COVID has brought healthcare top of mind for everyone reading this. Unfortunately, it has also become top of mind for malicious actors.

Today, we have a manager of a massive healthcare system share his insights on protecting medical data in a fast-changing and dangerous environment. He is joined by an industry veteran who has a long background both in healthcare information technology as well as cybersecurity.

Lloyd Indig is responsible for information security for California’s massive network of interlocking health-related agencies. He is responsible for thirteen departments and 3,300 employees in the state. This includes hospitals, health care services, child support services, and many more entities.

This is just the starting point, for Lloyd must worry about a wide range of compliance for that aggregation of the network. His compliance responsibilities include Personal Identifiable Information but also Personal Health Information, Electronic Personal Health Care Information, HIPAA to say nothing of IRS, SSA, and a host of compliance with payment methods.

Luckily, they have had to manage only minor security incidents, but this does not make Lloyd complacent.

One tool that has been valuable for Lloyd’s team was putting together an incident response planning session. The idea was to make sure the communication channels were in place before an event.

Tony Lauro understands Lloyd’s concerns regarding compliance. His background gives him a view of the larger health care system’s compliance needs. He says that across all health systems, hospitals and providers, there are 630 discrete regulatory requirements across nine domains

The result of this complex system is vulnerabilities that a mere human cannot detect. Tony recommends assembling a platform that includes bots, login detection, and web firewall application firewalls. These can be organized to the point where attackers can be recognized and shut down before they have moved laterally across a health care system.

For the technically minded, Tony Lauro gives a good explanation for a concept called “Recursive DNS.” Some users do not realize they are vulnerable to attack from a Recursive DNS server that be vulnerable to attack. Companies like Akamai can assist in some of this “behind the curtain” cyber security management.

One key takeaway comes from Lloyd Indig. At the end of the discussion, he reminds listeners that with all the rules and tech you have, the human element is extremely important. If there is an incident, staff must know the next step – which includes who to speak to, when, and how to coordinate. That is where he sees the value of the incident response planning exercise they conducted.

Featured Speakers:

Lloyd Indig, AISO, CHHS
Lloyd Indig
Agency Information Security Officer,
California Health & Human Services
Tony Lauro, Director, Security Technology & Strategy, Akamai
Tony Lauro
Director, Security Technology & Strategy,
John Breeden (Moderator) Contributing Editor, FedInsider
John Breeden (moderator)
Contributing Editor,