IoT in Healthcare: Life or Death SBX2-R4 IoT in Healthcare: Life or Death Dr. May Wang Co-Founder & CTO ZingBox
Introduction Healthcare IoT Challenges Why not current solutions? What can we do? What’s in real world?
IoT offers New Values to Healthcare Delivery Organizations + IT Information Technology Infrastructure, Security, Applications BIOMED Medical Device Management Safety, Efficiency and Effectiveness Real-Time Health System (RTHS) PEOPLE | PROCESS | SERVICES BENEFITS CHALLENGES Situational aware patient care Increased operational efficiency Security risks Service integrity & continuity
The Healthcare IoT Medical IoT Real-Time Health System Operational IoT Infusion Pumps 90% hospitals are victims of cyber threats BLOOMBERG Connected HVAC MRI Scanners Smart Lighting Patient Monitors Surveillance Camera 25% of identified attacks will involve IoT by 2020 Safety Quality Patient safety Care delivery quality Security Serviceability Data and equipment security Care service integrity & continuity GARTNER
Challenges of Securing Medical IoT HOSPITAL NETWORK FIREWALL Firewall - the single line of defense (With no device context, only works at IP level) Gateway Gateway PACS Unmonitored network (Medical IT network remains unprotected) Patient Rooms MEDICAL IT NETWORK Lack of endpoint visibility & security (Agents cannot be deployed) IV Pumps Patient Monitors Radiology
Why Not Current Security Solutions? Network of the Future Today’s Network Homogeneous Infrastructure Variety of unique devices Specific-purpose hardware Unique malware for each device Reactive approach not effective Future 2015 Reactive Approach Detects & Blocks known malware Intelligent & Proactive Security Context of use combined with Machine Learning & Behavioral Analysis
Healthcare IoT Security through Deep Learning 1 IoT Visibility Detect unmanaged devices Recognize & classify Actively manage inventory 3 Regulate Behavior Security posture Risk assessment Smart whitelisting 2 IoT Personality Behavioral modeling Device profiling Personality Deep Learning ZingBox Cloud IoT Knowledge-base & AI Engine
Reality of Healthcare IoT 71% Non- Medical IoT Non-traditional IT equipment (IoT) outnumber the IT devices 68% IoT 29% Medical IoT IoT Devices are - Unmanaged assets Shadow devices Total IoT Devices Total Number of Devices There are 68% IoT Devices (out of total number of devices) Of all IoT Devices, 71% Non-Medical IoT Devices 29% Medical IoT Devices
What are Medical IoTs 29% 23% 16% 10% 9% 5% 4% 3% 1% Percentage of Medical IoTs Combined average in numeric order, 9 total categories: Infusion Pump (29%) ECG Machine (23%) Imaging Systems (16%) Patient Monitor (10%) Point of Care Analyzer (9%) Patient Tracking (5%) Medical Printer (4%) Nurse Call System (3%) Other Healthcare* (1%) *Other HealthCare includes: Clinical Analyzer, Microdialysis System, Patient Security System Total 735
Device Personality Based IoT Security Understanding each device without touching device Individual device model Device group model Category model Individual device model – describes learned behaviors of an individual IoT device. Device group model – describes the common behaviors of a group of IoT devices – they can be categorized based on vendor or type, e.g. all Stinger vital sign monitors, or all vital sign monitors. User model – describes user (admin) defined behavior standards based on domain knowledge or
Examples of IoT Security Use Cases Infiltration Botnet Ransomware Data Exfiltration
Example of Infiltration
Example of Data Exfiltration Hospitals are among the most attracted targets for data exfiltration. Medical records = big money for organized crime. Detections — look for unseen internal app/destinations, and external destinations anomalies. Correlate events (scanning, infiltration, malware upload, etc.) in attack phase based on timeline and associated devices, and trigger early detections and actions.
In Conclusion URGENCY IoT in Healthcare is real IoT security in Healthcare is life or death Current solutions are not enough, we need new solutions WHAT CAN WE DO TODAY? Visibility – Know what IoT devices you have Risk Assessment – Know the IoT vulnerabilities Management – Get a handle on unmanaged IoT assets