Webcast Series:
NIST Cybersecurity Framework for Healthcare

AVAILABLE ON-DEMAND

Healthcare is the only one of the 16 critical infrastructure components that has yet to officially adopt an official and formal cybersecurity framework. With the implementation of the Cyber Information Sharing Act and the pending creation of a Department of Health and Human Services cyber implementation guide, that may change. The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) will become more prominent as the standard risk-based approach to cyber security in healthcare.

Symantec demystifies the NIST CSF by breaking down each of its five functions – Identify, Protect, Detect, Respond Recover – in a webinar series to highlight what healthcare organizations need to know, and how this will improve information security across the healthcare industry.

DOWNLOAD NOW


Part 1 of 7: Demystifying the NIST Cybersecurity Framework for Healthcare

As cyber-attacks are growing more sophisticated and focused on the healthcare industry, it is paramount that these organizations put in place an effective, robust, and dynamic approach to identifying, managing and/or mitigating critical threats on an ongoing basis.
View Details »

Join us for Part 1 of this series as Cerner's Chief Security Officer, Don Kleoppel discusses how Cerner is using the NIST CSF as the foundation to building out their cybersecurity strategy, lessons learned through the process, and what the framework means to not only their organization but also to the customers they serve.

Learn:

  • Mapping current investments to the NIST CSF as well as identifying security gaps to efficiently manage your cybersecurity posture.
  • Symantec's involvement with NIST in building out a framework specific to meeting healthcare requirements and regulations.
  • Leveraging the CSF to shift from a "check the box" compliance mindset to an automated risk management approach.


Part 2 of 7: Using the NIST Cybersecurity Framework to Identify Personal Health Information (PHI)

Healthcare organizations need to identify digital systems, what data they hold, how it is used, and what value it holds before they can make the right decisions on how to protect it under their Risk Management program.
View Details »

Healthcare organizations need to identify digital systems, what data they hold, how it is used, and what value it holds before they can make the right decisions on how to protect it under their Risk Management program. This webinar will look at technical and administrative controls that reflect your mission and operations and why it must be the first step in protecting your sensitive data and patient information.

Discover:

  • Discuss how to successfully implement an asset and risk management strategy that incorporates all of your hardware, software, and data to gain complete visibility of your organization's assets
  • Provide a practical guide for healthcare organizations to navigate through the 5 categories within the Identify function


Part 3 of 7: Protecting Heath Information with the NIST Cybersecurity Framework

July 13, 2017
Time: 10:00 a.m.–11:00 a.m. PST (1 hour)

The PROTECT function of the NIST CSF puts the security in cybersecurity. In this webinar our experts explore how the framework helps healthcare organizations limit, or contain, the impact of a potential cybersecurity event. As with other areas of the NIST CSF there are numerous parts to explore. This webinar will focus on the critical technology categories to support the PROTECT function of the NIST CSF, including:
View Details »

  • Access Control: Ensuring people are who they say they are.
  • Awareness and Training: Enabling employees, partners and suppliers to be part of your cybersecurity plan through education and training.
  • Data Security: Managing data according to organizational standards to mitigate risk.
  • Information Protection Processes and Procedures: Ensuring policies, processes and procedures are in place to manage information systems and assets.
  • Maintenance: Maintaining information system components.
  • Protective Technology: Deploying solutions according to established policies.

In addition to a lively discussion, we'll also show you Symantec Endpoint Protection 14 in action, with a demo that showcases how unknown threats don't stand a chance.



Part 4 of 7: Detecting a Healthcare Breach with the NIST Cybersecurity Framework

August 17, 2017
Time: 10:00 a.m.–11:00 a.m. PST (1 hour)
Put on your detective hats with the DETECT function of the NIST CSF. Too often healthcare organizations are breached without ever knowing it. In this webinar, we'll look at how the NIST CSF helps healthcare organizations set up technologies and policies to make sure they know, in a timely manner, when they've been breached, how they were breached and, most importantly, what they can do to mitigate this risk in the future.
View Details »

We will take a deeper dive into the core components of the DETECT function, including the categories of anomaly/event detection, continuous monitoring and effective detection processes. It can be difficult to learn that your organization has been breached, but that knowledge is crucial to improving overall cybersecurity operations.



Part 5 of 7: Responding to Healthcare Data Breaches with the NIST Cyber Security Framework

September 12, 2017
Time: 10:00 a.m.–11:00 a.m. PST (1 hour)

A cybersecurity event is currently going on. What do you do? Can you quickly and efficiently take action or simply stand by and watch the breach unfold? The ability to respond to a cyberattack in a timely fashion is incredibly important, especially for healthcare organizations that house lots of personally-identifiable information that is critical to their care delivery mission. In this webinar, we will explore the RESPOND function of the NIST CSF and what tools and processes healthcare organizations need in order to minimize impact during a cyber incident. This includes looking at: View Details »

  • Response Planning: Processes and procedures are executed and maintained to ensure timely response to detected cybersecurity events.
  • Communications: Activities are coordinated with internal and external stakeholders to include support from law enforcement agencies.
  • Analysis: Analysis is conducted to ensure adequate response and support recovery activities.
  • Mitigation: Activities are performed to prevent expansion of an event, mitigate its effects and eradicate the incident.
  • Improvements: Response activities are improved by incorporating lessons learned from current and previous detection/response activities.

Part 6 of 7: How to Use the NIST CSF to Recover from a Healthcare Breach

October 17, 2017
Time: 10:00 a.m.–11:00 a.m. PST (1 hour)

The final piece to the puzzle is the RECOVER function, which is arguably the most important area of the NIST CSF. How quickly can you return to business and clinical operations after a cyberattack occured? This webinar will focus on the measures required for a timely recovery and return to normal operations to reduce the impact from a cybersecurity event, with a focus on: View Details »

  • Recovery Planning: Processes and procedures are executed and maintained to ensure timely restoration of systems or assets.
  • Improvements: Planning and processes are improved by incorporating lessons learned.
  • Communications: Restoration activities are coordinated with internal and external parties.


Part 7 of 7: Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization

December 5, 2017
Time: 10:00 a.m.–11:00 a.m. PST (1 hour)

The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we've explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER. View Details »

Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environment, and the impact it has provided.





 
FOLLOW US:
YouTube Google+ Twitter LinkedIn Facebook