12.11.2018 Views

The 10 Most Trusted Healthcare IT Security Solution Providers 2018

With the impending risk in the mind, to assist healthcare organizations to prevent data security breaches, we bring you the “The 10 Most Trusted Healthcare IT Security Solution Providers” issue. In this issue, we are presenting to you some of the prominent companies and healthcare solution providers, who have successfully helped the industry to protect the patients’ information and other critical healthcare data against the ever-rising cyber-attacks.

With the impending risk in the mind, to assist healthcare organizations to prevent data security breaches, we bring you the “The 10 Most Trusted Healthcare IT Security Solution Providers” issue. In this issue, we are presenting to you some of the prominent companies and healthcare solution providers, who have successfully helped the industry to protect the patients’ information and other critical healthcare data against the ever-rising cyber-attacks.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

www.insightscare.com<br />

September <strong>2018</strong><br />

<strong>The</strong> <strong>10</strong><br />

<strong>Most</strong> <strong>Trusted</strong><br />

<strong>Healthcare</strong><br />

<strong>IT</strong> <strong>Security</strong><br />

<strong>Solution</strong> <strong>Providers</strong><br />

<strong>2018</strong><br />

Brian Arellanes<br />

CEO & Founder<br />

<strong>IT</strong>SourceTEK<br />

Leading the Movement in a Risk-Based & Data-Centric<br />

<strong>Security</strong> Approach to Thwart Cybercriminals


From the<br />

Editor<br />

<strong>The</strong> Threat<br />

that Comes<br />

From Within<br />

yber security is healthcare’s hot potato today. Cybercrimes<br />

Chave affected the industry on a very large scale and there’s<br />

no permanent solution reached, if it even exists. With the<br />

rise of these threats at an alarming rate, majority of the healthcare<br />

companies have adopted various strategies to protect their patient’s<br />

data and all the critical information. “Busy fighting the outsiders,<br />

less attention is paid to the menace that lies inside.” It is a known<br />

fact that six out of ten cyber-attacks in the healthcare industry have<br />

an insider from the organization involved.<br />

<strong>The</strong> unpredictability of the insider threat is more than an external<br />

one, pointing to a greater risk. Moreover, the trusted insider has<br />

legitimate access to all the systems of the organization and hence,<br />

the difficulty of going through the already installed security walls is<br />

eliminated. <strong>The</strong>y also know what information is stored where,<br />

making it easier for them to breach the target data. All known and<br />

understood, it is not wrong to say that insider cyber-attacks are one<br />

of the greatest challenges for the healthcare industry in today’s<br />

date.<br />

Insider threats being hard to identify and even harder to prove,<br />

necessary measures to eliminate them should be taken beforehand.<br />

From background check before hiring an employee, or<br />

collaborating with a partner, to timely monitoring the workforce to<br />

controlled and protected access to sensitive data, healthcare<br />

organizations today must take several steps to safeguard all its<br />

digitally stored files. Also, more education on cyber security in<br />

healthcare, provided to the current employees as well as the future<br />

leaders of the industry, will help in reducing inside threats. Along<br />

with this, the most important question you should be asking<br />

yourself is- “What steps will you take differently if you are already<br />

aware that you are going to be robbed, and by someone you trust?”<br />

In the era where digitization has taken over the healthcare space,<br />

what can be a greater threat than cyber-crime? Realizing the same,<br />

many healthcare organizations, today, have strategized various<br />

fences against cyber-attacks. But, most of them fail to acknowledge<br />

the insider threats, focusing only on the external risks. As it is said<br />

widely, ‘Cleanliness begins at home’, it is not wrong to analogize it<br />

with the current scenario of cyber security.<br />

Aishwarya Nawandhar<br />

Aishwarya Nawandhar


Editor-in-Chief Pooja M. Bansal<br />

Managing Editor Ashwini Deshmukh<br />

Executive Editors Aishwarya Nawandhar<br />

Shane Gomez<br />

Contributing Editors<br />

Sayali Rane, Anmol Preet Singh, Rahul Niraj<br />

Visualiser David King<br />

Art & Design Director Amol Kamble<br />

Associate Designer Shweta Shinde<br />

Co-designer Sapana, Rahul<br />

Art & Picture Editor Paul Belin<br />

Jayant Khanna<br />

Senior Sales Manager Amy Jones<br />

Business Development Manager Mark Williams<br />

Sales Executives<br />

Kelli Thomas, Bill Thompson, John Smith<br />

Technical Head Swapnil Patil<br />

Technical Specialist Amar, Vivek, Pratiksha<br />

Digital Marketing Manager Marry D’Souza<br />

SME-SMO Executives<br />

Prashant Chevale, Uma Dhenge<br />

Circulation Manager Robert, Tanaji<br />

Database Management Stella Andrew<br />

Technology Consultant David Stokes<br />

Insights Success Media Tech LLC<br />

555 Metro Place North, Suite <strong>10</strong>0,<br />

Dublin, OH 43017, United States<br />

Phone - (614)-602-1754<br />

Email: info@insightscare.com<br />

For Subscription: www.insightscare.com<br />

sales@insightscare.com<br />

September, <strong>2018</strong><br />

Corporate Ofces:<br />

Insights Success Media and Technology Pvt. Ltd.<br />

Ofce No. 5<strong>10</strong>, 513, 5th Floor, Rainbow Plaza, Shivar Chowk,<br />

Pimple Saudagar, Pune, Maharashtra 41<strong>10</strong>17<br />

Phone - India: 74<strong>10</strong>033802, 74<strong>10</strong>0058552<br />

Email: info@insightscare.com<br />

For Subscription: www.insightscare.com<br />

Copyright © <strong>2018</strong> Insights Success, All rights reserved. <strong>The</strong> content and images used in this magazine should not be reproduced or transmitted in<br />

any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success.<br />

Reprint rights remain solely with Insights Success.


Cover Story 8<br />

<strong>IT</strong>SourceTEK<br />

Leading the Movement in<br />

a Risk-Based & Data-Centric<br />

<strong>Security</strong> Approach to<br />

Thwart Cybercriminals<br />

Articles<br />

Pocket Wellness<br />

Data Cryptology<br />

22<br />

mHealth:<strong>The</strong> New<br />

Horizon in the Health<br />

Technology<br />

34<br />

Tokenization or<br />

Encryption<br />

- Choose Wisely<br />

40<br />

Cybernetics<br />

Strategies for <strong>Healthcare</strong><br />

Organizations to Combat<br />

Cybercrime<br />

Biomarkers<br />

Proteins are<br />

Better Biomarkers<br />

than Genes<br />

28


CONTENTS<br />

16<br />

26<br />

20<br />

24By7<strong>Security</strong><br />

A Comprehensive<br />

Cybersecurity &<br />

Compliance <strong>Solution</strong>s<br />

Provider<br />

32<br />

Hashed Health<br />

Leveraging Blockchain<br />

Technology to Enhance<br />

the Care in <strong>Healthcare</strong><br />

38<br />

Haystack<br />

Informatics<br />

Leveraging Behavioral<br />

Analysis to Secure<br />

Health Systems<br />

against Infringements<br />

42<br />

Prey<br />

Devouring Cyber<br />

<strong>The</strong>ft with Modernism<br />

& Amendment<br />

Seceon<br />

Delivering Cutting-Edge<br />

<strong>IT</strong> <strong>Security</strong> for<br />

<strong>Healthcare</strong>’s Digitally<br />

Transforming World<br />

SecureNetMD<br />

An Innovative<br />

Technology Partner<br />

for <strong>Healthcare</strong> Leaders


Rendering Sophisticated<br />

Data <strong>Security</strong> <strong>Solution</strong>s<br />

to Leading <strong>Healthcare</strong><br />

Enterprises<br />

ealthcare has witnessed extensive digitization in the recent years. Although this has remarkably transformed<br />

Hthe services in healthcare, it comes with a challenging side-effect: risk of information security. <strong>Healthcare</strong><br />

has been one of the prime targets for cybercriminals; and with the healthcare data being very sensitive in<br />

nature, this is a major concern. It is of immense significance that the healthcare companies be aware and implement<br />

the best practices to secure the information of their patients as well as the organization.<br />

With the impending risk in the mind, to assist healthcare organizations to prevent data security breaches, we bring<br />

you the “<strong>The</strong> <strong>10</strong> <strong>Most</strong> <strong>Trusted</strong> <strong>Healthcare</strong> <strong>IT</strong> <strong>Security</strong> <strong>Solution</strong> <strong>Providers</strong>” issue. In this issue, we are presenting<br />

to you some of the prominent companies and healthcare solution providers, who have successfully helped the industry<br />

to protect the patients' information and other critical healthcare data against the ever-rising cyber-attacks.<br />

<strong>The</strong> cover of this magazine showcases the award-winning leader in the <strong>IT</strong> security industry, <strong>IT</strong>SourceTEK. It offers<br />

risk-based and data-centric security solutions against cybercrime.<br />

Other than this perceptive cover story, the magazine also features Haystack Informatics, a behavior analytics<br />

company that assists healthcare providers, Prey Software which offers several cutting-edge anti-theft services,<br />

Hashed Health solving most important problems in healthcare with blockchain and DLT, Seceon that has been<br />

safeguarding healthcare data from potential breaches, 24By7<strong>Security</strong>, a cyber-security and compliance specialist and<br />

advisory firm, and SecureNetMD providing HIPAA compliance managed technology solutions. Apart from these, we<br />

have selected a few more pioneers of the industry viz. Barrier1, BeyondTrust, and Sensato.<br />

As you journey through the magazine, make sure to not miss out on an insightful article titled ‘Proteins are Better<br />

Biomarkers than Genes’ by Dr. Steven Pelech, the Founder, President, and CSO of Kinexus Bioinformatics<br />

Corporation. Flipping through some more pages, you will find our masterly crafted in-house articles from Pocket<br />

Wellness, Data Cryptology, and Cybernetics. Walking through all the pages in this magazine of ours, you will be<br />

introduced to an interesting world of novelty.<br />

So, turn the pages and enjoy a good read!


Cover Story<br />

<strong>IT</strong>SourceTEK<br />

Leading the Movement in a Risk-Based &<br />

Data-Centric <strong>Security</strong> Approach<br />

to Thwart Cybercriminals<br />

‘<br />

Our clients are at the center of our services.<br />

We thrive to provide the best possible<br />

solutions to their problems<br />


Brian Arellanes<br />

CEO & Founder


One of the most valuable assets of a company is information. And<br />

today, ‘digital data is the new black’. <strong>The</strong> wave of digitization has<br />

revolutionized every profession in every sector. Like every good,<br />

it also comes with a challenge; challenge of security. As digitization comes<br />

bearing countless advantages and now has become inevitable, information<br />

security is one of the greatest threats to any organization today.<br />

<strong>IT</strong>SourceTEK is an <strong>IT</strong> security solutions company that guides its<br />

customers to protect their data from cybercrimes. It is an award-winning<br />

leader in the Information <strong>Security</strong> industry. <strong>The</strong> company provides<br />

strategic business and technology based cyber security solutions that<br />

leverage enterprise investments and improve efficiency to meet stringent<br />

compliance standards. <strong>The</strong> team of <strong>IT</strong>SourceTEK has extensive real world<br />

experience in leading and supporting organizations spanning across many<br />

industries.<br />

<strong>IT</strong>SourceTEK is driven by the mission to exceed its clients’ expectations<br />

with exceptional service while using success to give back to charities and<br />

the community. Honesty and transparency, with no sales pressure or<br />

‘<br />

We provide customized<br />

solutions to all our clients<br />

‘<br />

pushing a specific solution, are the key traits behind its success. <strong>The</strong> firm is<br />

strategic with access to the best solutions, and deep relationships across<br />

industries and technologies.<br />

<strong>The</strong> Journey of Growth and Development<br />

In its journey of more than a decade, <strong>IT</strong>SourceTEK has overcome many<br />

challenges and evolved to thwart newly emerging threats for the industry’s<br />

leading clients’ environments. At the beginning of this journey, it<br />

supported executives on critical projects at Northrop Grumman, Wells<br />

Fargo, and BD Biosciences. <strong>IT</strong>SourceTEK grew from those initial clients<br />

into many other high-profile large and complex environments in both the<br />

public and the private sectors. <strong>The</strong> technology, then, started moving away<br />

rapidly from a controlled perimeter, due to the proliferation of smart<br />

mobile devices, IOT, and Cloud/SaaS providers. In this, the team of<br />

<strong>IT</strong>SourceTEK saw an opportunity to impact their clients’ security by<br />

helping them move from only a perimeter-based security approach to a<br />

data centric security approach. Since then, they have helped many of their<br />

Fortune 500 clients in protecting their data by embracing the company’s<br />

data centric approach to security.<br />

Safeguarding <strong>Healthcare</strong> from the Very Start<br />

Towards the beginning of its journey to protect data, <strong>IT</strong>SourceTEK helped


‘<br />

We help our clients protect<br />

their valuable data and assets<br />

from multi-directional threats<br />

‘<br />

Nina Do, COO<br />

provide McKesson with consulting<br />

services to securely architect and<br />

develop its databases in support of<br />

some of its more critical applications.<br />

Another one of the company’s<br />

contributions was to protect Patient<br />

<strong>Healthcare</strong> Information (PHI). In this,<br />

it secured more than <strong>10</strong>0 Million<br />

Electronic Medical Records (EMR) on<br />

a project supporting EDS/HPE for the<br />

California Department of Corrections<br />

& Rehabilitation. <strong>The</strong> organization<br />

provided architecture, development,<br />

and security of BD’s medical device<br />

firmware and desktop based<br />

applications used to analyze blood<br />

work down to the genomic level for<br />

AIDS, Cancer, and other diseases. In<br />

addition, it has provided complete<br />

assessments, <strong>IT</strong> support, and security<br />

of ambulatory and surgery centers for<br />

industry leaders like Amsurg. Now, it<br />

is helping some of these and other<br />

healthcare giants look at new and<br />

exciting innovations around the<br />

automation of Governance, Risk, and<br />

Compliance (GRC) and securing data<br />

in more modernized environments,<br />

including Cloud and SaaS.<br />

Prominent <strong>Solution</strong>s<br />

At its nucleus, <strong>IT</strong>SourceTEK is a data<br />

security company. <strong>The</strong>n, as it expands<br />

outward in its offerings to protect data,<br />

the cellular membrane of the firm<br />

includes the following capabilities:<br />

Data Governance, Risk, and<br />

Compliance (GRC) Support &<br />

<strong>Solution</strong>s- It provides assessments,<br />

requirements, and gap analysis for<br />

security standards (such as HIPAA,<br />

SOX, PCI-DSS, and GDPR), and other<br />

regulatory requirements. It creates<br />

policies and provides solutions to fill


<strong>The</strong> <strong>10</strong> MOST <strong>Trusted</strong><br />

<strong>Healthcare</strong><br />

<strong>IT</strong> <strong>Security</strong><br />

<strong>Solution</strong> <strong>Providers</strong> <strong>2018</strong><br />

any gaps and achieve compliance, ensuring that the<br />

companies meet stringent security standards for<br />

how their data is used, managed, and stored.<br />

Data Encryption, Masking, and Tokenization- It<br />

helps to protect sensitive structured and<br />

unstructured data while at rest and in motion. This<br />

can start at the user interface, on the web or internal<br />

application, and extend through the back-end<br />

systems or data lakes, including Cloud/SaaS<br />

providers. Regardless of the storage location or file<br />

type, it helps to transparently encrypt the<br />

unstructured data to exceed compliance<br />

requirements.<br />

‘ We are not<br />

a sales-based<br />

organization,<br />

rather a trusted<br />

advisory solution<br />

provider<br />

‘<br />

Threat Detection and Policy Enforcement- With the<br />

advanced data science and machine learning, it<br />

helps to develop analytics and create inline<br />

protection to enforce security policies for the<br />

protection of sensitive data in real-time. Its<br />

solutions help to detect anomalies before data and<br />

<strong>IT</strong>, IoT, and OT systems are compromised. <strong>The</strong>y<br />

also analyze, protect, and report threats from<br />

malicious insiders, ransomware, and other policy<br />

violations using Application and Database <strong>Security</strong><br />

Platforms, autonomous threat intelligence, NAC,<br />

and/or combination of these solutions.<br />

DNS and WAF Protection- DNS ports are becoming<br />

a common path for stealing data, as DLPs and other<br />

solutions can’t detect the theft. It addresses these<br />

vulnerabilities and provides protection against<br />

threats such as data exfiltration through the ports in<br />

the DNS. Its recommended DNS and WAF<br />

solutions prevent or mitigate impact from DDoS<br />

and other mission critical attacks.<br />

Cloud <strong>Security</strong> Strategies and <strong>Solution</strong>s- It helps to<br />

develop automated security functions to extend<br />

protection as the data and applications move to<br />

Cloud and SaaS platforms. This also includes<br />

automation of policies and configurations for<br />

provisioning and data management functions.<br />

Guided by the Diverse and Resilient Leadership<br />

Team<br />

Brian Arellanes, CEO and Founder, is an<br />

accomplished professional with 20+ years of<br />

award-winning leadership in the technology and<br />

security space. He collaborates with and advises<br />

some of the top C-level executives and <strong>Security</strong><br />

professionals in the world, while also finding time<br />

to feed his passion of giving back to the<br />

community.


<strong>The</strong> COO, Nina Do, has been with <strong>IT</strong>SourceTEK for 11+<br />

years leading the operational aspects of the company, which<br />

includes Marketing, Advertising, Process Design and<br />

Governance, HR, Payroll, and A/P functions. Nina’s past<br />

experience as an Advertising Executive with a creative<br />

focus for some of the largest global firms has helped her to<br />

streamline messaging and operational efficiencies that better<br />

meet the needs of <strong>IT</strong>SourceTEK’s employees and clients,<br />

while reducing costs with automation.<br />

‘<br />

We believe in<br />

giving back to<br />

those in need<br />

‘<br />

Walter Jones, CIO, is a technology mogul with 40+ years<br />

of experience, many of which were at a C-level, leading<br />

thousands of employees at Fortune 50 organizations like<br />

Wells Fargo. Walter’s passion to accomplish business<br />

objectives while bringing up the next generation of thought<br />

leaders is second to none.<br />

Matt Whitmarsh is the EVP and a trusted and experienced<br />

leader having more than 25 years of technology and<br />

security experience. He has led large public and private<br />

rd<br />

sector projects responsible for P&L, internal and 3 party<br />

resources, and delivery of complex systems.<br />

<strong>The</strong> Director of Operations, Jean Dubois, is a seasoned<br />

leader with 25+ years of experience that is well versed in<br />

financials and streamlining processes. Her entrepreneurial<br />

spirit brings a creative and people oriented approach to<br />

running operations.<br />

Idiosyncratic tactics<br />

A key differentiator for <strong>IT</strong>SourceTEK is its unique<br />

approach. It is not a sales-based organization, rather a<br />

trusted advisory practice for its clients to draw upon. As<br />

thought leaders in the data security and compliance space,<br />

the company invests heavily in understanding the best<br />

practices and solutions available. Its client relationships are<br />

all managed by trusted executives that have been executives<br />

in similar roles as its clients; this is advantageous to<br />

immediately provide insights based on their real world<br />

experience.<br />

Furthermore, it is product agnostic and is constantly<br />

evaluating proven and emerging technologies.<br />

<strong>IT</strong>SourceTEK helps its clients to look at the solutions that<br />

have been thoroughly vetted, to help them avoid costly<br />

investigative efforts and/or delays associated with the<br />

vetting process. As it relates to product-based solutions, the<br />

firm's value is further added by bringing strong partner<br />

relationships to its clients at the executive level and high<br />

partner status with deep discounts above the regular buying<br />

power. Along with this, it constantly looks for ways to<br />

automate its internal processes; advising similarly to its<br />

clients. This ensures that its employees have the best tools<br />

and methods to accomplish their tasks. <strong>IT</strong>SourceTEK also<br />

invests in conferences, seminars, and training courses to<br />

help its employees stay ahead in this competitive industry.<br />

Accolades and Reverence<br />

<strong>IT</strong>SourceTEK has earned many awards since 2006. Some<br />

of their top honors by some prominent sources from a past<br />

few years include Minority Cyber <strong>Security</strong> Company of the<br />

Year 2017, <strong>Most</strong> Valuable <strong>Healthcare</strong> <strong>Solution</strong> Provider<br />

Companies 2017, Top <strong>10</strong> <strong>Healthcare</strong> Compliance <strong>Solution</strong><br />

<strong>Providers</strong> 2016, HP Supplier of the Year for NMSDC 2013<br />

& 2015, and <strong>10</strong>0 Fastest Growing Hispanic Business in the<br />

USA 2012-2014, amongst many others.<br />

<strong>The</strong> greatest achievement for any company is the<br />

acknowledgement from its clients. <strong>IT</strong>SourceTEK has been<br />

praised for always being highly responsive to its client’s<br />

requests to help them fully achieve their goals with a strong<br />

return on investment. Its clients have also appreciated the<br />

company’s technical and strategic depth to help steer them<br />

in the right direction and for finding creative ways to ensure<br />

that they don’t exceed budgetary thresholds.<br />

Arm-in-Arm with the Developments in <strong>Security</strong><br />

Industry<br />

With the continual pressure to increase security and<br />

regulations to match, <strong>IT</strong>SourceTEK’s viewpoint is simple;<br />

protect the data by building a proper governance program<br />

with policies and the technology to enforce them. As every<br />

organization is at a different level of maturity and has a<br />

different level of commitment (or budget) to do everything<br />

required; it creates customized solutions for each client.<br />

Addressing the public outcry to increase the level of<br />

protection used for their data, the firm is constantly<br />

evaluating new ways to do so efficiently.<br />

Future Plans<br />

<strong>IT</strong>SourceTEK looks to continue building its reputation as a<br />

thought leader in the data security and GRC space to help<br />

drive wider adoption of its data centric security and riskbased<br />

approaches.


SUBSCRIBE<br />

TODAY<br />

Never Miss an Issue<br />

Yes I would like to subscribe to Insights Care Magazine.<br />

Global Subscription<br />

1 Year.......... (12 Issues) .... $250.00<br />

6 Months ..... (06 Issues) ..... $130.00<br />

3 Months ... (03 Issues) .... $70.00 1 Month ...... (01 Issue) ..... $25.00<br />

Name :<br />

Address :<br />

Date :<br />

Telephone :<br />

Email :<br />

City : State : Zip :<br />

Country :<br />

Check should be drawn in favor of : INSIGHTS SUCCESS MEDIA TECH LLC<br />

CORPORATE OFFICE<br />

Insights Success Media Tech LLC<br />

555 Metro Place North, Suite <strong>10</strong>0,<br />

Dublin, OH 43017, United States<br />

Phone - (614)-602-1754,(302)-319-9947<br />

Email: info@insightscare.com<br />

For Subscription : www.insightscare.com


Company Name Management Brief<br />

24By7<strong>Security</strong><br />

24by7security.com<br />

Sanjay Deo<br />

Founder & President<br />

24By7<strong>Security</strong>, Inc. is a Cybersecurity & Compliance<br />

specialist and advisory firm with extensive hands on<br />

experience helping businesses build a defensive <strong>IT</strong><br />

Infrastructure against all cyber security threats.<br />

Barrier1<br />

thebarriergroup.com<br />

James Libersky<br />

CEO<br />

Barrier1 integrates Intelligent Threat<br />

Management with Automated<br />

Threat Management.<br />

BeyondTrust<br />

beyondtrust.com<br />

Kevin Hickey<br />

President & CEO<br />

BeyondTrust delivers the visibility and control needed to<br />

confidently reduce risk and maintain productivity.<br />

Hashed Health<br />

hashedhealth.com<br />

John Bass<br />

CEO & Founder<br />

Hashed Health is a fast growing Technology Company that<br />

leverages blockchain and DLT to solve the most important<br />

problems in healthcare.<br />

Haystack Informatics<br />

haystackinformatics.com<br />

<strong>IT</strong>SourceTek<br />

itsourcetek.com<br />

Adrian Talapan<br />

Co-founder & CEO<br />

Brian Arellanes<br />

CEO & Founder<br />

Haystack Informatics is a behavior analytics company assisting<br />

healthcare providers with the deep understanding of their<br />

employees’ behavior and its ramifications in the areas of<br />

privacy/ insider risk monitoring and operational improvement.<br />

<strong>IT</strong>SourceTEK provides strategic business and technology<br />

based cyber security solutions that leverage enterprise<br />

investments and improve efficiency to meet stringent<br />

compliance standards.<br />

Prey software<br />

preyproject.com<br />

Carlos Yaconi<br />

Founder & CEO<br />

Prey is an anti-theft software company that protects and<br />

helps to locate computers, tablets, and phones remotely,<br />

simply, and quickly.<br />

Seceon<br />

seceon.com<br />

Chandra Pandey<br />

CEO & Founder<br />

Seceon delivers pioneering cybersecurity solutions that<br />

protect all-sized organizations by immediately flagging,<br />

quarantining, and eliminating any threats before they do any<br />

damage.<br />

SecureNetMD<br />

securenetmd.com<br />

Jack Berberian<br />

Founder & CEO<br />

SecureNetMD is a fast growing HIPAA Compliant Managed<br />

Technology <strong>Solution</strong>s Provider that helps healthcare leaders<br />

make better decisions around technology.<br />

Sensato<br />

sensato.co<br />

John Gomez<br />

CEO<br />

Sensato is focused on providing leading-edge, realistic<br />

cybersecurity solutions to the healthcare and critical<br />

infrastructure sectors.


24By7<strong>Security</strong><br />

A Comprehensive Cybersecurity & Compliance<br />

<strong>Solution</strong>s Provider<br />

Cyber security in healthcare is a<br />

growing concern these days,<br />

since there has been a steady<br />

rise in hacking and <strong>IT</strong> security<br />

breaching incidents in the past few<br />

years. Many healthcare organizations<br />

are struggling to defend their network<br />

perimeter and keep cybercriminals at<br />

bay. A company that addresses this<br />

issue head-on is 24By7<strong>Security</strong>, Inc. It<br />

is a cybersecurity and compliance<br />

company with demonstrated expertise<br />

in helping businesses build a defensive<br />

<strong>IT</strong> Infrastructure against all<br />

cybersecurity threats.<br />

An award-winning and respected<br />

member of the security community,<br />

24By7<strong>Security</strong> provides a rich menu of<br />

security and compliance services,<br />

including the flagship <strong>Security</strong> Risk<br />

Assessment and HIPAA Compliance<br />

Package. It has been in business since<br />

June 2013 and has provided<br />

cybersecurity consulting services to<br />

several organizations. <strong>The</strong> company's<br />

team members have numerous<br />

certifications and have been actively<br />

involved in <strong>IT</strong> security projects for<br />

years.<br />

<strong>The</strong> Leader behind Its Success<br />

<strong>The</strong> company is the brain child of<br />

Sanjay Deo, who is the President of<br />

24By7<strong>Security</strong>. In 2013 Sanjay was the<br />

CEO of a <strong>Security</strong> Operations Center<br />

and Consulting firm. With several<br />

years of information security<br />

experience in multiple industries, he<br />

16<br />

| September <strong>2018</strong> |<br />

saw an opportunity in healthcare<br />

security and compliance. That’s when<br />

he founded HIPAA-H<strong>IT</strong>ECH-<br />

SOLUTIONS, Inc. with the mission of<br />

providing HIPAA compliance services<br />

in South Florida. As the business grew,<br />

more opportunities appeared and its<br />

client segment started expanding. <strong>The</strong><br />

company’s team consists of experts in<br />

cybersecurity, healthcare technology,<br />

and consulting. With their help Sanjay<br />

decided to expand the business to<br />

cover all industries. That is when<br />

24By7<strong>Security</strong> was born and the old<br />

company folded into the umbrella of<br />

24By7<strong>Security</strong>.<br />

Sanjay has over twenty years of<br />

cybersecurity and compliance<br />

experience. He holds a Master’s degree<br />

in Computer Science from Texas A&M<br />

University, and is a Certified<br />

Information Systems <strong>Security</strong><br />

Professional (CISSP) and <strong>Healthcare</strong><br />

Information <strong>Security</strong> and Privacy<br />

“We strive to leave<br />

no gaps, by using a<br />

360-degree approach<br />

for security and<br />

privacy for our clients.<br />

Don't Risk <strong>IT</strong>,<br />

Secure <strong>IT</strong>®”<br />

Practitioner (HCISPP). He serves on<br />

the Board of the South Florida CIO<br />

Council, and also Co-Chairs the South<br />

Florida CISO Forum. Sanjay is a<br />

frequent speaker on <strong>IT</strong> Governance,<br />

Compliance and Cybersecurity at<br />

national conferences. He is a member<br />

of the South Florida InfraGard Alliance<br />

and Sector Chief for the Information<br />

Technology track.<br />

Distinct and Holistic Services of the<br />

Company<br />

24By7<strong>Security</strong> offers cybersecurity<br />

related services in the areas of strategy,<br />

assessments, remediation, and training<br />

for all major industries including<br />

healthcare, education, hospitality,<br />

financial, insurance, government, law<br />

firms, retail, manufacturing and<br />

entertainment. As cybersecurity<br />

concerns continue to rise, businesses<br />

seek professional services to enable<br />

better security and ensure their<br />

confidential data is properly protected.<br />

<strong>The</strong> company helps its clients manage<br />

their data privacy while getting<br />

compliant with regulations that major<br />

industries like finance, healthcare, and<br />

education are required to uphold.<br />

24By7<strong>Security</strong> provides a holistic list<br />

of services which includes:<br />

Cybersecurity Services: <strong>Security</strong> Risk<br />

Assessment, Vulnerability Assessment,<br />

Virtual or Part-time CISO, Web<br />

Application Testing, Social<br />

Engineering Testing, Physical <strong>Security</strong><br />

Testing, Policies and Procedures.


<strong>The</strong> <strong>10</strong> MOST <strong>Trusted</strong><br />

<strong>Healthcare</strong><br />

<strong>IT</strong> <strong>Security</strong><br />

<strong>Solution</strong> <strong>Providers</strong> <strong>2018</strong><br />

Compliance Services: HIPAA/ H<strong>IT</strong>ECH, H<strong>IT</strong>RUST,<br />

GLBA, FFIEC, FIPA, SOC – SSAE 18, GDPR,<br />

FERPA, New York Cybersecurity Regulations, SOX,<br />

Dodd Frank Act, PCI DSS, FedRAMP, NIST –<br />

Cybersecurity Framework, and ISO-IEC 27001.<br />

Cyber Incident Management: Incident Response, Cyber<br />

Incident Investigation, Forensics, and Remediation.<br />

Training: HIPAA Training and Cybersecurity<br />

Awareness Training.<br />

<strong>The</strong> firm’s proprietary <strong>Security</strong> 2.0 – {Reactive,<br />

Proactive, Counteractive} model allows it to adjust its<br />

methodology to deliver the right type of resolution for<br />

each situation. 24By7<strong>Security</strong>’s comprehensive<br />

Defense in Depth 2.0 approach allows its clients to<br />

understand the full extent of their vulnerabilities and to<br />

create an end-to-end security strategy.<br />

Achievements of 24By7<strong>Security</strong><br />

<strong>The</strong> company has achieved many milestones throughout<br />

its 5-year journey. Some of them are:<br />

· 500+ <strong>Security</strong> and Privacy risk assessments<br />

conducted as of September <strong>2018</strong>.<br />

· New company website launched in July <strong>2018</strong><br />

· Certified as a State of Florida Certified Business<br />

Enterprise–Woman owned and Minority Owned<br />

Business Enterprise (WBE/ MBE) in May 2017<br />

· Sanjay Deo, President and Founder of 24By7<strong>Security</strong>,<br />

appointed as Technology Sector Chief for FBI<br />

Infragard, South Florida chapter<br />

<strong>The</strong> company launched HIPAA Happenings, an<br />

educational networking session on HIPAA Compliance<br />

for healthcare providers and staff in South Florida. <strong>The</strong><br />

second session of HIPAA Happenings will be a brand<br />

new, complimentary virtual offering of the mandatory<br />

<strong>2018</strong> HIPAA Compliance training for healthcare<br />

providers.<br />

Offering Hassle-free Work Environment<br />

<strong>The</strong> firm has team members from varying backgrounds<br />

such as healthcare, information technology, compliance,<br />

<strong>IT</strong> <strong>Security</strong>, finance, government, and more. Its team<br />

members are at varying levels of seniority ranging from<br />

CIO, CISO, and Technology Director to <strong>Security</strong><br />

managers and <strong>Security</strong> Analysts. 24By7<strong>Security</strong>’s team<br />

members are highly credentialed in information security<br />

and healthcare. It provides competitive compensation<br />

and benefits recognizing the value of its employees.<br />

Sanjay Deo<br />

Founder & President<br />

<strong>The</strong> company’s mission statement includes providing a<br />

positive and productive workplace to its employees. It<br />

encourages a friendly, communicative, and flexible work<br />

environment and plans team events frequently to build<br />

camaraderie. 24By7<strong>Security</strong> offers several educational<br />

opportunities to team members to attend conferences and<br />

training programs.<br />

<strong>The</strong> company believes and values its old traits in keeping<br />

up with daily challenges. “Sometimes it’s the good old<br />

traits that come a long way,” asserts Sanjay. It has a fivepronged<br />

approach towards its projects and assessments,<br />

which when working together seamlessly in a project, helps<br />

its clients achieve success. This approach includes people,<br />

process, tools/ technology, in-depth PHI/ PII review, and<br />

communication/ documentation. This is evident in the high<br />

number of repeat contracts and word-of-mouth referrals<br />

24By7<strong>Security</strong> receives.<br />

Booming Future of 24By7<strong>Security</strong><br />

Currently, 24By7<strong>Security</strong> is growing rapidly in markets<br />

within and outside South Florida, expanding within the<br />

state and also in other states. In the years to come, it<br />

projects itself as a major regional player and advisory<br />

company in cybersecurity and compliance functions. From<br />

a company size point of view, it expects to be at least<br />

double its current size in terms of revenue and team<br />

strength.<br />

| September <strong>2018</strong> |<br />

17


<strong>Healthcare</strong>


Hashed Health<br />

Leveraging Blockchain Technology to Enhance<br />

the Care in <strong>Healthcare</strong><br />

In a time when almost everything<br />

people knew about blockchain<br />

revolved around bitcoin, John<br />

Bass, the CEO and Founder of<br />

Hashed Health, envisioned how the<br />

underlying technology could transform<br />

healthcare. In early 2016, this was a<br />

radical connection. When its potential<br />

clients likely only knew of the<br />

technology because they paid a ransom<br />

using bitcoin, the idea that blockchain<br />

might ultimately save healthcare was<br />

easily dismissed. Nevertheless,<br />

Nashville, Tennessee, a town built on<br />

traditional healthcare, has now<br />

embraced Hashed Health as a star.<br />

Hashed Health is a fast-growing<br />

Technology Company that leverages<br />

blockchain and distributed ledger<br />

technologies (DLT) to solve<br />

healthcare’s most important problems.<br />

<strong>The</strong> company endeavors to build an<br />

ecosystem of businesses that organize<br />

networks of stakeholders around<br />

blockchain technology solutions which<br />

will, in turn, impact the cost and<br />

quality of healthcare in the U.S. and<br />

globally. Hashed Health believes that<br />

blockchain is the framework that will<br />

underpin the changes to value and<br />

delivery structures, enabling a more<br />

sustainable, patient-centric system.<br />

From the CEO’s Corner<br />

John is a healthcare innovator and an<br />

international speaker seasoned with<br />

two decades of experience in the<br />

healthcare industry. He has spent his<br />

career building businesses that help<br />

organizations realize value through<br />

collaboration in previously siloed<br />

areas. His earlier success stemmed<br />

from solving institutional issues around<br />

transparency, trust, and the alignment<br />

of incentives in a world before<br />

blockchain. Early on, John recognized<br />

that blockchain is purpose-built to<br />

solve these exact issues.<br />

To start Hashed Health, a company<br />

based on a technology in which few<br />

people could see utility, he walked<br />

away from a CEO role at a subsidiary<br />

of the city’s most prominent healthcare<br />

company. “For me, blockchain was the<br />

first thing I’ve seen since the internet<br />

that has the opportunity to change the<br />

conversation around healthcare. All of<br />

these things that the blockchain has<br />

become known for can be applied to<br />

“We build<br />

blockchain solutions<br />

that address long<br />

standing problems<br />

in healthcare”<br />

healthcare to solve some of these really<br />

traditional problems that we’ve always<br />

wrestled with,” says John.<br />

An Innovative Organizational<br />

Structure<br />

When Hashed Health was launched as<br />

a product company in 2016, there was<br />

no market for blockchain solutions. It<br />

had to create one.<br />

“Our goal is to be a product company,<br />

but we had to build a market first. That<br />

was the interesting conundrum.<br />

Blockchain is not just about a product;<br />

it’s about a network. In order for a<br />

product to be meaningful, you have to<br />

have a network of participants ready to<br />

use that product and that means<br />

addressing both technical and nontechnical<br />

concerns,” John said.<br />

<strong>The</strong> Hashed Health model has three<br />

distinct, synergistic areas to launch<br />

meaningful products in its unique<br />

space.<br />

Hashed Enterprise helps healthcare<br />

organizations and other companies<br />

understand how blockchain could<br />

affect their businesses, the drivers of<br />

cost and value for blockchain in<br />

healthcare, and use-cases appropriate<br />

for blockchain. Enterprise is the<br />

services arm of Hashed Health. Its<br />

customers include some of the largest<br />

insurance companies, non-profits, <strong>IT</strong><br />

20<br />

| September <strong>2018</strong> |


<strong>The</strong> <strong>10</strong> MOST <strong>Trusted</strong><br />

<strong>Healthcare</strong><br />

<strong>IT</strong> <strong>Security</strong><br />

<strong>Solution</strong> <strong>Providers</strong> <strong>2018</strong><br />

vendors, and government agencies in the US and<br />

abroad.<br />

Hashed Labs is a team of blockchain healthcare product<br />

managers and engineering talent. <strong>The</strong>y build product<br />

and work on innovative business models and<br />

governance structures. This team specializes in finding<br />

the sweet spot between a technical solution, an<br />

innovative business model, and a governance<br />

mechanism that makes a product come to life.<br />

Hashed Collective is an open community-building<br />

forum for healthcare organizations, consumers,<br />

entrepreneurs, and developers to talk about blockchain<br />

applications for healthcare. Collective includes<br />

meetups, podcasts, webinars, newsletters, online<br />

educational resources, and other innovative communitybuilding<br />

tools to help broaden the community of<br />

blockchain healthcare advocates.<br />

<strong>The</strong>se three areas of the company work in sync to<br />

support market-development activities alongside<br />

Hashed Health's products and partnerships.<br />

More than just a Technology Company<br />

<strong>The</strong> core team of Hashed Health has their background<br />

in healthcare, enabling the company to stay on the front<br />

lines of Health <strong>IT</strong>, payment models, and care delivery.<br />

<strong>The</strong>y understand the problems and the obstacles in<br />

healthcare and sees blockchain as a way to fix them.<br />

Blockchain, for Hashed Health, is not a technology in<br />

search of a problem. If a problem can be solved without<br />

blockchain, the Hashed team will be the first to say so.<br />

As a company, it is also platform-agnostic – for each<br />

application and each use-case the team looks at all<br />

available blockchain platforms and tool sets and then<br />

works with the stakeholders to pick the best instance for<br />

the problem at hand. <strong>The</strong> firm’s values are intertwined<br />

with blockchain’s core characteristics – trust,<br />

collaboration, transparency, and incentive alignment.<br />

<strong>The</strong> Milestones in Its Journey to Success<br />

<strong>The</strong> company just celebrated it two-year anniversary.<br />

From local meet-ups to co-hosting the world’s premiere<br />

blockchain-focused healthcare conference, Hashed<br />

Health has successfully led blockchain to its place as<br />

one of the hottest topics in healthcare. Travelling<br />

around the world, the team has presented and keynoted<br />

John Bass<br />

CEO & Founder<br />

at major healthcare and blockchain events by invitation<br />

from major healthcare players and governments.<br />

To add to its glory, the developers at Hashed Health have<br />

completed and won premiere hackathon events like<br />

ETHWaterloo and Discover Blockchain, to name a few.<br />

Individually, John has been awarded Nashville Technology<br />

Council 2017's Innovator of the Year.<br />

Strong-Willed to Better the Future of <strong>Healthcare</strong><br />

Currently, the company is building an ecosystem of<br />

solutions that address previously unsolvable problems.<br />

Hashed Health endeavors to create a portfolio of<br />

complementary and symbiotic applications that will<br />

fundamentally change healthcare delivery. With<br />

frameworks and marketplaces, it wants to allow the<br />

industry, constrained by legacy practices and technologies,<br />

to evolve without blowing up a system so many patients<br />

depend on.<br />

“Starting from scratch is not an option, but the current<br />

system is unsustainable – blockchain is how this generation<br />

can evolve away from today’s healthcare infrastructure that<br />

is collapsing under its own weight,” John said.<br />

| September <strong>2018</strong> |<br />

21


mHealth:<br />

<strong>The</strong> New Horizon in the Health Technology<br />

22<br />

| September <strong>2018</strong> |


Pocket Wellness<br />

Mobile health or mhealth is a general term coined for the use of mobile or wireless technology in the<br />

healthcare systems. It is a part of ehealth healthcare practice. <strong>The</strong> most common application of the<br />

ehealth is to educate the consumers about the preventive health care services. It is also used in disease<br />

surveillance, treatment support, epidemic outbreak tracking, and chronic disease management. mhealth is popular<br />

due to the areas that are accompanied by a large population and the widespread mobile phone usage. Within the<br />

digital health, mhealth encompasses all the application of multimedia and telecommunication ensuring accurate<br />

delivery of the healthcare and health information.<br />

Some of the practical examples of mhealth are the voice communication and mobile messaging for the provider to<br />

improve the health behavior. Mobile technologies are helping the healthcare sector in improving training and service<br />

quality of healthcare workers, reducing the cost of service along with reducing the redundancy and duplication of the<br />

collected information.<br />

Motivation<br />

One of the main aspects of the mhealth is to push the limits of the healthcare sector and quickly acquire, transport,<br />

store, secure, and process the raw processed data into useful and meaningful results. mhealth offer various abilities to<br />

the remote individuals so that they can participate in the healthcare value matrix, which was not possible in the past.<br />

In many such cases, these participants can provide their valuable contribution in gathering data or<br />

create awareness of the disease in public health like outdoor pollution, violence, or drugs.<br />

Motivation arises in mhealth due to the following two factors:<br />

<strong>The</strong> first factor is the rise of the constraints faced by the healthcare system of<br />

developing nations. <strong>The</strong>se constraints include the population growth, limited<br />

financial resources, the burden of disease prevalence, and a large number of<br />

the rural inhabitant.<br />

<strong>The</strong> second factor is the rise in mobile phones in the world and its large<br />

population. <strong>The</strong> greater access to the mobile phones in all segments of the<br />

country helps in saving information and transitional costs for the proper<br />

healthcare delivery.<br />

Health Outcomes<br />

<strong>The</strong> integration of the technology with the health sector has promoted the<br />

betterment of the health, its lifestyle, and has improved the decision-making<br />

ability of healthcare professionals. Overall improvement is seen in the areas like<br />

health information and the instant connection between patients and health professionals,<br />

which was not possible before. Following that, there is an increased usage of technology that has<br />

reduced the health costs and has improved the efficiency of the healthcare systems. <strong>The</strong> growth of health-related<br />

applications has further boosted the growth of the mhealth.<br />

A potential implementation is the direct voice communication for the poor literates and local-language versed<br />

people. <strong>The</strong> phones equipped with the local language aid in information transfer capabilities that were not available<br />

before. With the help of the mobile technology, the support for the existing workflow within the mhealth sector and<br />

the general public has increased.<br />

| September <strong>2018</strong> |<br />

23


<strong>The</strong> Advantages<br />

mhealth provides various versatile advantages across all the<br />

areas of the healthcare industry. It not only helps the<br />

disease-affected citizens but also helps in monitoring<br />

potential patients that are at risk. Furthermore, it has<br />

incredible potential in the biometric hardware and real-time<br />

analytics.<br />

Majority of doctors believe that the applications developed<br />

in the name of health are actually beneficial. Around ninetythree<br />

percent of doctors suggest that the mobile healthcare<br />

applications help in improving the overall health.<br />

Some of the most common advantages of mhealth devices<br />

are:<br />

Medication reminder- Using a reminder, the public can set<br />

timers for their medications, exercise, and many more such<br />

activities.<br />

Fitness trackers- People can monitor their fitness and<br />

burned calories.<br />

Calories counter- People can monitor how much calories<br />

they are taking-in and can control it.<br />

Mobile emergency health communication- Citizens can<br />

contact their loved ones in any kind of emergencies. If the<br />

device has autonomous capabilities, it can automatically<br />

contact the concerned authorities.<br />

Heart and Vital monitoring- Application rendered with the<br />

vital monitoring abilities can be very useful. Citizens can<br />

use these while exercising or in the case of emergency for<br />

example, patients’ vitals’ can be monitored in an<br />

ambulance.<br />

As mhealth is becoming widely known, healthcare<br />

providers are embracing the mobile communications, thus<br />

improving the relationships with the patients.<br />

Constraints<br />

Major hurdles in the mhealth are the guidelines regarding<br />

the privacy and security of the health data collection on<br />

mobile technologies and identifying new opportunities to<br />

enhance the delivery of mhealth services. According to the<br />

surveys, resistance is seen from staff and physicians due to<br />

the change. <strong>The</strong>y are unwilling to learn new skills or new<br />

technology. <strong>The</strong>y also believe that it impedes their<br />

workflow.<br />

In terms of workflow, the structure of evaluation presents a<br />

major challenge for the healthcare sector. <strong>The</strong>re should be<br />

resolute standards for the evaluation. With the constant<br />

change of technology, infrastructure, and innovative<br />

research methods, there is a specific need to evaluate the<br />

process and consequences of the action taken in the mhealth<br />

process implementation. Consequently, a balance is<br />

required to be maintained in the mhealth applications and<br />

its execution. <strong>Healthcare</strong> providers must also take care of<br />

the data overloading. As the data is collected in the realtime<br />

and recorded, there must be a proper assessment of the<br />

collected data where non-important data is filtered out.<br />

Industry Trends<br />

Being the fastest growing trend, the mobile platform is used<br />

by more than five billion people in the world. With the<br />

increase of smartphones and wireless network technologies,<br />

the digital healthcare systems have new possibilities<br />

alongside new challenges to provide high quality,<br />

efficiency, accessibility, and lower cost to the healthcare<br />

services. Various reports suggest that the consumers are<br />

expecting mhealth to change the overall healthcare<br />

experience with the way the digital information is obtained.<br />

<strong>The</strong> impact of mHealth is seen in the relationship and<br />

overall communication between a patient and the physician.<br />

Studies have shown that the health monitoring devices and<br />

cellular connectivity has reached more than seven million<br />

people. <strong>The</strong> combined market of the mobile health<br />

applications, health, and wireless apps, is expected to grow<br />

at a significant amount. In some countries, there are apps<br />

that are monitoring the patient's asthma right from their<br />

mobile phones. It is done using the microphone of the<br />

phone just like a spirometer. Other countries are using a<br />

wireless shoe insole, used to monitor the blood pressure in<br />

the heel. This digital shoe alerts the diabetic patients, when<br />

there is too much weight on feet, which can help in the<br />

elimination of foot ulcers.<br />

mhealth has enormous potential and is growing rapidly<br />

along with changing technology. Various international<br />

organization and global experts are researching<br />

continuously to foster the best use of current promising<br />

technology to improve the global health.<br />

24<br />

| September <strong>2018</strong> |


Haystack Informatics<br />

Leveraging Behavioral Analysis to Secure<br />

Health Systems against Infringements<br />

Information <strong>Security</strong> in healthcare<br />

is a major issue as the nature of<br />

the data in this industry is very<br />

sensitive. As a recent Verizon report<br />

1<br />

concluded , 58% of security incidents<br />

are caused by insiders. In fact, the<br />

authors of the report found the<br />

healthcare industry as the only industry<br />

in which internal actors are the biggest<br />

threat to the organization. <strong>The</strong>se<br />

incidents include unintentional errors<br />

and malicious actions, as well as the<br />

abuse of access privileges. <strong>The</strong>y<br />

involve the loss of unencrypted<br />

devices, snooping on patients’<br />

information, hacking, and malware<br />

attacks. Inside threats are hard to<br />

identify and harder to control. With the<br />

assistance of a trusted security partner,<br />

this task can be made effective and<br />

easy. Haystack Informatics, Inc., a<br />

behavior analytics company, is one<br />

such firm that helps the healthcare<br />

providers to protect their data and<br />

operations from various threats.<br />

<strong>The</strong> company was born at <strong>The</strong><br />

Children’s Hospital of Philadelphia<br />

(CHOP) as a next-generation platform<br />

to advance patient privacy monitoring.<br />

Since then, it has grown its offering to<br />

capitalize on its deep understanding of<br />

employee behavior in regards to the<br />

use of Electronic Health Records<br />

(EHRs), and the ramifications of this<br />

behavior in the areas of operational<br />

26<br />

| September <strong>2018</strong> |<br />

efficiency, time-driven activity-basedcosting<br />

(TD-ABC), and performance<br />

improvement.<br />

About the Company<br />

Haystack Informatics is a privately<br />

held company, headquartered in<br />

Philadelphia, PA. It is driven by the<br />

mission to safeguard and optimize<br />

healthcare. Rooted in the values of<br />

Integrity, Passion, and Ownership,<br />

Haystack’s vision is to be the partner<br />

of which healthcare institutions think<br />

about first whenever they need to<br />

protect against insider threat or turn<br />

their operational data into actionable<br />

insight.<br />

From the CEO’s Desk<br />

<strong>The</strong> Co-founder & CEO of Haystack<br />

Informatics, Adrian Talapan, is a tech<br />

“We help<br />

safeguard<br />

and optimize<br />

healthcare”<br />

entrepreneur. Previous to the<br />

establishment of Haystack, he<br />

co-founded HouseFix, a marketplace<br />

for homeowners and home<br />

improvement contractors (TechCrunch<br />

Disrupt finalist), and Clarix, a clinical<br />

trials logistics and management<br />

platform for the pharmaceutical<br />

research and development industry.<br />

Talking about the industry and the<br />

company, he asserts, “<strong>Healthcare</strong> is a<br />

complicated business, which only got<br />

more complicated with the introduction<br />

of massive Electronic Health Record<br />

systems. Running on thin margins,<br />

healthcare professionals are currently<br />

in the delicate position to deliver the<br />

best care they can, while operating in<br />

an increasingly information-rich<br />

environment that puts significant strain<br />

on their capacity to do so. We believe<br />

safeguarding and optimizing<br />

healthcare are essential initiatives for<br />

the next 3-5 years, which is why we set<br />

off to help health leaders on this path.”<br />

Tech-Powered Services<br />

Haystack currently offers two services,<br />

both delivered as Software-as-a-<br />

Service (SaaS): Haystack Monitoring<br />

and Haystack Intelligence.<br />

Haystack Monitoring: This is a nextgeneration<br />

insider threat monitoring<br />

platform, which uses behavioral


<strong>The</strong> <strong>10</strong> MOST <strong>Trusted</strong><br />

<strong>Healthcare</strong><br />

<strong>IT</strong> <strong>Security</strong><br />

<strong>Solution</strong> <strong>Providers</strong> <strong>2018</strong><br />

science to assist healthcare professionals with the<br />

detection, investigation, and reporting of patient privacy<br />

violations, as well as with drug misdirection and other<br />

employee behavior deviations. It focuses on<br />

understanding employee behavior and patient<br />

interactions in the context of delivering care. Combined<br />

with intuitive visualizations and end-to-end reporting<br />

functionality, this solution allows privacy experts to<br />

focus on the most critical threats.<br />

Haystack Intelligence: It offers healthcare leaders the<br />

ability to understand the operational performance of<br />

their domain. This solution delivers an objective<br />

diagnosis and determination of the root causes of<br />

operational efficiencies and inefficiencies as they arise<br />

in the areas of EHR Workflow Optimization,<br />

Operational Improvements, Service Cost Management,<br />

and Patient Experience. “I make performance<br />

improvement a breeze. I reveal exactly where you<br />

should implement the smallest change to get the biggest<br />

benefit at the lowest cost. Objectively track the ROI of<br />

your improvement changes today.”- Haystack<br />

Intelligence<br />

“Haystack Monitoring, showing an anomalous access<br />

(red link) and the context around it"<br />

Distinguishing Characteristics<br />

<strong>The</strong> company encourages employee diversity and<br />

empowerment. It believes that different points of views<br />

and personal initiative generally lead to stronger<br />

outcomes and this makes the work environment more<br />

exciting. Haystack is a customer centric organization<br />

and its special relationship with CHOP keeps it abreast<br />

of the latest challenges and opportunities in healthcare.<br />

In turn, these allow it to remain best aligned with<br />

industry needs. Haystack works alongside its customers<br />

in four steps: Ingest: simple data retrieval from EHR;<br />

Identify: exploring the data to find snooping risks and<br />

best practices and opportunities; Improve: make<br />

changes to improve the provider behavior; and<br />

Measure: quantify and monitor the impact of any<br />

changes. <strong>The</strong>re are several data sources that track the<br />

on-going processes within the health system and each<br />

of it creates a unique viewpoint into what is happening.<br />

Haystack Monitoring is analyzing the entire universe of<br />

risk and Haystack Intelligence combines them all to<br />

provide insight about performance bottlenecks and<br />

opportunities.<br />

“Haystack Intelligence, showing how an encounter<br />

type is performed across various sites,<br />

with associated cost differences”<br />

Certainty about a Bright Future<br />

Haystack is aware that the healthcare industry will continue<br />

to experience significant challenges in the years to come. It<br />

foresees that a data-based approach, inspired from lean<br />

manufacturing techniques, can help healthcare leaders adapt<br />

to changing circumstances. <strong>The</strong> company believes it is wellpositioned<br />

to assist health systems navigate through these<br />

upcoming challenges, given its focus on safeguarding and<br />

optimizing healthcare.<br />

1<br />

https://www.verizon.com/about/news/new-report-putshealthcare-cybersecurity-back-under-microscope<br />

| September <strong>2018</strong> |<br />

27


Dr. Steven Pelech<br />

Founder, President, &<br />

Chief Scientic Ofcer<br />

28<br />

| September <strong>2018</strong> |


Biomarkers<br />

he costs of sequencing the order of nucleotide bases in the DNA strands found in chromosomes have<br />

Tplummeted by a million-fold over the last 25 years. <strong>The</strong> entire sequence of 2.9 billion nucleotide<br />

base-pairs in a single human genome can now be determined for less than $<strong>10</strong>00. Complete genomes<br />

of hundreds of thousands of people are expected to be sequenced over the next decade.<br />

While the acquisition of such genomic knowledge was originally forecasted to herald better diagnostics and<br />

therapeutic treatments, the actual deliverables for improved health care have been disappointing. Excluding<br />

cancer, it has become apparent that only about <strong>10</strong>% of the cases of the most common diseases that afflict our<br />

population have a genetic basis that can be ascribed to hereditary mutations in the DNA sequences of specific<br />

genes.<br />

Over <strong>10</strong>0 million single nucleotide variants appear to exist in the human population, and perfectly healthy<br />

people appear to commonly harbour about <strong>10</strong>0 or so serious disease-associated mutations without any<br />

apparent manifestations of these particular diseases. Studies, with over 50,000 genetically identical twins,<br />

have shown no increased risks for the 24 most common diseases amongst the twins than for a twin with the<br />

general population.<br />

About the Author<br />

Dr. Steven Pelech is the Founder, President, and Chief Scientific Officer of Kinexus<br />

Bioinformatics Corporation, and concurrently a full professor in the Department of<br />

Medicine at the University of British Columbia. He was formerly the founder and<br />

president of Kinetek Pharmaceuticals. He has authored more than 230 scientific papers<br />

and created the SigNET on-line Knowledge-bank. Seasoned with over twenty-five years<br />

of experience in the areas of science, business, and administration, he has contributed<br />

leadership, vision, and strategic planning to Kinexus.<br />

| September <strong>2018</strong> |<br />

29


Over 95% of the known 21,300 genes carried in the human genome serve as the blue-prints for the construction of all of<br />

the cellular proteins, known as the proteome. <strong>The</strong>se proteins function like molecular robots to regulate and carry out all<br />

of the biochemical reactions needed to keep cells alive. <strong>The</strong>ir programming for specific tasks is partly hardwired into the<br />

structures of these proteins as dictated by their gene sequences. But, they are also tightly controlled by reversible<br />

modifications after they are initially manufactured, which are added on by regulatory proteins that operate within cellular<br />

intelligence systems.<br />

While gene sequences can provide some clues as to the potential functions and interactions of proteins with each other<br />

and other molecules, this information is extremely limited. Even now, we do not have a real sense of what over a third of<br />

these diverse proteins do, and less than 20% of these proteins have received any real serious attention in research labs.<br />

<strong>The</strong> disconnect between genetic information and the actual occurrence of disease is due to the high impact of<br />

environmental factors such as diet, life style and exposure to agents in the environment that can affect the proteome.<br />

Proteomes are immensely complex and dynamic. For example, blood plasma may contain as many as 40,000 different<br />

protein products, and their individual concentrations can range over a trillion-fold. Consequently, tracking proteins offers<br />

much better insights into the occurrence of diseases than genetic profiling, and importantly the opportunity for more<br />

rational therapeutic intervention.<br />

While about 21,300 genes encode proteins in the human genome, the actual number of distinct protein entities in the<br />

proteome may actually exceed several million, largely due to the range and degree of added modifications and other<br />

processing. More than 50 types of modifications have been documented in proteins, with phosphorylation as the<br />

predominant reversible regulatory mechanism. Over 85% of the proteome is known to be phosphorylatable at over<br />

250,000 sites, but the actual number of phosphosites appears to be closer to a million. <strong>The</strong> occurrence of these and other<br />

modifications in proteins represent a rich source of biomarkers that may correlate better with the development of<br />

pathologies.<br />

<strong>Most</strong> sites of known protein modification were originally revealed by mass spectrometry (MS). However, apart from<br />

being very expensive, MS requires milligram amount of biological sample material and is finicky for reliable detection<br />

of desired target proteins. For example, out of some 3000 phosphosites in proteins that have been well documented to be<br />

functionally important in the scientific literature, about 22% have not been reported in any MS studies, whereas another<br />

16% were documented in only one of thousands of MS analyses that had been performed.<br />

Antibodies have been well proven to be reliable and effective probes for the detection and quantification of specific<br />

proteins for their present and modification states. Over a million different antibodies against diverse proteins are<br />

presently commercially available. Furthermore, the printing of antibodies as individual microdots on microscope slidesized<br />

chips with densities exceeding 5000 spots per chip has paved the way for biomarker discovery that is easily<br />

translatable into the development of routine diagnostic tests. Biomarker antibodies can readily be re-deployed into other<br />

tried and true platforms such as immunoblotting, ELISA, and immunohistochemistry.<br />

Problems with sample preparation, high background issues, and low sensitivity of detection initially hampered the widespread<br />

adoption of antibody microarrays. However, recent breakthroughs on all of these fronts have poised antibody<br />

microarrays to become the most versatile, reproducible, and cost-effective tools in the foreseeable future for biomarker<br />

discovery, using as little as 25 microgram amounts of protein samples from crude, unfractionated lysates from cells,<br />

tissues, and bio fluids. High content antibody microarrays can identify the most appropriate and robust panel of<br />

biomarkers. When used to probe lysate microarrays printed instead with hundreds of patient specimen samples on each<br />

slide, these biomarker antibodies can provide accurate, comprehensive and economical diagnoses for diseases and for the<br />

monitoring of the effectiveness of therapeutic treatments.<br />

30<br />

| September <strong>2018</strong> |


Prey<br />

Devouring Cyber <strong>The</strong>ft with Modernism<br />

& Amendment<br />

<strong>The</strong> development of technology<br />

is leading to more and more<br />

devices to be connected to the<br />

internet; data is becoming the new oil<br />

for both the developed and developing<br />

nations. However, this has given rise to<br />

the threat of data breach, loss, and<br />

misuse, which have become an<br />

alarming issue in today’s scenario.<br />

This is especially true for medical data,<br />

which is increasingly stored on mobile<br />

and connected devices, becoming<br />

vulnerable to theft or misplacement.<br />

Even with the industry in constant<br />

development, <strong>IT</strong> security in healthcare<br />

suffers from outdated regulations that<br />

set security standards far below the<br />

threat line.<br />

To counter this issue emerged a<br />

company, Prey Software. It specializes<br />

in providing a software platform that<br />

secures and manages mobile devices<br />

like laptops, phones, and tablets<br />

against theft, loss, and data<br />

misplacement.<br />

Prey wants its users to have all the<br />

necessary tools to stop fearing theft,<br />

and to prevent the chance of devices<br />

getting lost or stolen in the first place.<br />

<strong>The</strong> company wants to turn that<br />

problem into an opportunity for<br />

organizations and users to stand up<br />

against theft or loss of critical devices<br />

and regain control over their data.<br />

32<br />

| September <strong>2018</strong> |<br />

‘Prey’ing Tactics<br />

It integrates all devices independently<br />

and irrespective of their operating<br />

system, and centralizes them under an<br />

online panel that serves as a remote<br />

control room. From there, the<br />

administrator can operate Prey’s<br />

functionality, triggered by Prey’s<br />

installed agent to monitor a mobile<br />

device fleet’s position, organize into<br />

labeled groups, and passively monitor<br />

devices utilizing its Control Zones<br />

geofencing tool to detect movement, if<br />

the devices leave a designated area<br />

such as a hospital lab, building, or<br />

campus.<br />

In case of theft or loss of a device, the<br />

administrator will be ready to react to<br />

the event and secure the data located<br />

on a lost device remotely, locking it<br />

down and eventually retrieving it. As<br />

for the asset itself, Prey’s tracking, or<br />

“Our solution promises<br />

no theft, no data leaks,<br />

only organized and<br />

secured mobile fleets”<br />

‘MISSING mode’ will generate reports<br />

with pictures, location, nearby Wi-Fi<br />

networks, hardware changes, and a<br />

wealth of actionable data that<br />

empowers police to take immediate<br />

action to retrieve the mobile device.<br />

Overpowering the Cyber <strong>Security</strong><br />

Space<br />

Prey provides a thorough solution with<br />

a steadfast focus upon anti-theft and<br />

data loss prevention. Health and<br />

educational organizations interact with<br />

extremely sensitive data regularly and<br />

require a solution that, aside from<br />

general management, ensures that there<br />

is a barrier against all the worst cases.<br />

This is why Prey focuses on protecting<br />

the data, locking it, or eliminating it if<br />

necessary.<br />

<strong>The</strong> company makes it easy to retrieve<br />

a misplaced device, or stolen devices.<br />

It initiates proper device recovery and<br />

identification of the perpetrator through<br />

comprehensive evidence reports.<br />

<strong>The</strong> organization’s initial success has<br />

created a strong base of trust. Prey<br />

Software, being a part of an industry<br />

that deals with extremely sensitive<br />

issues, focuses on transparency and<br />

open development that has proven to<br />

give its users the peace of mind they<br />

need.


<strong>The</strong> <strong>10</strong> MOST <strong>Trusted</strong><br />

<strong>Healthcare</strong><br />

<strong>IT</strong> <strong>Security</strong><br />

<strong>Solution</strong> <strong>Providers</strong> <strong>2018</strong><br />

A Leader with a Revolutionary Thought Process<br />

Prey was born in 2009 when Carlos Yaconi, who is the<br />

current CEO of the organization, joined forces with<br />

Tomás Pollak, the initial founder of the Linux<br />

application. Together they created the first global<br />

tracking and anti-theft application for mobile devices.<br />

Prey Anti-theft, the brain child of Carlos, grew from an<br />

initial single-platform solution into today’s<br />

comprehensive multi-O/S and multi-device tool; which<br />

aids businesses and consumers to protect nearly all<br />

devices, regardless of the operating system or device<br />

manufacturer. It is a one-stop solution, which secures<br />

and manages all of a company’s various mobile<br />

devices.<br />

<strong>The</strong> key to this continued expansion of Prey is the byproduct<br />

of the flexible environment Carlos created<br />

within the company, welcoming methodology changes,<br />

according to the team’s needs or the evolving needs of<br />

customer organizations. This open approach came from<br />

Carlos’ past experience as an entrepreneur leading two<br />

software and service provider companies named Nectia<br />

and Bizware that are still active today, as well as his<br />

background as a Computer Science and Information<br />

Technology graduate.<br />

Notable Milestones Achieved by Prey<br />

Carlos is a firm believer in the power of open-source<br />

community and solutions, and in 2012, this led Prey to<br />

become part of the global Endeavor program, an<br />

initiative that connects entrepreneurs all around the<br />

world to promote and generate change. By offering an<br />

exceptional service and protection against theft, Prey<br />

has been granted the Presidential Award for Innovation<br />

in Chile and it is the first public anti-theft solution<br />

available for mobile devices worldwide. <strong>The</strong> company<br />

has led to the development of an entire industry with<br />

the basic goal to provide anti-theft solutions, which<br />

gave a thrust to various similar platforms like ‘Find my<br />

iPhone’ by Apple. Today, Prey is protecting more than<br />

8 million devices!<br />

Maintaining a Healthy Office Environment<br />

Carlos asserts, “Office culture plays a huge role in the<br />

company”. Prey believes in open spaces and<br />

comfortable environments, with flexible positions,<br />

games, and isolated spots for anyone in the company to<br />

Carlos Yaconi<br />

Founder & CEO<br />

work. “We’re a small group of people so we must ensure all<br />

relationships develop smoothly, tackling any issues up front<br />

with open discussions”, adds Carlos.<br />

Prey has applied a unique horizontal methodology to the<br />

company’s business approach. In a nutshell, Prey<br />

employees bring their talents to participate as a whole,<br />

independently of the area or position they work in.<br />

Speaking of the dynamic workspace, Carlos says, “Projects<br />

and ideas are approached in collaboration, welcoming new<br />

ideas and encouraging feedback from every employee, no<br />

matter what their defined role is.”<br />

A Strong Leap into the Future<br />

<strong>The</strong> company is continuously looking to tackle new security<br />

opportunities, from the development of improved anti-theft<br />

and multi-device management capabilities, to reaching new<br />

frontiers that suffer from the same problems and security<br />

challenges. Prey Software works hard to stay up-to-date<br />

with its user’s requirements and help them with more<br />

thorough solutions that add additional barriers to block<br />

threats, such as the development of remote encryption.<br />

<strong>The</strong> following years will see Prey expanding to help secure<br />

new formats from theft and to simplify the management &<br />

control of devices and data in an increasingly mobile<br />

world.<br />

| September <strong>2018</strong> |<br />

33


Tokenization<br />

or Encryption<br />

- Choose Wisely<br />

34<br />

| September <strong>2018</strong> |


Data Cryptology<br />

ersonal Health Records (PHR)<br />

Psecurity is the new ladder that<br />

many security technologies are<br />

trying to climb. One of the reasons that<br />

healthcare providers are working<br />

towards this is that they are willing to<br />

secure their and patients’ data. <strong>The</strong><br />

other reason is that is a requirement<br />

imposed by the legislations such as<br />

HIPAA, H<strong>IT</strong>ECH, etc. which are to be<br />

obliged to, to avoid penalties.<br />

Tokenization and encryption are two of<br />

the technologies used to safeguard<br />

information. Both of these are critical<br />

to an organization to avoid breaches.<br />

Even then the dilemma of encryption<br />

versus tokenization does exist.<br />

In simple words, encryption is masking<br />

of critical information. At one end, the<br />

data is encrypted, like a code, and then<br />

sent over to the other end. Only the<br />

user at this end has the key to decrypt<br />

the already encrypted data, and no<br />

other party can decode it. This key can<br />

be given to more than one end user to<br />

facilitate broadcast of information to<br />

authorized group of people. This<br />

process helps in avoiding interference<br />

of any third party and reduces the risk<br />

of data theft or unwanted data<br />

modification.<br />

In tokenization, the data is protected<br />

using tokens. Small chunks of data are<br />

assigned particular tokens, which point<br />

to the location where this data is<br />

stored. Giving the tokens to selective<br />

users allow them to access data with<br />

ease and security. Once intercepted,<br />

these tokens are rendered useless and<br />

cannot help in accessing the real<br />

information. <strong>The</strong> benefit of tokens over<br />

encryption keys is that the tokens are<br />

easy to handle, they are one time<br />

generated codes and hence, do not<br />

compromise real data.<br />

Forms of Encryption<br />

<strong>The</strong> mathematically encoded data<br />

using encryption is called ‘Cipher’ and<br />

the key used to decode the cipher is<br />

| September <strong>2018</strong> |<br />

35


called as ‘secret key’ <strong>The</strong>re are two types of encryption<br />

keys: symmetrical and asymmetrical. In symmetrical<br />

process, same key is used to lock and unlock the data, while<br />

in asymmetrical these two keys are different. This helps to<br />

reduce the radius of data vulnerability. Additionally, key<br />

rotation can be used. Regular key rotation limits the amount<br />

of data that can be encrypted using a single key. <strong>The</strong>refore,<br />

in case of interception, only a small amount of data is<br />

vulnerable.<br />

Vault-based and Vault-less<br />

Tokenization<br />

In the process of tokenization,<br />

all the tokens are stored in a<br />

token vault alongside data and<br />

in the same size at data,<br />

eliminating to need to modify<br />

the storage space. Referencing<br />

the token vault is the only way<br />

to access data. <strong>The</strong> vault-based<br />

tokenization needs expensive<br />

synchronization methodologies<br />

as well as it is too complex to<br />

store large amount of data.<br />

Recently, vault-less tokenization<br />

was developed to tackle the<br />

challenges in vault-based one.<br />

In this, the sensitive data is replaced with a fake data that<br />

looks exactly alike. It provides high security while<br />

maintaining the usability of data.<br />

<strong>The</strong> Dilemma<br />

Although both, encryption and tokenization are forms of<br />

cryptography, they are very different and not<br />

interchangeable. Each of them has its own set of benefits as<br />

well as disadvantages. <strong>The</strong>re remains a conflict between<br />

which of them is best, the solution to which depends on the<br />

organization’s requirements.<br />

Edward Snowden, an American computer professional,<br />

said, “Encryption works. Properly implemented strong<br />

crypto systems are one of the few things that you can rely<br />

on”. Encryption, today, is commonly used by millions of<br />

people to encrypt the data on their phones and computers to<br />

remain secure in case of accidental loss of sensitive data.<br />

Also, it is used by government and corporates to thwart<br />

sensitive data, surveillance, and so on, as it is possible to<br />

encrypt and decrypt large amount of data with just one key.<br />

Although it brings in many effective solutions, it also has<br />

few drawbacks. Encryption breaks application<br />

functionality; there is always a trade-off between the<br />

strength of encryption and application functionality.<br />

Moreover, if the key is compromised, the thief or hacker<br />

can unlock all the data the key was used to protect.<br />

In tokenization, these intricacies are eliminated. As the<br />

token is a random code and not actually data in the<br />

encrypted form, when and if compromised, no data is<br />

breached. Also, as tokens only map the actual data, the<br />

problem of application functionality is solved. But, with<br />

tokenization, the user’s database increases in size as it has<br />

to store the tokens separately. This makes it harder to scale<br />

and maintain the database. Exchange of data is also difficult<br />

as the exact token is needed to unlock it.<br />

<strong>The</strong> Ever-Growing Need<br />

With the digital revolution, the<br />

landscape of business world has<br />

turned upside down. It has created<br />

entirely new industries and<br />

enterprises. But, it has made the<br />

organizations vulnerable to<br />

various destructive and new<br />

threats. Some of the industries,<br />

including healthcare, rely on large<br />

amount of data that is sensitive in<br />

nature. As the volume of this data<br />

grows, so does the risk of cyberattacks.<br />

Cyber criminals trade in<br />

personal and sensitive<br />

information; it is literally the<br />

currency for them. <strong>The</strong> stolen or<br />

hacked data is further sold to various buyers who sell it<br />

further for even more money. To safeguard against these<br />

threats, businesses and individuals should take immediate<br />

steps in this direction and comply to several regulations like<br />

HIPAA, GDPR, etc.<br />

Use Cases of the Two<br />

Tokenization is commonly used to protect payment card<br />

data. It is also used to safeguard other types of data,<br />

sensitive in nature, like telephone numbers, account<br />

numbers, email addresses, security numbers, and the data<br />

needed in back-end systems. Encryption, on the other hand,<br />

is better suited for unstructured data including long text<br />

paragraphs or complete documents. It is also ideal for<br />

exchange of data with the third party, helping to validate its<br />

identity online. Both these technologies are being widely<br />

used now-a-days to protect the data stored in applications or<br />

cloud services.<br />

<strong>The</strong> question that remains is- which one of them is better?<br />

But the ideal solution depends upon the circumstance under<br />

which it is used. Although tokenization is often seen to<br />

more efficient, as there is no link between the original data<br />

and the tokens, encryption can be considered the best<br />

choice in case of unstructured data. Organizations can<br />

leverage the benefits of either encryption or tokenization, or<br />

even both, according to the difficulty at hand.<br />

36<br />

| September <strong>2018</strong> |


Seceon<br />

Delivering Cutting-Edge <strong>IT</strong> <strong>Security</strong> for<br />

<strong>Healthcare</strong>’s Digitally Transforming World<br />

Innovations in mobility, IoT,<br />

wearables, and cloud computing<br />

have empowered healthcare<br />

systems to improve healthcare<br />

management and enhance patientprovider<br />

relationships. While the<br />

healthcare industry has embraced these<br />

benefits, increased connectivity is also<br />

putting health systems at much greater<br />

risk of malware and other cyber threats<br />

that, if successful, could have<br />

devastating consequences on patient<br />

care, privacy and healthcare<br />

organization management.<br />

Massachusetts-based Seceon delivers<br />

cutting-edge <strong>IT</strong> security solutions to its<br />

clients to protect against these risks by<br />

immediately detecting, quarantining,<br />

and eliminating any threats before they<br />

do any damage.<br />

This trailblazing <strong>IT</strong> security company<br />

is distinguished for offering the first<br />

fully automated, comprehensive cyber<br />

security platform that helps<br />

organizations to safeguard their<br />

valuable information and people.<br />

Seceon’s mission is to empower SOC<br />

and <strong>IT</strong> teams of all-size organizations<br />

to easily and affordably detect and<br />

mitigate threats, as soon as they are<br />

uncovered.<br />

Since its inception, Seceon has<br />

successfully served over 300 clients,<br />

won more than 50 awards, and built a<br />

robust network of 50+ distributors and<br />

reseller partners globally. <strong>The</strong> company<br />

launched its Open Threat Management<br />

(OTM) Platform in April 2016 and has<br />

been releasing major updates every<br />

quarter with enhancements in machine<br />

learning, dynamic threat models, multitenancy,<br />

and scaling. Seceon’s<br />

innovations have continued in <strong>2018</strong><br />

when the company introduced<br />

aiSIEM and aiMSSP to transform<br />

the landscape of <strong>IT</strong> security in<br />

healthcare.<br />

Seceon’s <strong>Solution</strong>s Provide Much-<br />

Needed <strong>IT</strong> <strong>Security</strong> Assurance<br />

Over the years, Seceon has crafted a<br />

niche in the market as an adept security<br />

solution provider that deeply<br />

understands the nuances of cyber<br />

threats encountered by small-tomedium<br />

sized businesses (SMBs) and<br />

enterprises. To achieve the goal of<br />

“Cyber-security Done Right,” the<br />

“We make it easy for<br />

healthcare organizations<br />

to protect their data<br />

and their business<br />

from all known and<br />

unknown cyber threats.”<br />

company engineered its<br />

groundbreaking OTM Platform from<br />

scratch.<br />

OTM works out-of-the-box to instantly<br />

protect against known and unknown<br />

threats. It provides comprehensive<br />

visibility, proactive threat detection,<br />

and automated containment and<br />

elimination of threats in real-time, all<br />

while minimizing costs, staff<br />

bandwidth constraints, and<br />

performance impact. OTM helps<br />

enterprises automatically generate<br />

prioritized threat alerts that matter in<br />

real-time and empowers SOC / <strong>IT</strong><br />

teams to detect and respond to the<br />

threats quickly, before critical data gets<br />

exfiltrated.<br />

Seceon’s aiSIEM and aiMSSP<br />

solutions are built on the OTM<br />

Platform:<br />

Seceon aiSIEM goes beyond traditional<br />

SIEM and eliminates the need for<br />

adding multiple silo solutions. It<br />

ingests raw streaming data from<br />

applications, identity systems, flows,<br />

and raw traffic from networks to<br />

provide comprehensive visibility,<br />

proactive threat detection, automated<br />

threat containment and elimination,<br />

and continuous compliance, policy<br />

management, & reporting.<br />

Seceon aiMSSP enables Managed<br />

<strong>Security</strong> Service <strong>Providers</strong> (MSSPs) to<br />

38<br />

| September <strong>2018</strong> |


<strong>The</strong> <strong>10</strong> MOST <strong>Trusted</strong><br />

<strong>Healthcare</strong><br />

<strong>IT</strong> <strong>Security</strong><br />

<strong>Solution</strong> <strong>Providers</strong> <strong>2018</strong><br />

offer outsourced security services to SMBs, including<br />

24x7 security monitoring, threat intelligence, and realtime<br />

detection and remediation, at nominal and<br />

predictable linear costs.<br />

<strong>The</strong> Secret behind Seceon’s Success<br />

Seceon’s OTM platform is growing in popularity across<br />

all business verticals due to its unique ability to ensure<br />

proactive detection, containment, and elimination for all<br />

threat categories. Key differentiated benefits of<br />

Seceon’s OTM platform include:<br />

• Comprehensive Visibility<br />

<strong>The</strong> OTM Platform ingests all raw streaming data<br />

(Logs, Packets, Flows, and Identities) and provides<br />

real-time extensive view of all assets (users, hosts,<br />

servers, applications, data access, and movement<br />

traffic) that are on premise, cloud, or hybrid, and their<br />

interactions.<br />

• Reduce Mean-Time-To-Identify (MTTI) with<br />

Proactive Threat Detection<br />

<strong>The</strong> platform proactively detects threats and surfaces<br />

threats in real-time without an agent or alert fatigue.<br />

• Reduce Mean-Time-To-Resolve (MTTR) with<br />

Automatic Threat Remediation<br />

<strong>The</strong> OTM Platform performs automatic threat<br />

containment and elimination in real-time. It also<br />

provides clear actionable steps to eliminate the<br />

threats that can either be handled automatically by<br />

the system or manually by the security expert postanalysis.<br />

• Continuous Compliance, Policy Management and<br />

Risk Monitoring<br />

<strong>The</strong> platform provides continuous compliance and<br />

scheduled or on-demand reporting. This includes,<br />

HIPAA, PCI-DSS, NIST, GDPR, SOX, FINRA, etc.<br />

Innovation Starts at the Top<br />

st<br />

An ideal 21 century <strong>IT</strong> security leader is one who<br />

envisions the upcoming threat landscapes and prepares<br />

foolproof solutions for it in advance, not only to drive<br />

the success of his business, but to benefit the industry at<br />

large. Chandra Pandey is a leader who fits this mold.<br />

As Founder and CEO of Seceon, he has guided his<br />

organization in pioneering solutions for critical cyber<br />

threats. He orchestrates the company’s business and<br />

technical strategy, and fosters innovation by<br />

empowering all company members with decision-making<br />

abilities, encouraging open and respectful communications,<br />

and building a culture of continuous improvement.<br />

Chandra is the driving force behind Seceon’s commitment<br />

to creating affordable cybersecurity solutions for<br />

organizations of all sizes. An engineer by trade, Chandra<br />

applies the deep leadership, technical, and business strategy<br />

expertise gained during previous positions at Nokia, Ciena,<br />

Juniper Networks, and BTI, to Seceon’s groundbreaking <strong>IT</strong><br />

security business.<br />

<strong>The</strong> Road Ahead<br />

Chandra Pandey<br />

CEO & Founder<br />

Seceon’s expertise in crafting leading-edge solutions for<br />

rising cyber security challenges, out-of-the-box thinking,<br />

and passion for ensuring “Cybersecurity Done Right,” has<br />

made it a dominant <strong>IT</strong> security provider.<br />

During the next few years, Seceon will continue to be laserfocused<br />

on adding innovations to its aiSIEM and aiMSSP<br />

“Comprehensive Cyber-security for the Digital-Era”<br />

solutions. “Seceon is designed from the ground up to<br />

automatically detect, contain, and eliminate critical<br />

cyberthreats faced by the healthcare industry in real-time,<br />

including data breaches related to PHI and IP ransomware,<br />

malware on medical devices, credentials/insider threats,<br />

and compliance with regulations like HIPPA, PCI-DSS and<br />

NIST,” concluded Chandra Pandey.<br />

| September <strong>2018</strong> |<br />

39


STRATEGIES<br />

FOR HEALTHCARE<br />

ORGANIZATIONS TO COMBAT<br />

CYBERCRIME<br />

ver the past few years, the magnitude of threat against<br />

Ohealthcare organizations is growing exponentially. Currently,<br />

the healthcare industry is striving hard to target the cyber<br />

breaches. <strong>The</strong> Chief Information <strong>Security</strong> Officers (CISOs) are<br />

becoming smarter and sophisticated to outmaneuver the<br />

cybercriminals. <strong>The</strong> healthcare organizations are acutely focusing on<br />

their <strong>IT</strong> functions and effectively correlating information to mitigate<br />

the risks of cybercrime. <strong>The</strong>y are consolidating this information from<br />

the various vulnerability scanners to effectively manage and aid their<br />

business context. Various foremost healthcare organizations are<br />

adopting cutting-edge cyber security approach, where the senior<br />

board arrays the tenor for the organizational operations to<br />

successfully respond to the cyber risks.<br />

Categorizing the Assets<br />

<strong>The</strong>re is a major necessity for the healthcare organizations to<br />

understand the cyber security risks for smooth management of their<br />

business context. <strong>The</strong>y need to establish a specific data security team<br />

to classify data assets in association with their business significance.<br />

Managing the patient records and keeping in mind the susceptibilities<br />

existing in a client's desktop would be far less than those present on<br />

an acute database server is very imperative. <strong>The</strong> healthcare<br />

organizations should prioritize the most critical assets which can lead<br />

to effective threat mitigation efforts backing the cyber security. <strong>The</strong><br />

traditional and upcoming healthcare organizations need to<br />

conceptualize and take firm measures safeguarding the patient data<br />

and classifying the assets to certify complete network security.<br />

Staying Updated to the Latest Threats<br />

<strong>The</strong> developing world is witnessing severe<br />

cyber security threats. This budding cyber<br />

security landscape influences the <strong>IT</strong> and security<br />

squads to stay updated to the latest threats and<br />

their respective agents. <strong>The</strong>y need to<br />

successfully predict the attack vectors by<br />

educating their staff about the recent scams and<br />

threats. <strong>The</strong> healthcare organizations should<br />

provide their employees with the training based<br />

on the security risks in accessing links and<br />

attachments in the email. <strong>The</strong> healthcare<br />

organizations need to abandon the obsolete<br />

technology and replace it with modernized<br />

technology that is highly resistant to<br />

cybercrime. <strong>The</strong>y need to tremendously engage<br />

with the smart and quick Big Data Analytics to<br />

secure gigantic computerized data and<br />

converting the unstructured SIEM data to a<br />

specific format for making strategic decision to<br />

reduce cybercrime.<br />

Involve Business Acquaintances<br />

<strong>The</strong> healthcare organizations need to pitch in<br />

with additional resources, to ensure information<br />

security. <strong>The</strong>se organizations need to engage the<br />

various business associates and merchants for<br />

accountable and secured health information<br />

under the Health Insurance Portability and<br />

Accountability Act (HIPAA). <strong>The</strong> business<br />

associates can face direct civil liability for a<br />

breach of this act. However, it is the<br />

responsibility of the healthcare organization to<br />

confirm that their business associates are<br />

maintaining Protected Health Information<br />

(PHI) effectively. Establishing a strong<br />

persistent program to monitor business<br />

associates gives the health organizations the<br />

threat intelligence they need to guard their<br />

business against duplicitous transactions. <strong>The</strong><br />

affiliation of the healthcare organizations with<br />

the business associates will help them to<br />

monitor the new risks, controls, and the<br />

emerging vulnerabilities of the cybercrime.<br />

Implementing Appropriate Controls<br />

<strong>The</strong> healthcare organizations should implement<br />

strict measures to confront and terminate the<br />

Bring-your-own-device (BYOD) programs. <strong>The</strong>y<br />

should focus on the execution of the suitable<br />

40<br />

| September <strong>2018</strong> |


Cybernetics<br />

controls around data segregation and<br />

infrastructure security. Constant<br />

monitoring practices are required to<br />

ensure that the controls are active and<br />

functioning in a desirable manner. <strong>The</strong><br />

healthcare organizations should<br />

influence certain security incident<br />

recognition and response programs to<br />

mitigate the cyber security risks.<br />

Additionally, operations regarding<br />

crisis management must be integrated<br />

into the flexible business strategies.<br />

<strong>The</strong> healthcare organizations need to<br />

implement adaptive technologies to<br />

manage identities and to regulate the<br />

information being accessed. <strong>The</strong>y<br />

should undertake operations to detect<br />

the loopholes and vulnerabilities in the<br />

mobile apps that would surely reduce<br />

and support the high grounds of the<br />

cyber security.<br />

Monitoring Internal Systems & Logs<br />

<strong>The</strong> healthcare organizations need to<br />

invest in the evolving technologies that<br />

enable them to spontaneously scan and<br />

secure data, log data modification<br />

activities as they arise, and instantly<br />

alert their <strong>IT</strong> teams about the<br />

fraudulent behavior. <strong>The</strong>se teams must<br />

focus on detecting the loopholes with<br />

the help of an automated bot or a<br />

specific process that intermittently run<br />

through the system, combating the<br />

threats. This will help the organization<br />

to spot the vulnerabilities and save<br />

time, resolving it before enough<br />

damage. Monitoring the logs is a key<br />

component of an organization’s<br />

compliance initiatives. This would help<br />

the healthcare organizations to<br />

properly audit and prepare a report on<br />

the file access which can detect illegal<br />

activity by the users and other major<br />

cyber threats.<br />

<strong>The</strong> Future Innovations<br />

<strong>The</strong> increasing complexities of <strong>IT</strong><br />

landscape in the healthcare<br />

organizations, the future is critical for<br />

the security teams to choose the exact<br />

processes and tools to defend the<br />

organization from budding breaches.<br />

<strong>The</strong> healthcare organizations in the<br />

upcoming future are planning to design<br />

robust systems and stronger encryption<br />

algorithms to successfully safeguard<br />

the cybercrime in the healthcare sector.<br />

Soon there will be an introduction to<br />

the new General Data Protection<br />

Regulation (GDPR) to replace the ageold<br />

Data Protection Act, which would<br />

increase the security of the personal<br />

data and also its exploration.<br />

| September <strong>2018</strong> |<br />

41


SecureNetMD<br />

An Innovative Technology Partner<br />

for <strong>Healthcare</strong> Leaders<br />

Cyber security is no longer just<br />

a trending practice; it has<br />

become an absolute necessity.<br />

With paper records moving to<br />

electronic ones, the side-effect of this<br />

revolutionary transition cannot be<br />

ignored. To address the same in<br />

healthcare industry, a remarkable piece<br />

of legislation- <strong>The</strong> Health Insurance<br />

Portability and Accountability Act<br />

(HIPAA), was coined. Made with the<br />

primary goal to tackle the issue of<br />

insurance coverage for individuals<br />

between jobs, HIPAA helps healthcare<br />

providers to safeguard against<br />

healthcare frauds, ensure the security<br />

of PHI, restrict healthcare information<br />

authorization as well as help in<br />

securely sharing healthcare<br />

information across various platforms.<br />

SecureNetMD is one of the fastest<br />

growing HIPAA Compliant Managed<br />

Technology <strong>Solution</strong>s <strong>Providers</strong> that<br />

help healthcare leaders make better<br />

decisions around technology. Founded<br />

in 2009, the company empowers<br />

healthcare providers to expand patient<br />

reach and improve patient care.<br />

SecureNetMD aims to be an innovative<br />

technology company, strategically<br />

focused on partnering in its clients’<br />

success.<br />

<strong>The</strong> Prodigy Leading SecureNetMD<br />

Jack Berberian is the Founder and<br />

CEO of SecureNetMD. He holds<br />

diverse educational proficiencies- JD,<br />

CPHIMS, CHSP, CHSA, ATC, to name<br />

a few. He is a seasoned entrepreneur<br />

who has worked across multiple<br />

industries and verticals. Jack has also<br />

founded Troy Ventures, LLC, MedTix,<br />

LLC, as well as co-founded<br />

ThinkSecureNet alongside<br />

SecureNetMD. Under this dynamic<br />

leader, SecureNetMD has reached the<br />

height of success that it is at today. “At<br />

SecureNetMD, we’ve invested in<br />

becoming a true technology partner for<br />

our clients. Our award-winning<br />

solutions are backed with first-class<br />

service, providing healthcare providers<br />

the leverage and confidence to get back<br />

“We render<br />

strategic technology<br />

solutions built around<br />

your organization”<br />

to what’s most important—improving<br />

and expanding patient care,” asserts<br />

Jack.<br />

Promising <strong>Solution</strong>s and Services<br />

Not only does it deliver fully-HIPAA<br />

compliant solutions, SecureNetMD has<br />

invested in developing a trusted<br />

relationship with its clients. It believes<br />

that the needs of healthcare<br />

organizations can vary greatly and<br />

hence, is not interested in a one-sizefits-all<br />

technology. With the largest<br />

needs of maximum healthcare<br />

organizations at its nexus,<br />

SecureNetMD offers solutions in four<br />

core focused areas: Managed <strong>Security</strong><br />

<strong>Solution</strong>s, Managed <strong>IT</strong> solutions,<br />

Unified Communications, and <strong>IT</strong><br />

Infrastructure. <strong>The</strong>se aid in protecting<br />

healthcare organizations and their<br />

patient ePHI through innovative threat<br />

management, endpoint encryption, and<br />

compliance management solutions.<br />

<strong>The</strong> Managed <strong>IT</strong> solutions allow<br />

SecureNetMD to empower and<br />

streamline healthcare organizations<br />

with fully managed or co-sourced<br />

24/7/365 service desk. <strong>The</strong>y also allow<br />

healthcare providers of all sizes gain<br />

invaluable access to a full fleet of<br />

42<br />

| September <strong>2018</strong> |


<strong>The</strong> <strong>10</strong> MOST <strong>Trusted</strong><br />

<strong>Healthcare</strong><br />

<strong>IT</strong> <strong>Security</strong><br />

<strong>Solution</strong> <strong>Providers</strong> <strong>2018</strong><br />

certified technology experts whenever they need it.<br />

With its Unified Communications solutions, the<br />

company improves the flexibility and dependability of<br />

crystal clear VoIP and intuitive custom call flow<br />

designs. This helps healthcare leaders ensure that their<br />

patients are delivered to their destination quickly and<br />

efficiently. Its cloud-based Unified Communication<br />

(UC) platform empowers practice managers and<br />

healthcare leaders by delivering enhanced call analytics<br />

that can track peak call times, patient hold times,<br />

missed calls, and staffing efficiency through an intuitive<br />

reporting dashboard, 24x7. With its <strong>IT</strong> Infrastructure,<br />

SecureNetMD improves the infrastructure and<br />

scalability of healthcare providers with the fleet of<br />

certified cabling technicians, project managers, and onstaff<br />

certified RCDD.<br />

Outshining the Confrères<br />

Three areas that really set SecureNetMD apart from<br />

other Managed Service <strong>Providers</strong> are that it is a fully-<br />

HIPAA compliant solution provider. <strong>The</strong> company is<br />

rooted in technology and process efficiency and it has<br />

been passing this value to its clients to streamline their<br />

operations. It has spent the last decade developing a<br />

nimble and responsive service model, allowing its<br />

teams to respond quickly to the customer and industry<br />

needs. Moreover, SecureNetMD emphasizes on being a<br />

partner and not just another vendor, for its clients. Its<br />

award-winning solutions with first-class service are<br />

backed with partnerships. <strong>The</strong> company proudly says,<br />

“We don’t have business relationships, we develop long<br />

term partnerships that are earned over the course of<br />

time.”<br />

An Ambitious Workplace<br />

<strong>The</strong> company takes great pride in calling themselves a<br />

team, demonstrating true teamwork that rallies<br />

delivering world-class. One of the core values<br />

SecureNetMD is Growth. It focuses on investing in the<br />

growth of its team and each individual team member.<br />

Being in an industry that is ever-changing, it is required<br />

that the team members be agile and eager to improve on<br />

their specialties and expand their skillsets.<br />

SecureNetMD encourages its team to continue growth<br />

by providing incentives, recognition, and career<br />

advancement tracks to help them achieve the best<br />

version of themselves.<br />

Recognitions and Accolades<br />

SecureNetMD was recently recognized and featured as one<br />

of the Top <strong>10</strong> MSP for <strong>2018</strong> by a prominent magazine of the<br />

industry. It was also recognized as one the Top <strong>10</strong><br />

<strong>Healthcare</strong> Companies in Delaware and Fastest Growing<br />

Companies in America by a well-renowned source. A<br />

prestigious source named SecureNetMD as one of the Top<br />

<strong>10</strong> VoIP providers. Additionally it has received several<br />

other recognitions throughout the local community as a<br />

leader in <strong>Healthcare</strong> <strong>IT</strong>, including Delaware Small Business<br />

Chamber Blue Ribbon Award, 2016 Best of Lewes Award in<br />

the HIPAA Compliant <strong>Healthcare</strong> <strong>IT</strong> Provider category, to<br />

name a few.<br />

Future Endeavors<br />

Jack Berberian<br />

Founder & CEO<br />

SecureNetMD’s plan for the future is to continue being<br />

recognized as a leader in the industry and a trusted partner<br />

for healthcare providers. As a partner to healthcare<br />

providers, it aims to be foster a strong commitment; so that<br />

healthcare providers can be confident in trusting<br />

SecureNetMD with not only the technology that their staff<br />

and patients interface with, but also in providing innovative<br />

solutions that future-proof their growing organization.<br />

| September <strong>2018</strong> |<br />

43

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!