identify all the PHI data going into the cloud and also encrypts the data. Providers also need to assess cloud security, and the Cloud Security Alliance IoT control matrix is a good place to start,” he said.