HITRUST working group targets cyber threats
The Health Information Trust Alliance (HITRUST) is stepping to the plate to support a Feb. 12 White House Cybersecurity Executive Order that calls for enhanced government and industry collaboration against ongoing cyber threats.
HITRUST announced on Feb. 20 the convening of a working group to develop frameworks to prevent cyber attacks and intrusions, which the executive order describes as “one of the most serious national challenges we must confront.” Threats to the healthcare industry encompass the disruption of information systems and medical devices directly involved in patient care, as well as IT systems affecting manufacture and distribution of medications.
Policy orders specifically called for voluntary programs to develop a “Cybersecurity Framework” and identification of critical infrastructure most at risk. This framework “shall include a set of standards, methodologies, procedures and processes that align policy, business and technological approaches to address cyber risks … and shall incorporate voluntary consensus standards and industry practices to the fullest extent possible,” according to the order.
HITRUST said the working group dovetails existing public-private collaborations between the healthcare industry and government, including information sharing and incident response through the HITRUST Cyber Threat Intelligence and Incident Coordination Center.
“There is no doubt in my mind that the sharing of cyber threat information and coordinated incident response has benefited both industry and government,” said HITRUST CEO Daniel Lutkis in a statement.
“The Department of Health and Human Services [HHS] has first-hand experience that collaboration with industry can provide value to both industry and government,” HHS Chief Information Security Officer Kevin Charest stated.
As HITRUST already has in place a widely used Common Security Framework (CSF), it said the working group’s efforts will include updates to the controls in the CSF and offer guidance of prioritizing the implementation and these controls based on current cyber security risks.