HHS Cybersecurity Program: HC3 Intelligence Briefing: A.I. Application and Security Implications in the Healthcare Industry TLP White Feb. 6, 2020

The emergence of artificial intelligence (AI) as a tool for better health care offers unprecedented opportunities to improve patient and clinical team outcomes, reduce costs, and impact population health. Internet of Things (IoT) sensor networks are characteristically different to conventional networks. Sensor devices are low powered and often use batteries as their primary source of energy.

• Examples include but are not limited to automation; providing patient, “fRamily” (friends and family unpaid caregivers), and health care professionals’ information synthesis; and recommendations and visualization of information for shared decision making.

• Data from Accenture estimates AI in healthcare will be a $6.6 billion marketby 2021 and healthcare providers are projected to save almost $150 billion by 2026 with the help of AIs that can prevent medication dosing errors. (Forbes)

The entire briefing follows under key resources.

Related Resources

Testimony
Public
John Riggi, AHA senior advisor for cybersecurity and risk, testimony before the Senate Homeland Security and Governmental Affairs Committee on defending…
Special Bulletin
Member
Federal agencies this morning are providing new information on an imminent ransomware threat to U.S. hospitals.
Special Bulletin
Member
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human Services (HHS)…
Issue Landing Page
The number of large-scale data breaches at American health care organization increased 65% from 2010 to 2016. As a result, federal agencies are increasing…
Guides/Reports
Trusted insiders, both witting and unwitting, can cause grave harm to your organizations facilities, resources, information, and personnel. Insider incidents…
Standards/Guidelines
Public
Agent Tesla is an established Remote Access Trojan (RAT) written in .Net. A successful deployment of Agent Tesla provides attackers with full computer or…