Name
Lessons Learned: Reviewing Incident Response to the WannaCry and NotPetya Global Outbreaks
Date & Time
Friday, November 10, 2017, 8:45 AM - 9:35 AM
Speakers
Drexel DeFord, Healthcare IT Strategy Consultant and President,Drexio Digital Health
Chris Joerg, CISO,Cedars-Sinai
Pamela Banchy, Chief Information Officer,Western Reserve Hospital
Richard Greenberg, Information Security Officer,Los Angeles County Public Health Department
Gerard Nussbaum, Principal,Zarach Associates
Michael Sohn, Supervisory Special Agent,FBI Los Angeles Cyber Division
Chris Joerg, CISO,Cedars-Sinai
Pamela Banchy, Chief Information Officer,Western Reserve Hospital
Richard Greenberg, Information Security Officer,Los Angeles County Public Health Department
Gerard Nussbaum, Principal,Zarach Associates
Michael Sohn, Supervisory Special Agent,FBI Los Angeles Cyber Division
Description
The May 2017 cybersecurity attack dubbed “WannaCry” grabbed storylines internationally and across the healthcare landscape as tens of thousands of hospitals, organizations, and agencies across 153 countries had their data held hostage.
The enhanced crypto-locking worm spread quickly, with a headliner target of the National Health Service (NHS) in Britain, which resulted in extended downtime, rescheduling of procedures, and in numerous cases preventing access to care for patients. The worm propagated and spread using a Microsoft platform vulnerability related to the Server Message Block protocol, which revealed many healthcare organizations’ weak points in the areas of security standards compliance, network structures, and disaster recovery protocols.
In this special panel discussion, Healthcare Informatics welcomes a panel of top security experts, as they recall and summarize the top lessons learned in security compliance and organizational frameworks following the WannaCry and NotPetya attacks. Listen in as our panelists provide their perspectives, and delve into the nature of the attack—diagramming how this threat was uniquely dangerous for healthcare organizations, and why security compliance and protocols for disaster recovery allowed his organization and others to manage the situation quickly and effectively.