Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

News Feed Item

ComSec LLC Appoints Keesling Director of New Healthcare Cyber Defense Initiative

Healthcare is entering a fight against an opponent that is already armed with advanced tools and techniques that have been field tested against the global financial giants for years

VIRGINIA BEACH, Va., Jan. 24, 2013 /PRNewswire/ --

  • Healthcare data breaches are rapidly outpacing those of the financial services industry
  • Low cybersecurity preparedness in the Healthcare Industry creates challenges for Asymmetric warfare planning
  • ComSec Healthcare Assurance Options provides a preemptive counterespionage compliance plan for C-suite execs

ComSec LLC's President, J.D. LeaSure announced the appointment of healthcare industry veteran Tom Keesling to lead their newly established Healthcare Cyber Defense initiatives from its world headquarters in Virginia Beach, today.

After years of experience and specialization in the global counterespionage industry, LeaSure was alarmed at the rapid growth of data breaches in the US healthcare industry.  In fact, data breaches in the healthcare industry outpaced those experienced by the financial services industry by more than 300% in 2012.  According to the US Department of Health and Human Service, 21.4 million individuals have been compromised by breaches reported to the Office of Civil Rights since 2009, and this number is growing rapidly.

Department of Defense Secretary Panetta warns Congress of a "Cyber Pearl Harbor"

ComSec Healthcare was launched to provide customized cyber defense capabilities for the pharmaceutical, biotech, hospital, healthcare plan and medical device manufacturing industries.  Like all businesses, healthcare depends on a safe, secure, and resilient global digital infrastructure and requires a preemptive plan to identify cyber and technical security weaknesses that make it vulnerable to a technical security penetration of a facility. But the cyber risks are not limited to business espionage and criminal threats. Defense Secretary Leon Panetta has warned continuously since taking office of a "cyber Pearl Harbor" in testimony before Congress. 

IP Theft, Industrial Espionage and Extortion in the Pharmaceutical and Biotech Markets Result in Substantial Financial Loss

While difficult to get actual numbers from the US,  UK information intelligence expert BAE Systems Detica, indicate that cybercrime is costing the UK economy as much as £27 billion annually.

The hardest hit companies include those in the pharmaceutical and biotech industry. According to the report, £9.2 billion has been lost through intellectual property (IP) theft, £7.6 billion to industrial espionage and £2.2 billion from extortion.

Cyberterrorism Threats:  Is the US Healthcare System Safe?

Department of Defense and military cyber security organizations, such as the Center for Asymmetric Warfare, are beginning to express concern that the ease with which a hospital's internet security can be breached will create an inviting 'soft target' for cyberterrorists.  Nearly every domestic emergency scenario requires the seamless response of the local hospital, and the myriad number of organizations that swirl around it.  A hospital whose response during a time of crisis is compromised by crippled communications, non-functioning medical equipment or disabled HVAC systems would create an unforeseen chaos...which is the desired outcome of an asymmetric cyber attack. 

The ComSec Healthcare "Assurance Option Plan" for the C-suite Executive and Corporate Legal Counsel

Complementing the existing suite of Cyber TSCM Counterespionage services, the ComSec Healthcare Assurance Option provides corporate counsels and chief executives with a complete preemptive Cyber Technical Surveillance Counter Measures (Cyber TSCM) compliance audit program.  

ComSec Healthcare's goal is to equip corporate counsels and chief executives with the knowledge and tools required to institute counterespionage compliance plan to preempt potential internal and external illegal eavesdropping and technical security threats. The plan provides a comprehensive evaluation of business practices resulting in corporate espionage vulnerabilities and identifies a strategy to preempt future illegal eavesdropping attempts. The plan also educates and equips C-suite executives with valuable information on emerging corporate threats and new spying devices, as well as existing and evolving eavesdropping techniques. Ultimately, the plan equips corporate counsels and chief executives with the knowledge and information needed to protect their valuable corporate proprietary, competition sensitive and trade secret information,  

About ComSec LLC

ComSec, LLC, provides professional Cyber Technical Surveillance Counter Measures (Cyber TSCM) services to The Fortune 500, businesses, corporations, non-profit organizations, high net worth individuals and executives. With over 25 years of experience, we offer world-class counterespionage advisory services to customers in the United States, as well as global customers abroad. 

Visit ComSec LLC on the web at www.comsecllc.com/healthcare

Contact Information

Name: Tom Keesling, Director
Division: ComSec LLC Healthcare
Direct: +1 919 345 2758
Email: [email protected]

Related Links:
http://www.defense.gov/home/features/2010/0410_cybersec/
www.comsecllc.com/Healthcare
http://www.facebook.com/pages/ComSec-LLc/139008256159749  
http://twitter.com/ComSec  
http://www.linkedin.com/company/comsec-llc

 

SOURCE ComSec LLC

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...