AI For Effective Healthcare Cyber Resilience

Artificial intelligence is being used in a variety of ways in the healthcare industry, and one area where it is proving to be an effective asset is cybersecurity. 

Healthcare CIOs and CISOs should recognise that AI has the ability to enhance technology’s ability to identify malicious activity and attackers and to protect systems and data, healthcare cybersecurity experts say.

AI does so in different ways

“Machine learning and artificial intelligence can be used to augment and/or replace traditional signature-based protections,” said Robert LaMagna-Reiter, senior director of information security at First National Technology Solutions, a managed IT services company that, among other things, advises on cybersecurity issues. “One area is security information and event management alerting, or anti-virus solutions.”

With the immense amount of data, security personnel cannot efficiently sift through every event or alert, whether legitimate or a false-positive, machine learning and AI solve this problem by looking at behavior versus signatures, as well as taking into account multiple data points from a network, LaMagna-Reiter explained.
“By acting on behavior and expected actions versus outdated or unknown signatures, the systems can take immediate actions on threats instead of alerting after the fact,” he added.

Artificial intelligence also can assist with “self-healing” or “self-correcting” actions, LaMagna-Reiter said.
 “For example, if an antivirus or next-generation firewall system incorporates AI or behavioral monitoring information, assets with abnormal behavior – signs of infection, abnormal traffic, anomalies – can automatically be placed in a quarantined group, removed from network access,” he said. 
“Additionally, AI can be used to take vulnerability scan results and exploit information to move assets to a safe-zone to prevent infection, or apply different security policies in an attempt to virtually patch devices before an official patch is released.”
Further, if abnormal activity is observed, prior to any execution AI can wipe the activity and all preceding actions from a machine, LaMagna-Reiter explained. “Essentially, every action is recorded and monitored for playback, if necessary,” he said.

Cyber-security is one of the most prominent use-cases for machine learning and artificial intelligence, said Viktor Kovrizhkin, a security expert at DataArt, which builds custom software for businesses.
“The main niche for applying machine learning and complex AI systems in healthcare cybersecurity is reactive analysis and notification or escalation of potential problems,” Kovrizhkin said. “In combination with other infrastructure components, a machine learning-based approach may respond with actions to anticipate potential data leaks.”
Making use of artificial intelligence is a progressive action, where a system constantly trains and identifies patterns of behavior and can discriminate between those considered normal and those that require attention or action, said Rafael Zubairov, a security expert at DataArt.
“For this, the machine can use a variety of available data sources, such as network activity, errors or denial of access to data, log files, and many more,” Zubairov said. “Continuous interaction with a person and information gathering after deep analysis allow systems to self-improve and avoid future problems.”
But successful use of artificial intelligence in healthcare requires a top-down approach that includes an executive in the know, LaMagna-Reiter said.
“An organisation must implement a defense-in-depth, multi-layer security program and have an executive-sponsored information security function in order to fully realise the benefits of implementing machine learning and AI,” LaMagna-Reiter explained. 
“Without those, machine learning and AI would be under-utilised tools that don’t have the opportunity to take the security program to the next step. Machine learning and AI are not a silver bullet, or even a one-size-fits-all solution.”

Healthcare News:

You Might Also Read:

Is It Really Possible to Protect Your Health Data?:

Healthcare Sector Accounts For 43% Of UK Data Breaches:

How Cybercrime Affects The Healthcare Industry:

 

« Hackers Attempt To Penetrate US Nuclear Plants
Are Corporate Cyber Defenses Adequate? »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

XioGuard

XioGuard

XioGuard is a managed security service for 360-degree cybersecurity coverage, protecting the entire attack surface, increasing performance, reducing cost, and simplifying operations.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Alchemy Security Consulting

Alchemy Security Consulting

Alchemy Security Consulting specialise in offensive and defensive cyber security. We find the weak link in your security so you can patch it up fast and avoid being hacked.