Security Experts:

Connect with us

Hi, what are you looking for?


Cyber Insurance

Cyber Attack Exercise Reveals Information Sharing Struggles in Healthcare Industry

First CyberRX Exercise Outlines Areas for Improvement for Healthcare Organizations

First CyberRX Exercise Outlines Areas for Improvement for Healthcare Organizations

Healthcare organizations are still struggling with information sharing both internally and externally, participants in an industry-wide cyber-security exercise said.

The Health Information Trust Alliance (HITRUST) teamed up with the U.S. Department of Health and Human Service (HHS) in the CyberRX initiative to determine just how prepared organizations were to handle cyber-incidents. The first exercise was conducted over a seven-hour period on April 1, and the results of the first simulations were released Monday. The second exercise is scheduled for this summer.

Information SharingThroughout the one-day event, organizations were faced with a randomly selected cyber-incident scenario, such as a major username and password breach, a network breach at a health plan provider exposing patient health records, an information leak, or a potential insider threat case. Organizations varied in how prepared they were to process threat intelligence, communicating the information to internal stakeholders, and engaging with external partners in the industry and government.

The “weakness isn’t necessarily on technology implementations, it’s the ability to coordinate and collaborate across the myriad of participants in healthcare,” Roy Mellinger, WellPoint’s vice president and CISO, said in a phone briefing on the CyberRX results on Monday.

Despite having mature programs in place to process and identify potential incidents, many organizations still struggled with delivering threat intelligence and incident information with relevant legal or privacy teams, crisis management, business operations, and other management-level stakeholders, the report found. Participating organizations found roadblocks to sharing information with stakeholders outside of their incident response teams and IT departments, said Jim Koenig, principal and global leader for commercial privacy, cybersecurity and incident response for health at Booz Allen Hamilton.

Koenig noted that organizations want to collaborate, but they are often deterred from doing so because of potential legal restrictions regarding how data can be shared. Organizations are also uncertain about when to call law enforcement, he said.

At the conclusion of this round, the participants agreed that more formalized procedures needed to be created so that responsibilities and effective communication processes would be clearly defined.

“The challenge is how to coordinate and collaborate across them all,” Mellinger said.

Smaller organizations lacking deep internal cybersecurity resources or seasoned staff tend to rely more heavily on guidance available from other organizations, such as HHS or HITRUST, Mellinger noted. This makes the role of a centralized coordinating agency such as HITRUST’s Cyber Threat Intelligence and Incident Coordination Center (C3) doubly important as it facilitates industry collaboration and allows “multiple entities to get the information they need to prepare and respond, regardless of size,” Mellinger said.

HITRUST will be enhancing its C3Portal with additional tools to encourage collaboration and support incident response, said HITRUST CEO Daniel Nutkis.

The Heartbleed vulnerability is a very good example of how important it is for organizations to share threat information, Mellinger said. HITRUST issued an industry alert listing companies affected by the OpenSSL vulnerability and where software patches were available, so that healthcare organizations had up-to-date information on the situation.

The simulated attacks covered four major types of incidents. In the password breach scenario, participants saw news reports that a large file containing usernames and plain text passwords belonging to users of and various medical facilities and major insurance companies had been leaked. In the network breach scenario, a blogger reported the networks of three major health plan providers had been infiltrated for months and that attackers had full access to patient data. The information leak scenario involved a drug raid in California where law enforcement officials found a large quantity of doctor prescription pads and the information gets leaked to the public. And the final scenario, of insider threat, involved news reports of a California doctor suspected of altering radiology readings.

Various healthcare organizations, including UnitedHealth Group, Humana, Highmark, Health Care Service Corporation (HCSC), AthenaHealth, Cooper Health, WellPoint, the Children’s Medical Center in Dallas, CVS Caremark, and Express Scripts participated in this round, and Booz Allen Hamilton was an observer for the drills.

Exercises such as CyberRX help CISOs and other senior managers understand the kind of cyber-threats facing the healthcare services industry and to consider how all the organizations are inter-connected. The exercise would also help define how industry and government can jointly respond to threats.

The exercise demonstrated the challenges of information sharing, said Kevin Charest, CISO of HHS. Even so, the exercise was worthwhile and HHS will continue to participate, Charest said, adding, “We are all together in this fight.”

These types of cyber exercises and cyber attack simulations are becoming more popular among industry organizations, government, and academia.

Late last year, dozens of London-based banks joined other financial institutions for a giant exercise to test their defenses against a cyber-attack. Dubbed “Waking Shark II“, details of the exercise were kept secret, but sources said it tested how banks coped with a sustained attack, focusing in particular on investment banking systems.

In November 2013, NATO launched a series of cyber exercises to practice warding off massive, simultaneous attacks on member states and their partners.

In April 2012, Lockheed Martin, hosted emerging cyber leaders from U.S. and Canadian military service academies to test their capabilities against experts from the National Security Agency in the annual Cyber Defense Exercise (CDX).

RelatedVerizon Publishes Vastly Expanded 2014 Data Breach Investigations Report

Additional reporting by Mike Lennon

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Data Breaches

LastPass DevOp engineer's home computer hacked and implanted with keylogging malware as part of a sustained cyberattack that exfiltrated corporate data from the cloud...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Application Security

GitHub this week announced the revocation of three certificates used for the GitHub Desktop and Atom applications.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...