State of Cybersecurity in Healthcare
Matt Dimino - Eskenazi Health
Jan 31, 2018Size: 395.6MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractThe public health sector cannot deliver efficient and safe patient care without digital interconnectivity among devices. If the healthcare system is connected, but insecure, the interconnectivity could betray patient safety, subjecting patients to uncalculated and unnecessary risks with insurmountable costs, including death. Our nation must realize the dangers imposed on patients due to the reliance on interconnectivity amongst devices and information systems. Healthcare delivery organizations are often seen and titled as safe places, places for healing, and places we trust. These entities are a repository for our most sacred personal information as well as a harbor for some of the most technologically advanced equipment; thus they have become easy targets for threat actors.
Real cases of protected health information theft, ransomware, and targeted nation-state hacking prove that our nation’s healthcare systems, data, devices, and reputation are vulnerable. This presentation aims at depicting the current state of cybersecurity in healthcare delivery organizations as well as at understanding the main threats organizations face, discussion the ecosystem, industry-specific pitfalls, and the patient health attack model.
About the SpeakerMatt Dimino is on a mission to help our nation’s healthcare and public health sector critical infrastructure recognize and prepare for tomorrows cyber threat landscape. Mr. Dimino works as an imaging engineer at Eskenazi Health, an adjunct professor for IUPUI and as a researcher and consultant for a non-profit public health and safety organization. Mr. Dimino has a BS in Healthcare Engineering Technology and an MBA, he has attained IT industry certifications such as CCNA, Network+, Healthcare IT, CSA+, and has completed formal cyber security and ethical hacking training. Motivated by work that makes a difference, Mr. Dimino is proud to continue research and development in the domains of training, testing, mitigation, and cyber threat avoidance strategies with a goal of disseminating cyber threat information.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.