Cybersecurity Practices for Health Care Organizations~ RJ BLANCHARD BENEFIT SERVICES

Page 79

personnel for high-impact incidents. A template IR policy is provided in Appendix G in the Main document. o

fCybersecurity incident response team (CIRT): a pre-formed and “on the ready” group that knows how to navigate issues when critical- or high-severity security incidents arise. This team develops and manages your organizational response. Most commonly, CIRTs are formed in the HPH sector when potential data breaches occur and the organization must manage the potential breach in compliance with HITECH. It is important to identify the incident commander, the most senior official who will oversee managing cybersecurity incidents. The incident commander is usually the CISO or equivalent. Note that the incident commander should not dive into the technical weeds of the incident, but should keep the various teams organized and focus on their objectives. Table 11 describes the teams may be involved in resolving a critical security incident and potential breach. Table 11. Roles and Responsibilities for an Organizational CIRT Team

Description

Executive/Senior Leadership

!n organiza �on’s C-suite or most senior execu�ves. They provide overall direc�on and approvals required to resolve significant cybersecurity breaches. These individuals should be kept informed throughout the lifecycle of a significant cybersecurity incident.

Cybersecurity Teams

Teams comprising people with cybersecurity exper�se who understand a�acks, vulnerabili�es, and the methods by which threat vectors are exploited. They provide technical depth and detail to technical teams and execute procedures in the playbook.

Technical Teams

Teams comprising SMEs for the technologies that have been compromised and who are engaged in developing and implemen�ng the response. These SMEs may be system owners, system administrators, or other individuals with specialized IT exper�se. They take instruc�on from the cybersecurity teams as part of the playbook execu�on.

Legal Teams

Teams comprising a�orneys in your general counsel (internal or external) that help manage the incident under privilege as well as consult on regulatory expecta�ons.

Public Affairs/Marketing and Communications

People who manage external communica�ons to deliver a consistent voice and message in the event of a high-visibility cybersecurity incident. This team is important to managing the reputa�on of the organiza�on.

79


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Appendix B: References

3min
pages 105-108

Table 13. Incident Response Plays for Attacks Against Medical Devices

8min
pages 93-96

Table 15. Acronyms and Abbreviations

0
page 100

Table 14. Example Cybersecurity Policies for Consideration

0
page 97

Cybersecurity Practice #9: Medical Device Security

10min
pages 87-91

Table 12. Timeframes for Resolving Medical Device Vulnerabilities

1min
page 92

Table 11. Roles and Responsibilities for an Organizational CIRT

17min
pages 79-86

Table 9. Factors for Consideration in Penetration Test Planning

6min
pages 69-72

Cybersecurity Practice #6: Network Management

15min
pages 57-64

Cybersecurity Practice #8: Security Operations Center and Incident Response

4min
pages 73-74

Table 10. Example Incident Response Plays for IR Playbooks

5min
pages 75-78

Cybersecurity Practice #7: Vulnerability Management

5min
pages 65-67

Cybersecurity Practice #5: IT Asset Management

8min
pages 52-56

Table 7. Expanding DLP to Other Data Channels

3min
pages 49-51

Table 6. Data Channels for Enforcing Data Policies

2min
page 48

Table 3. Example of a Data Classification Schema

1min
page 43

Table 5. Security Methods to Protect Data

6min
pages 45-47

Table 4. Suggested Procedures for Data Disclosure

1min
page 44

Cybersecurity Practice #4: Data Protection and Loss Prevention

1min
page 42

Cybersecurity Practices at Medium-Sized Health Care Organizations

4min
pages 4-6

Table 1. E-mail Protection Controls

19min
pages 15-23

Cybersecurity Practice #3: Identity and Access Management

23min
pages 31-41

Cybersecurity Practice #2: Endpoint Protection Systems

1min
page 24

Table 2. Basic Endpoint Controls to Mitigate Risk at Endpoints

9min
pages 25-30

Cybersecurity Practices at Large Health Care Organizations

3min
pages 7-8

Cybersecurity Practice #1: E-mail Protection Systems

1min
page 14

Introduction

0
page 3
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.