﻿{"id":4094,"date":"2018-11-29T17:34:43","date_gmt":"2018-11-29T08:34:43","guid":{"rendered":"http:\/\/www.cloudsecurityalliance.jp\/newsite\/?page_id=4094"},"modified":"2021-11-14T19:04:01","modified_gmt":"2021-11-14T10:04:01","slug":"%e3%82%ac%e3%82%a4%e3%83%80%e3%83%b3%e3%82%b9%e3%80%80wg-3-2-2","status":"publish","type":"page","link":"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=4094","title":{"rendered":"Healthcare_WG"},"content":{"rendered":"<h2>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406\u30e6\u30fc\u30b6\u30fc\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u30da\u30fc\u30b8\u3067\u3059\u3002<\/h2>\n<p>CSA-JC \u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406\u30e6\u30fc\u30b6\u30fc\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306f\u3001CSA\u30b0\u30ed\u30fc\u30d0\u30eb\u306eHealth Information Management Working Group\u306e\u6d3b\u52d5\u306b\u6e96\u62e0\u3057\u3066\u3001\u60a3\u8005\uff0f\u751f\u6d3b\u8005\u4e2d\u5fc3\u306e\u8996\u70b9\u304b\u3089\u3001\u5065\u5eb7\u533b\u7642\u5206\u91ce\u306e\u30af\u30e9\u30a6\u30c9\u5229\u7528\u306b\u4fc2\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff0f\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u4fdd\u8b77\u3092\u652f\u63f4\u3059\u308b\u305f\u3081\u306e\u57fa\u672c\u7684\u306a\u8abf\u67fb\u7814\u7a76\u3092\u63d0\u4f9b\u3057\u3001\u30a8\u30f3\u30c9\u30e6\u30fc\u30b6\u30fc\u5411\u3051\u306e\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u5553\u767a\u6d3b\u52d5\u3092\u63a8\u9032\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u307e\u3059\u3002<\/p>\n<h3><strong>\u6d3b\u52d5\u8981\u65e8<\/strong><\/h3>\n<p>CSA-JC \u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406\u30e6\u30fc\u30b6\u30fc\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u8a2d\u7f6e\u4f01\u753b\u66f8\u306f\u3001<a href=\"http:\/\/www.cloudsecurityalliance.jp\/WG_PUB\/bigdata_WG\/CSA-JC%20BDUWG_plan_v1.1.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/p>\n<h3>\u516c\u958b\u60c5\u5831<\/h3>\n<ul>\n<li>\u300c\u65e5\u5370\u4eba\u6750\u80b2\u6210\u30fb\u4ea4\u6d41\u30a4\u30cb\u30b7\u30a2\u30c6\u30a3\u30d6\u8a2d\u7acb\u8da3\u610f\u66f8\u300d\u3092\u30a2\u30c3\u30d7\u3057\u307e\u3057\u305f(2018\u5e747\u670810\u65e5\uff09<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/HIM_WG\/CSA-JC%20Japan-India%20Initiative%20Charter_V1_20180703.pdf\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u3000\u65e5\u672c\u533b\u7642\u30d9\u30f3\u30c1\u30e3\u30fc\u5354\u4f1a\u8a18\u5ff5\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0\u300c\u533b\u7642\u306b\u304a\u3051\u308b\u30d3\u30c3\u30af\u30c7\u30fc\u30bf\u306e\u5229\u6d3b\u7528\u300d\u306e\u8cc7\u6599\u3092\u30a2\u30c3\u30d7\u3057\u307e\u3057\u305f\u3002\uff082018\u5e746\u670811\u65e5\uff09<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/HIM_WG\/20180611_CSA_sasahara_fiinal.pdf\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u52c9\u5f37\u4f1a\u8cc7\u6599\u300c\u6d77\u5916\u4e8b\u4f8b\u306b\u5b66\u3076\u30af\u30e9\u30a6\u30c9\u5229\u7528\u3068IT\u30ea\u30b9\u30af\u7ba1\u7406\u300d\u3092\u30a2\u30c3\u30d7\u3057\u307e\u3057\u305f\u3002<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/HIM_WG\/20171215_CSA_sasahara.pdf\">\u3053\u3061\u3089\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<li>\u516c\u958b\u52c9\u5f37\u4f1a\u8cc7\u6599\u3092\u30a2\u30c3\u30d7\u3057\u307e\u3057\u305f(2017\u5e747\u67086\u65e5\uff09\u3002\u8cc7\u6599\u306f\u4ee5\u4e0b\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3057\u3066\u304f\u3060\u3055\u3044\u3002\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/HIM_WG\/CSA_HIM_WS_20170531_Open.pdf\">\u8cc7\u65991<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/HIM_WG\/CSA_HIM_WS_2_20170703_Open.pdf\">\u8cc7\u65992<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\u30d8\u30eb\u30b9\u30b1\u30a2IT\u30002017\u3000\uff082017\u5e744\u670819\u65e5)<br \/>\n\u533b\u7642\u5206\u91ce\u306e\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\u5229\u6d3b\u7528\u300d\u3068\u984c\u3059\u308b\u8b1b\u6f14\u3092\u884c\u3044\u307e\u3057\u305f\u3002<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/healthit\/CSA_HIM_Blockchain_20170419_Open.pdf\">\u8cc7\u6599\u306f\u3053\u3061\u3089\u304b\u3089<\/a>\u3069\u3046\u305e\u3002<\/li>\n<li>ITmedia \u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30ba\u52c9\u5f37\u4f1a\uff082016\u5e748\u67085\u65e5\uff09<br \/>\n\u300c\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u8996\u70b9\u3067\u7406\u89e3\u3059\u308b\u4e16\u754c\u306e\u30c7\u30fc\u30bf\u7ba1\u7406\u30c8\u30ec\u30f3\u30c9\u3068\u3053\u308c\u304b\u3089\u300d\u3068\u984c\u3059\u308b\u8b1b\u6f14\u3092\u884c\u3044\u307e\u3057\u305f\u3002\u300d<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/healthit\/CSAJapan_HIMWG_20160805_Final.pdf\">\u8cc7\u6599\u306f\u3053\u3061\u3089\u304b\u3089<\/a>\u3069\u3046\u305e\u3002<\/li>\n<li>\u30d8\u30eb\u30b9\u30b1\u30a2IT\u30002016\u3000\uff082016\u5e744\u670820\u65e5\uff09<br \/>\n\u300c\u533b\u85ac\u54c1\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u3068IT\u30ea\u30b9\u30af\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u300d\u3068\u984c\u3059\u308b\u8b1b\u6f14\u3092\u884c\u3044\u307e\u3057\u305f\u3002<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/healthit\/CSA-J_HealthcareIT_20160411.pdf\">\u8cc7\u6599\u306f\u3053\u3061\u3089\u304b\u3089<\/a>\u3069\u3046\u305e\u3002<\/li>\n<li>\u533b\u7642\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30bb\u30df\u30ca\u30fcin\u516b\u738b\u5b50\uff082015\u5e742\u670816\u65e5\uff09<br \/>\n\u300c\u5065\u5eb7\u533b\u7642\u5206\u91ce\u306e\u6d77\u5916\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6700\u65b0\u52d5\u5411\u300d\u3068\u984c\u3059\u308b\u8b1b\u6f14\u3092\u884c\u3044\u307e\u3057\u305f\u3002<br \/>\n<a href=\"http:\/\/www.cloudsecurityalliance.jp\/WG_PUB\/HIM_WG\/20150216_HealthcareCloud_Cybersecurity_print.pdf\">\u8cc7\u6599\u306f\u3053\u3061\u3089\u304b\u3089<\/a>\u3069\u3046\u305e\u3002<\/li>\n<\/ul>\n<p><strong>\u6d3b\u52d5\u5185\u5bb9<\/strong><\/p>\n<p>[\u00a02021\u5e74\u5ea6\u6d3b\u52d5\u8a08\u753b\uff082021\u5e746\u67081\u65e5\uff5e2022\u5e745\u670831\u65e5\uff09]<br \/>\n1. \u6d3b\u52d5\u65b9\u91dd<\/p>\n<p>\u30fb\u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\uff0f\u533b\u85ac\u54c1\uff0f\u533b\u7642\u6a5f\u5668\u7523\u696d\u3001\u533b\u7642\u6a5f\u95a2\uff0f\u4ecb\u8b77\u65bd\u8a2d\uff0f\u5065\u5eb7\u5897\u9032\u30b5\u30fc\u30d3\u30b9\u4e8b\u696d\u8005\u3001\u60a3\u8005\uff0f\u6d88\u8cbb\u8005\u3092\u542b\u3080\u5065\u5eb7\u533b\u7642\u60c5\u5831\u30d0\u30ea\u30e5\u30fc\u30c1\u30a7\u30fc\u30f3\u5168\u4f53\u306b\u304a\u3051\u308bCSA\u30ac\u30a4\u30c0\u30f3\u30b9\u3001CCM\u3001STAR\u8a8d\u8a3c\u3001\u533b\u7642\u6a5f\u5668\uff0f\u9060\u9694\u533b\u7642\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u3001IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\uff0f\u30b5\u30fc\u30d0\u30fc\u30ec\u30b9\u30fb\u30ac\u30a4\u30c0\u30f3\u30b9\u7b49\u306e\u6709\u52b9\u6d3b\u7528\u306e\u63a8\u9032\u6d3b\u52d5<\/li>\n<li>CSA\u306e\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u304c\u4e3b\u5c0e\u3059\u308bCSA\u30ac\u30a4\u30c0\u30f3\u30b9\u3001CCM\u304a\u3088\u3073\u305d\u306e\u4ed6\u767a\u884c\u6587\u66f8\u985e\uff08\u4f8b\uff0eIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\uff09\u306b\u95a2\u3059\u308b\u3001\u696d\u754c\u306e\u8996\u70b9\u306b\u7acb\u3063\u305f\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u306e\u5b9f\u65bd\u304a\u3088\u3073\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u306e\u63d0\u4f9b<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u306b\u95a2\u308f\u308b\u56fd\u5185\u5916\u306e\u4e3b\u8981\u306a\u30b9\u30c6\u30fc\u30af\u30db\u30eb\u30c0\u30fc\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\uff08\u4f8b\uff0e\u30d5\u30a9\u30fc\u30ab\u30b9\u30b0\u30eb\u30fc\u30d7\u3001\u696d\u754c\u56e3\u4f53\u3001\u7814\u7a76\u6a5f\u95a2\u3001\u30d5\u30a9\u30fc\u30e9\u30e0\u3001\u5b66\u8853\u56e3\u4f53\u306a\u3069\uff09\u3068\u306e\u7a4d\u6975\u7684\u306a\u5354\u696d\u6d3b\u52d5<\/li>\n<li>\u4e0a\u8a18\u306b\u95a2\u3059\u308b\u5468\u77e5\u3001\u8a8d\u77e5\u3001\u7814\u7a76\u306e\u6a5f\u4f1a\u3092\u8a08\u753b\uff0f\u5b9f\u884c\u3059\u308b\u305f\u3081\u306b\u3001\u95a2\u897f\u652f\u90e8\u3068\u306e\u9023\u643a\u3092\u5f37\u5316\u3059\u308b<\/li>\n<\/ul>\n<p>\u30fb\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/p>\n<ul>\n<li>CSA HIM-WG\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\u3078\u306e\u7a4d\u6975\u7684\u30b3\u30df\u30c3\u30c8\u30e1\u30f3\u30c8<\/li>\n<li>CSA\u6d77\u5916\u30c1\u30e3\u30d7\u30bf\u30fc\u3068\u306e\u9023\u643a\u6d3b\u52d5\u5f37\u5316\uff08\u4f8b\uff1a\u4e2d\u56fd\u3001\u6771\u5357\u30a2\u30b8\u30a2\u3001\u30a4\u30f3\u30c9\u3001EMEA\uff09<\/li>\n<\/ul>\n<p>2. \u95a2\u897f\u652f\u90e8\u3068\u306e\u9023\u643a\u5f37\u5316\u6d3b\u52d5<\/p>\n<p>\uff5e\u95a2\u897f\u30d8\u30eb\u30b9\u30b1\u30a2\u696d\u754c\uff06\u88fd\u9020\u696d\u754c\u306b\u304a\u3051\u308b\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5553\u767a\u6d3b\u52d5<\/p>\n<ul>\n<li>CSA Health Information Management WG\u306e\u6210\u679c\u7269\u3092\u6d3b\u7528\u3057\u305f\u7d39\u4ecb\u30d6\u30ed\u30b0\u3068\u52c9\u5f37\u4f1a\u306e\u9023\u8f09\u4f01\u753b\u3092\u5c55\u958b\u3059\u308b<br \/>\n[\u6210\u679c\u7269]<br \/>\n\u30fb\u300cOWASP Secure Medical Devices Deployment Standard\u300d\uff082018\u5e748\u67087\u65e5\u767a\u884c\u3001OWASP\u3068\u306e\u5171\u8457\uff09<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/owasp-secure-medical-devices-deployment-standard\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/owasp-secure-medical-devices-deployment-standard\/<\/a><br \/>\n\u30fb\u300cManaging the Risk for Medical Devices Connected to the Cloud\u300d\uff082020\u5e743\u670816\u65e5\u767a\u884c\uff09<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/managing-the-risk-for-medical-devices-connected-to-the-cloud\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/managing-the-risk-for-medical-devices-connected-to-the-cloud\/<\/a><br \/>\n\u30fb\u300cTelehealth Data in the Cloud\u300d\uff082020\u5e746\u670816\u65e5\u767a\u884c\uff09<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/<\/a><br \/>\n\u30fb\u300cHealthcare Big Data in the Cloud\u300d\uff082020\u5e747\u670821\u65e5\u767a\u884c\uff09<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/<\/a>\u30fb\u300cTelehealth Risk Management\u300d\uff082021\u5e746\u67083\u65e5\u767a\u884c\u4e88\u5b9a\uff09<br \/>\n\u30fb\u300cProtecting the Privacy of Healthcare Data in the Cloud\u300d\uff08\u516c\u958b\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u4e2d\uff1a2021\u5e746\u67084\u65e5\u307e\u3067\uff09<br \/>\n\u30fb\u300cInformation Technology Governance, Risk and Compliance in Healthcare\u300d\uff08\u5185\u90e8\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\uff09<br \/>\n\u30fb\u300cThe Use of Blockchain in Healthcare\u300d\uff08\u5185\u90e8\u6700\u7d42\u30ec\u30d3\u30e5\u30fc\u4e2d\uff09<br \/>\n\u30fb\u300cRansomware in the Healthcare Industry\u300d\uff08\u30c9\u30e9\u30d5\u30c8\u4f5c\u6210\u4e2d\uff09<\/li>\n<\/ul>\n<p>[2021\u5e7410\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<br \/>\n[\u95a2\u897f\u652f\u90e8\u3068\u306e\u9023\u643a\u5f37\u5316\u6d3b\u52d5]<\/p>\n<ul>\n<li>2021\u5e7410\u670831\u65e5\u516c\u958b<br \/>\n\u30d6\u30ed\u30b0\u300c\u533b\u7642\u306b\u304a\u3051\u308b\u30d6\u30ed\u30c3\u30af\u30c1\u30a7\u30fc\u30f3\u5229\u7528\u300d<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/11\/01\/the-use-of-blockchain-in-healthcare\/\">https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/11\/01\/the-use-of-blockchain-in-healthcare\/<\/a><\/li>\n<\/ul>\n<p>[2021\u5e749\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<br \/>\n[\u95a2\u897f\u652f\u90e8\u3068\u306e\u9023\u643a\u5f37\u5316\u6d3b\u52d5]<\/p>\n<ul>\n<li>2021\u5e749\u670829\u65e5\uff08\u7d42\u4e86\uff09<br \/>\n\u7b2c2\u56deCSA\u95a2\u897f\u30fb\u5065\u5eb7\u533b\u7642WG\u516c\u958b\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u300c\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u533b\u7642\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u300d<br \/>\n\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\uff08CSA\u30b8\u30e3\u30d1\u30f3\uff09\u95a2\u897f\u652f\u90e8\u306f\u3001\u30d0\u30a4\u30aa\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u95a2\u897f\uff08BiocK\uff09\u69d8\u3068\u9023\u643a\u3057\u3066\u3001\u95a2\u897f\u767a\u30b9\u30de\u30fc\u30c8\u30d8\u30eb\u30b9\u30b1\u30a2\u306b\u304a\u3051\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u5c55\u958b\u652f\u63f4\u5171\u901aICT\u57fa\u76e4\u306e\u691c\u8a0e\u306b\u5411\u3051\u3066\u3001\u5065\u5eb7\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u9818\u57df\u306e\u6280\u8853\u8005\u3084\u30af\u30e9\u30a6\u30c9\u30e6\u30fc\u30b6\u30fc\u3001\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u95a2\u9023\u30b5\u30fc\u30d3\u30b9\u4e8b\u696d\u8005\u7b49\u3092\u5bfe\u8c61\u306b\u3001\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u5b9f\u65bd\u3057\u307e\u3059\u3002<\/li>\n<li><strong>\u30aa\u30fc\u30d7\u30cb\u30f3\u30b0<br \/>\n<\/strong>\u5742\u7530\u3000\u6052\u662d\u3000\u6c0f\u3000\u30d0\u30a4\u30aa\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u95a2\u897f\uff08BiocK\uff09\uff0f\u5927\u962a\u5927\u5b66\u7523\u5b66\u5171\u5275\u6a5f\u69cb\u7279\u4efb\u6559\u6388<\/li>\n<li><strong>\u8b1b\u6f14\uff11\uff1a<span class=\"author-206701052 font-color-000000 font-size-medium\"><span class=\"TextRun BCX2 SCXO164508159\" lang=\"JA-JP\" xml:lang=\"JA-JP\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX2 SCXO164508159\">\u300c\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u533b\u7642\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u4fdd\u8b77\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\u300d<br \/>\n<\/span><\/span><\/span><\/strong>\u8b1b\u5e2b\uff1a\u7b39\u539f\u3000\u82f1\u53f8\u3000<span class=\"author-206701052 font-color-000000 font-size-medium\">\u6c0f<br \/>\n<\/span>\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406\u30e6\u30fc\u30b6\u30fcWG\u30ea\u30fc\u30c0\u30fc<\/li>\n<li><strong>\u8b1b\u6f14\uff12\uff1a<span class=\"author-206701052 font-color-000000 font-size-medium\"><span class=\"TextRun BCX2 SCXO164508159\" lang=\"JA-JP\" xml:lang=\"JA-JP\" data-contrast=\"auto\"><span class=\"NormalTextRun BCX2 SCXO164508159\">\u300c\u79d8\u5bc6\u8a08\u7b97\u6280\u8853\u3068\u30c7\u30fc\u30bf\u5229\u6d3b\u7528\u306b\u3064\u3044\u3066\u300d<br \/>\n<\/span><\/span><\/span><\/strong>\u8b1b\u5e2b\uff1a\u85e4\u4e95\u3000\u4e86\u3000<span class=\"author-206701052 font-color-000000 font-size-medium\">\u6c0f<br \/>\n<\/span>\u65e5\u672c\u96fb\u6c17\u682a\u5f0f\u4f1a\u793e\u3000\u6280\u8853\u4fa1\u5024\u5275\u51fa\u672c\u90e8\u3000\u4e3b\u4efb\u7814\u7a76\u54e1<\/li>\n<li><strong>\u8b1b\u6f14\uff13\uff1a<span class=\"author-206701052 font-size-medium\">\u300c\u5065\u5eb7\u533b\u7642\u30fb\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u5206\u91ce\u306e\u30c7\u30fc\u30bf\u6226\u7565\u306b\u5fc5\u8981\u306a\u30b0\u30e9\u30f3\u30c9\u30c7\u30b6\u30a4\u30f3\u3068\u65e5\u672c\u306b\u304a\u3051\u308b\u53d6\u7d44\u306e\u6226\u7565\u300d<br \/>\n<\/span><\/strong>\u8b1b\u5e2b\uff1a\u5409\u6fa4\u3000\u5c1a\u3000\u6c0f<br \/>\nGRiT Partners \u6cd5\u5f8b\u4e8b\u52d9\u6240\u3000\u6240\u9577\u30fb\u30de\u30cd\u30fc\u30b8\u30f3\u30b0\u30d1\u30fc\u30c8\u30ca\u30fc<br \/>\n\u5185\u95a3\u5b98\u623f\u30d0\u30a4\u30aa\u6226\u7565\u6709\u8b58\u8005<br \/>\nWillsame\u682a\u5f0f\u4f1a\u793e CEO<br \/>\n\u6176\u61c9\u7fa9\u587e\u5927\u5b66\u5927\u5b66\u9662\u653f\u7b56\u30fb\u30e1\u30c7\u30a3\u30a2\u7814\u7a76\u79d1\u7279\u4efb\u8b1b\u5e2b<\/li>\n<li><strong>\u30d1\u30cd\u30eb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<\/strong><\/li>\n<li>\u65e5\u6642\uff1a2021\u5e749\u670829\u65e5\uff08\u6c34\uff09 18:30-20:30<br \/>\n\u53d7\u4ed8\uff1a18:20<br \/>\n\u30aa\u30fc\u30d7\u30cb\u30f3\u30b0\uff1a18:30-18:35<br \/>\n\u8b1b\u6f141\uff1a18:35-19:00<br \/>\n\u8b1b\u6f142\uff1a19:00-19:30<br \/>\n\u8b1b\u6f143\uff1a19:30-20:10<br \/>\n\u30d1\u30cd\u30eb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\uff1a20:10-20:30<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-250646661\">https:\/\/www.slideshare.net\/esasahara\/ss-250646661<\/a><\/li>\n<\/ul>\n<p>[2021\u5e748\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<br \/>\n[\u95a2\u897f\u652f\u90e8\u3068\u306e\u9023\u643a\u5f37\u5316\u6d3b\u52d5]<\/p>\n<ul>\n<li>2021\u5e748\u670823\u65e5\u516c\u958b<br \/>\n\u30d6\u30ed\u30b0\u300c\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u533b\u7642\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u4fdd\u8b77\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\uff08\u5f8c\u7de8\uff09\u300d<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/08\/23\/healthcare-big-data-in-the-cloud_2\/\">https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/08\/23\/healthcare-big-data-in-the-cloud_2\/<\/a><\/li>\n<li>2021\u5e748\u670815\u65e5\u516c\u958b<br \/>\n\u30d6\u30ed\u30b0\u300c\u30af\u30e9\u30a6\u30c9\u306b\u304a\u3051\u308b\u533b\u7642\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\u306e\u30d7\u30e9\u30a4\u30d0\u30b7\u30fc\u4fdd\u8b77\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7ba1\u7406\uff08\u524d\u7de8\uff09\u300d<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/08\/15\/healthcare-big-data-in-the-cloud\/\">https:\/\/cloudsecurityalliance.jp\/newblog\/2021\/08\/15\/healthcare-big-data-in-the-cloud\/<\/a><\/li>\n<\/ul>\n<p>[2021\u5e747\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<br \/>\n[\u95a2\u897f\u652f\u90e8\u3068\u306e\u9023\u643a\u5f37\u5316\u6d3b\u52d5]<\/p>\n<ul>\n<li>2021\u5e747\u670828\u65e5\uff08\u7d42\u4e86\uff09<br \/>\n<strong>\u7b2c1\u56de\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7<\/strong><br \/>\n<strong>\u300c\u30af\u30e9\u30a6\u30c9\u63a5\u7d9a\u3057\u305f\u533b\u7642\u6a5f\u5668\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u300d<\/strong>\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\uff08CSA\u30b8\u30e3\u30d1\u30f3\uff09\u95a2\u897f\u652f\u90e8\u306f\u3001\u30d0\u30a4\u30aa\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u95a2\u897f\uff08BiocK\uff09\u69d8\u3068\u9023\u643a\u3057\u3066\u3001\u95a2\u897f\u767a\u30b9\u30de\u30fc\u30c8\u30d8\u30eb\u30b9\u30b1\u30a2\u306b\u304a\u3051\u308b\u30b0\u30ed\u30fc\u30d0\u30eb\u5c55\u958b\u652f\u63f4\u5171\u901aICT\u57fa\u76e4\u306e\u691c\u8a0e\u306b\u5411\u3051\u3066\u3001\u5065\u5eb7\u533b\u7642\uff0f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u9818\u57df\u306e\u6280\u8853\u8005\u3084\u30af\u30e9\u30a6\u30c9\u30e6\u30fc\u30b6\u30fc\u3001\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u95a2\u9023\u30b5\u30fc\u30d3\u30b9\u4e8b\u696d\u8005\u7b49\u3092\u5bfe\u8c61\u306b\u3001\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u3092\u5b9f\u65bd\u3057\u307e\u3059\u3002<\/li>\n<li>\u8b1b\u6f14\uff11\uff1a\u300c\u30b0\u30ed\u30fc\u30d0\u30eb\u30d0\u30a4\u30aa\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306e\u5f62\u6210\u306b\u5411\u3051\u3066\u300d\u8b1b\u5e2b\uff1a\u5742\u7530\u6052\u662d\u3000\u6c0f\u3000\u30d0\u30a4\u30aa\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u95a2\u897f\uff08BiocK\uff09\uff0f\u5927\u962a\u5927\u5b66\u7523\u5b66\u5171\u5275\u6a5f\u69cb\u7279\u4efb\u6559\u6388<\/li>\n<li>\u8b1b\u6f14\uff12\uff1a\u300c\u30af\u30e9\u30a6\u30c9\u63a5\u7d9a\u3057\u305f\u533b\u7642\u6a5f\u5668\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u300d\u8b1b\u5e2b\uff1a\u7b39\u539f\u82f1\u53f8\u3000\u6c0f\u3000\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406\u30e6\u30fc\u30b6\u30fcWG\u30ea\u30fc\u30c0\u30fc<\/li>\n<li>\u30e9\u30a4\u30c8\u30cb\u30f3\u30b0\u30c8\u30fc\u30af\uff06\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\u30fb\u30bb\u30c3\u30b7\u30e7\u30f3\uff1a\u95a2\u897f\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u95a2\u9023\u4f01\u696d\u306b\u3088\u308b\u533b\u7642\u6a5f\u5668\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u53d6\u7d44\u4e8b\u4f8b<br \/>\n\u30af\u30e9\u30a6\u30c9\u95a2\u9023\u30b5\u30fc\u30d3\u30b9\u4f01\u696d\u306b\u3088\u308b\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u7d39\u4ecb<br \/>\n\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u95a2\u9023\u56e3\u4f53\u306b\u3088\u308b\u5553\u767a\u6d3b\u52d5\u3000\u4ed6<br \/>\n\u30d1\u30cd\u30e9\u30fc\uff1a\u8c37\u672c\u91cd\u548c\u3000\u6c0f\u3000\u30b7\u30b9\u30e1\u30c3\u30af\u30b9\u682a\u5f0f\u4f1a\u793e\u3000DX\u63a8\u9032\u672c\u90e8\u3000\u30c7\u30b8\u30bf\u30eb\u4f01\u753b\u90e8\u3000Sysmex-CSIRT\u821f\u6728\u5eb7\u6d69\u3000\u6c0f\u3000\u30bf\u30ec\u30b9DIS CPL\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e\u3000\u30c7\u30fc\u30bf\u30d7\u30ed\u30c6\u30af\u30b7\u30e7\u30f3\u4e8b\u696d\u672c\u90e8\u3000\u30bb\u30fc\u30eb\u30b9\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u30de\u30cd\u30fc\u30b8\u30e3\u30fc\u3000CISSP\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1a\u7b39\u539f \u82f1\u53f8\uff08CSA\u30b8\u30e3\u30d1\u30f3\uff09\u65e5\u6642\uff1a2021\u5e747\u670828\u65e5\uff08\u6c34\uff09 18:30-20:00\u53d7\u4ed8\uff1a18:20<br \/>\n\u8b1b\u6f141\uff1a18:35-18:50<br \/>\n\u8b1b\u6f142\uff1a18:50-19:25<br \/>\nLT\u30fb\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3\uff1a19:30-20:00<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ss-249906829\/\">https:\/\/www.slideshare.net\/esasahara\/ss-249906829\/<\/a><\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e747\u670822\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><b>CSA Events and Updates<\/b>\n<ul>\n<li><strong>Healthcare Data Breach &#8211; who is at fault?<\/strong>\n<ul>\n<li>Elekta Health Data Breach Strikes Jefferson Health, Disclosing PHI<\/li>\n<li>Vince gave an overview of how Jefferson Health is notifying patients of a health data breach that exposed patient PHI, and lead a group discussion on the topic getting perspectives of the issue from Jim from Trinity Health, Richard and Eric from Optum\u00a0<span class=\"ILfuVd NA6bn\"><span class=\"hgKElc\">(United Health Care)<\/span><\/span>, and others on the call.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Medical Device Incident Response Playbook\u00a0&#8211; IoT paper in peer review until 8\/11<br \/>\n<\/strong><\/p>\n<ul>\n<li>This document presents a best-practices medical device incident response playbook that incorporates clinical aspects of medical device IR. As such, this guidance should be reviewed and adapted by clinical leadership to ensure it is acceptable from a patient care standpoint. This document should be viewed as a starting point for medical device incident response and not a prescriptive end goal.<\/li>\n<li><strong>Peer Review:\u00a0<\/strong><a href=\"https:\/\/cloudsecurityalliance.org\/research\/contribute#peer-reviews\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/research\/contribute#peer-reviews<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Publications Update<\/strong>\n<ul>\n<li aria-level=\"3\"><strong><b>Recent Releases<\/b><\/strong>\n<ul>\n<li aria-level=\"3\"><strong><b>Telehealth Risk Management<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">The global pandemic has changed the rules governing telehealth dramatically, prompting HDOs to quickly update the required changes for achieving an effective governance and risk program. Having the processes in place will ensure a smooth and seamless transition to the new requirements while improving the current risk posture.<\/li>\n<li aria-level=\"2\"><b>Released:\u00a0<\/b>June 10<sup>th<\/sup><br \/>\n<b><\/b><\/li>\n<li><b>Press Release:<\/b>\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/press-releases\/2021\/06\/10\/cloud-security-alliance-new-telehealth-risk-management-guidance-to-help-ensure-privacy-and-security-of-patient-information\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/press-releases\/2021\/06\/10\/cloud-security-alliance-new-telehealth-risk-management-guidance-to-help-ensure-privacy-and-security-of-patient-information\/<\/a><b><br \/>\n<\/b><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong><b>The Use of Blockchain in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">This paper\u00a0investigates current blockchain use cases\u00a0in the medical field and the impact they may have. It begins with a description of blockchain technology and then discusses the benefits of using blockchain in healthcare, such as increasing the\u00a0security of telehealth systems.\u00a0\u00a0By using blockchain, organizations may be able to efficiently share healthcare data while ensuring patient privacy and data security at the same time.<\/li>\n<li><b>Released:\u00a0<\/b>July 15<sup>th<\/sup>, 2021<b><\/b><\/li>\n<li><b>Press Release:\u00a0<\/b>Scheduled for August 2<sup>nd<\/sup><b><br \/>\n<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"2\"><strong><b>Upcoming Releases<\/b><\/strong>\n<ul>\n<li aria-level=\"2\"><b>Protecting the Privacy of Healthcare Data in the Cloud<\/b>\n<ul>\n<li aria-level=\"2\">Privacy is concerned with decisions about who should legitimately have the capability to access and alter information. In healthcare, the value associated with technology is connected to the collection of personal information. Ideally, technology should optimize the benefits individuals derive from technology while protecting the individual&#8217;s privacy.<\/li>\n<li aria-level=\"2\">Since 7\/21 meeting, received confirmation to put into final publication<b><br \/>\n<\/b><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><b>Ransomware in the Healthcare Industry<\/b>\n<ul>\n<li aria-level=\"2\">Ransomware is the fastest-growing malware threat today and is already an epidemic. The number of ransomware incidents affecting healthcare has grown substantially in the past few years. And has quickly become extremely lucrative for criminal enterprises. Ransomware directly affects the ability of the Healthcare Delivery Organization (HDO) to access their data.<\/li>\n<li aria-level=\"2\">Submitted to copyeditors<b><br \/>\n<\/b><b><\/b><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong><b>Information Technology Governance, Risk and Compliance in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">GRC is the policies and procedures that manage the organization&#8217;s process for aligning the management and control of information with business objectives, the organization&#8217;s risk tolerance, and how they comply with regulations and manage risk. This paper shows how to create a program for each and then integrate them into one cohesive and effective program.<\/li>\n<li aria-level=\"2\">Out of peer review July 21<sup>st<\/sup>, ready for final review and approval before submitting to copyeditors<strong><br \/>\n<\/strong><b><\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare research projects in development<\/strong>\n<ul>\n<li><strong>AI in healthcare systems<\/strong><\/li>\n<li aria-level=\"2\">Jim is still working on a 1<sup>st<\/sup>\u00a0draft<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li aria-level=\"2\"><strong>Ransomware additional content<\/strong>\n<ul>\n<li aria-level=\"2\">Jim will work on an announcement blog post<\/li>\n<li aria-level=\"3\">Threat Modeling Project being developed by Top Threats group\n<ul>\n<li aria-level=\"2\">HIM group can contribute to Top Threats or Deep Dive pieces later<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Supply chain risk management<\/strong>\n<ul>\n<li aria-level=\"2\">Michael has done first draft of research and will continue when ready<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Building a Successful Vendor Risk Assessment (VRA) Program<\/strong>\n<ul>\n<li aria-level=\"2\">Ashish is working on an outline blueprint that he will share at a future meeting<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Interoperability between providers<\/strong>\n<ul>\n<li>Michael has done first draft of research and will continue when ready<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Next Meeting<\/strong>\n<ul>\n<li aria-level=\"1\"><strong>\u00a0August 4<sup>th<\/sup>\u00a011:30 AM<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>2-1-2.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e747\u67088\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><b>CSA Events and Updates<\/b>\n<ul>\n<li>Chapter Events\u00a0&#8211; Summer 2021\n<ul>\n<li>Moving from Cyber Security to Cyber Resiliency in the Cloud<\/li>\n<li>CloudCon 2021<\/li>\n<li>Account Takeover in Office 365<\/li>\n<li>Dark Web, Demystified<\/li>\n<\/ul>\n<\/li>\n<li>CCAK Questions and Answers Collection<\/li>\n<\/ul>\n<\/li>\n<li>Medical Device Incident Response Playbook<strong><br \/>\n<\/strong><\/p>\n<ul>\n<li>Last chance to add feedback to this IoT group paper before it enters public peer review<\/li>\n<\/ul>\n<\/li>\n<li><strong>Recent Releases<\/strong>\n<ul>\n<li aria-level=\"3\">Telehealth Risk Management\n<ul>\n<li aria-level=\"2\">The global pandemic has changed the rules governing telehealth dramatically, prompting HDOs to quickly update the required changes for achieving an effective governance and risk program. Having the processes in place will ensure a smooth and seamless transition to the new requirements while improving the current risk posture.<\/li>\n<li aria-level=\"2\">Released: June 10th<\/li>\n<li>Press Release:\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/press-releases\/2021\/06\/10\/cloud-security-alliance-new-telehealth-risk-management-guidance-to-help-ensure-privacy-and-security-of-patient-information\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/press-releases\/2021\/06\/10\/cloud-security-alliance-new-telehealth-risk-management-guidance-to-help-ensure-privacy-and-security-of-patient-information\/<\/a><b><br \/>\n<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"2\"><strong><b>Upcoming Releases<br \/>\n<\/b><\/strong><\/p>\n<ul>\n<li aria-level=\"2\"><strong>The Use of Blockchain in Healthcare<\/strong>\n<ul>\n<li aria-level=\"2\">This paper\u00a0investigates current blockchain use cases\u00a0in the medical field and the impact they may have. It begins with a description of blockchain technology and then discusses the benefits of using blockchain in healthcare, such as increasing the\u00a0security of telehealth systems.\u00a0\u00a0By using blockchain, organizations may be able to efficiently share healthcare data while ensuring patient privacy and data security at the same time.\n<ul>\n<li>Final design, scheduled for July release<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><b>Protecting the Privacy of Healthcare Data in the Cloud<\/b>\n<ul>\n<li aria-level=\"2\">Privacy is concerned with decisions about who should legitimately have the capability to access and alter information. In healthcare, the value associated with technology is connected to the collection of personal information. Ideally, technology should optimize the benefits individuals derive from technology while protecting the individual&#8217;s privacy.\n<ul>\n<li aria-level=\"2\">Final review, scheduled for July\/August release<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Peer Review:<\/strong><strong><br \/>\n<\/strong><\/p>\n<ul>\n<li aria-level=\"2\"><b>Ransomware in the Healthcare Industry<\/b>\n<ul>\n<li aria-level=\"2\">Ransomware is the fastest-growing malware threat today and is already an epidemic. The number of ransomware incidents affecting healthcare has grown substantially in the past few years. And has quickly become extremely lucrative for criminal enterprises. Ransomware directly affects the ability of the Healthcare Delivery Organization (HDO) to access their data.\n<ul>\n<li aria-level=\"2\">Open until July 9<sup>th<\/sup>, 2021<b><br \/>\n<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong><b>Information Technology Governance, Risk and Compliance in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">GRC is the policies and procedures that manage the organization&#8217;s process for aligning the management and control of information with business objectives, the organization&#8217;s risk tolerance, and how they comply with regulations and manage risk. This paper shows how to create a program for each and then integrate them into one cohesive and effective program.\n<ul>\n<li aria-level=\"2\">Open until July 21<sup>st<\/sup>, 2021<strong><br \/>\n<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Healthcare research projects in development<\/strong>\n<ul>\n<li aria-level=\"2\"><strong>AI in healthcare systems<\/strong>\n<ul>\n<li aria-level=\"2\">Jim is still working on a 1<sup>st<\/sup>\u00a0draft<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Ransomware additional content<\/strong>\n<ul>\n<li aria-level=\"2\">Jim will work on an announcement blog post<\/li>\n<li aria-level=\"3\">Threat Modeling Project being developed by Top Threats group\n<ul>\n<li aria-level=\"2\">HIM group can contribute to Top Threats or Deep Dive pieces later<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Supply chain risk management<\/strong>\n<ul>\n<li aria-level=\"2\">Michael has done first draft of research and will continue when ready<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Building a Successful Vendor Risk Assessment (VRA) Program<\/strong>\n<ul>\n<li aria-level=\"2\">Ashish is working on an outline blueprint that he will share at a future meeting<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Interoperability between providers<\/strong>\n<ul>\n<li>Michael has done first draft of research and will continue when ready<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Next Meeting<\/strong>\n<ul>\n<li aria-level=\"1\">\u00a0<strong>Wednesday, Ju<\/strong><b>ly 21<\/b><b><sup>st<\/sup>\u00a0<\/b><b>11:30 AM PT<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2021\u5e746\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<br \/>\n[\u95a2\u897f\u652f\u90e8\u3068\u306e\u9023\u643a\u5f37\u5316\u6d3b\u52d5]<\/p>\n<ul>\n<li>2021\u5e746\u670822\u65e5\u516c\u958b<br \/>\n\u30d6\u30ed\u30b0\u300c\u30af\u30e9\u30a6\u30c9\u63a5\u7d9a\u3057\u305f\u533b\u7642\u6a5f\u5668\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u300d<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?p=18260\">https:\/\/www.cloudsecurityalliance.jp\/site\/?p=18260<\/a><\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e746\u670824\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><b>CSA News and Events<\/b>\n<ul>\n<li>Chapter Events\u00a0&#8211; Summer 2021\n<ul>\n<li>Moving from Cyber Security to Cyber Resiliency in the Cloud<\/li>\n<li>CloudCon 2021<\/li>\n<li>Account Takeover in Office 365<\/li>\n<\/ul>\n<\/li>\n<li>CSA Blog<\/li>\n<li>CAIQ v4 Released<\/li>\n<\/ul>\n<\/li>\n<li><strong>Medical Device Incident Response Playbook<br \/>\n<\/strong><\/p>\n<ul>\n<li>Michael Roza reviewed the Medical Device Incident Response Playbook<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"3\"><strong><b>Healthcare Publications Status Update<\/b><\/strong>\n<ul>\n<li aria-level=\"3\"><strong><b>Recent Releases<\/b><\/strong>\n<ul>\n<li aria-level=\"3\"><strong><b>Telehealth Risk Management<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">The global pandemic has changed the rules governing telehealth dramatically, prompting HDOs to quickly update the required changes for achieving an effective governance and risk program. Having the processes in place will ensure a smooth and seamless transition to the new requirements while improving the current risk posture.\n<ul>\n<li aria-level=\"2\"><b>Released June 10th<\/b><br \/>\n<b><\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><b>Press Release<\/b>\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/press-releases\/2021\/06\/10\/cloud-security-alliance-new-telehealth-risk-management-guidance-to-help-ensure-privacy-and-security-of-patient-information\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/press-releases\/2021\/06\/10\/cloud-security-alliance-new-telehealth-risk-management-guidance-to-help-ensure-privacy-and-security-of-patient-information\/<\/a><b><br \/>\n<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong><b>Upcoming Releases<\/b><\/strong>\n<ul>\n<li aria-level=\"2\"><strong><b>The Use of Blockchain in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">This paper\u00a0investigates current blockchain use cases\u00a0in the medical field and the impact they may have. It begins with a description of blockchain technology and then discusses the benefits of using blockchain in healthcare, such as increasing the\u00a0security of telehealth systems.\u00a0\u00a0By using blockchain, organizations may be able to efficiently share healthcare data while ensuring patient privacy and data security at the same time.\n<ul>\n<li><strong>Final Design,\u00a0<b>scheduled for July release<\/b><\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><b>Protecting the Privacy of Healthcare Data in the Cloud<\/b>\n<ul>\n<li aria-level=\"2\">Privacy is concerned with decisions about who should legitimately have the capability to access and alter information. In healthcare, the value associated with technology is connected to the collection of personal information. Ideally, technology should optimize the benefits individuals derive from technology while protecting the individual&#8217;s privacy.\n<ul>\n<li aria-level=\"2\"><b>Final Design, Scheduled August release<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Currently in Peer Review<\/strong>\n<ul>\n<li aria-level=\"2\"><b>Ransomware in the Healthcare Industry<\/b>\n<ul>\n<li aria-level=\"2\">Ransomware is the fastest-growing malware threat today and is already an epidemic. The number of ransomware incidents affecting healthcare has grown substantially in the past few years. And has quickly become extremely lucrative for criminal enterprises. Ransomware directly affects the ability of the Healthcare Delivery Organization (HDO) to access their data.\n<ul>\n<li aria-level=\"2\"><b>Open until July 9<sup>th<\/sup><br \/>\n<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong><b>Information Technology Governance, Risk and Compliance in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">GRC is the policies and procedures that manage the organization&#8217;s process for aligning the management and control of information with business objectives, the organization&#8217;s risk tolerance, and how they comply with regulations and manage risk. This paper shows how to create a program for each and then integrate them into one cohesive and effective program.\n<ul>\n<li aria-level=\"2\"><strong>Open until July 21st<\/strong><br \/>\n<b><\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong><a href=\"https:\/\/cloudsecurityalliance.org\/research\/contribute#peer-reviews\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/research\/contribute#peer-reviews<\/a><\/strong><br \/>\n<b><\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Healthcare Research Projects in Development<\/strong>\n<ul>\n<li aria-level=\"2\"><strong>AI in healthcare systems<\/strong>\n<ul>\n<li aria-level=\"2\">Jim is working on a 1<sup>st<\/sup>\u00a0draft<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Ransomware additional content<\/strong>\n<ul>\n<li aria-level=\"2\">Jim will work on an announcement blog post<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Supply chain risk management<\/strong>\n<ul>\n<li aria-level=\"2\">Michael has done first draft of research and will continue when ready<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Building a Successful Vendor Risk Assessment (VRA) Program<\/strong>\n<ul>\n<li aria-level=\"2\">Ashish is working on an outline<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Interoperability between providers<\/strong>\n<ul>\n<li>Michael has done first draft of research and will continue when ready<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Next Meeting<\/strong>\n<ul>\n<li aria-level=\"1\">\u00a0<strong>Wednesday, Ju<\/strong><b>ly 7<\/b><b>th\u00a0<\/b><b>11:30 AM PT<\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2021\u5e745\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e745\u670827\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>HIM Activities, CSA Events<\/strong>\n<ul>\n<li>Chapter Events- Summer 2021\n<ul>\n<li>How to Think Life a Hacker to Avoid Cloud Exploits\n<ul>\n<li>June 10th, 2021<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>RSA Conference 2021<\/li>\n<li>CCAK Exam now available<\/li>\n<li>CSA Blog<\/li>\n<li>Certificate of Cloud Auditing Knowledge (CCAK)<\/li>\n<li>New Member Introductions<\/li>\n<li>Group suggestions for the research publications, initiatives, and upcoming meetings<\/li>\n<li>Open Discussion, Q&amp;A, Next Meeting<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Healthcare Publications in Development<\/strong><\/li>\n<li aria-level=\"3\"><strong><b>Design, Peer Review<\/b><\/strong>\n<ul>\n<li aria-level=\"3\"><strong><b>Telehealth Risk Management<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">The global pandemic has changed the rules governing telehealth dramatically, prompting HDOs to quickly update the required changes for achieving an effective governance and risk program. Having the processes in place will ensure a smooth and seamless transition to the new requirements while improving the current risk posture.\n<ul>\n<li aria-level=\"2\">Copy edit and design, scheduled for release June 3rd<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong><b>The Use of Blockchain in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">This paper\u00a0investigates current blockchain use cases\u00a0in the medical field and the impact they may have. It begins with a description of blockchain technology and then discusses the benefits of using blockchain in healthcare, such as increasing the\u00a0security of telehealth systems.\u00a0\u00a0By using blockchain, organizations may be able to efficiently share healthcare data while ensuring patient privacy and data security at the same time.\n<ul>\n<li>Copy edit and design, reviewing copyeditor&#8217;s final version<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><b>Protecting the Privacy of Healthcare Data in the Cloud<\/b>\n<ul>\n<li aria-level=\"2\">Privacy is concerned with decisions about who should legitimately have the capability to access and alter information. In healthcare, the value associated with technology is connected to the collection of personal information. Ideally, technology should optimize the benefits individuals derive from technology while protecting the individual&#8217;s privacy.\n<ul>\n<li aria-level=\"2\">Peer Review Until June 4th:\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/protecting-the-privacy-of-healthcare-data-in-the-cloud\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/artifacts\/protecting-the-privacy-of-healthcare-data-in-the-cloud\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Research and Development<\/strong>\n<ul>\n<li aria-level=\"2\"><b>Ransomware in the Healthcare Industry<\/b>\n<ul>\n<li aria-level=\"2\">Ransomware is the fastest-growing malware threat today and is already an epidemic. The number of ransomware incidents affecting healthcare has grown substantially in the past few years. And has quickly become extremely lucrative for criminal enterprises. Ransomware directly affects the ability of the Healthcare Delivery Organization (HDO) to access their data.\n<ul>\n<li aria-level=\"2\"><b>Draft in internal review, ready for public peer review<br \/>\n<\/b><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\">Group discussion on current ransomware threats and mitigation techniques, and plans to create a blog post to more quickly provide ransomware recommendations and best practices for healthcare providers.<\/li>\n<li aria-level=\"2\">Discussed the recent Conti ransomware healthcare network attacks in Ireland, US, and worldwide:\n<ul>\n<li aria-level=\"2\"><b><b><a href=\"https:\/\/www.healthcareitnews.com\/news\/fbi-warns-conti-ransomware-attacks-targeting-us-healthcare-networks\" target=\"_blank\" rel=\"noopener\">https:\/\/www.healthcareitnews.com\/news\/fbi-warns-conti-ransomware-attacks-targeting-us-healthcare-networks<\/a><\/b><\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong><b>Information Technology Governance, Risk and Compliance in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">GRC is the policies and procedures that manage the organization&#8217;s process for aligning the management and control of information with business objectives, the organization&#8217;s risk tolerance, and how they comply with regulations and manage risk. This paper shows how to create a program for each and then integrate them into one cohesive and effective program.\n<ul>\n<li aria-level=\"2\">Draft in internal review<b>,<\/b>\u00a0ready for public peer review<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Healthcare initiative topics for consideration<\/strong>\n<ul>\n<li aria-level=\"1\">AI in healthcare systems<\/li>\n<li aria-level=\"1\">Healthcare Interoperability between providers<\/li>\n<li aria-level=\"1\">Building a Successful Vendor Risk Assessment (VRA) Program<strong><br \/>\n<\/strong><\/li>\n<li aria-level=\"1\">Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<\/ul>\n<\/li>\n<li><strong>Open Discussion, Q&amp;A<\/strong><\/li>\n<li><strong>Next Meeting<\/strong>\n<ul>\n<li aria-level=\"1\">\u00a0Wednesday, June 9th 11:30 AM PT<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>2-1-2.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e745\u670813\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events<\/strong>\n<ul>\n<li>Chapter Events\n<ul>\n<li><strong>May 15th &#8211; June 10th, 2021<\/strong><\/li>\n<\/ul>\n<\/li>\n<li>RSA Conference 2021\n<ul>\n<li aria-level=\"3\">May 17th &#8211; 20th, 2021<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"3\"><strong>CCAK Exam now available<br \/>\n<\/strong><\/li>\n<li aria-level=\"3\"><strong>CSA Blog<\/strong><\/li>\n<li aria-level=\"3\"><strong><b>Healthcare Publications Status Update<br \/>\n<\/b><\/strong><\/p>\n<ul>\n<li aria-level=\"2\">Telehealth Risk Management<\/li>\n<li aria-level=\"2\">The Use of Blockchain in Healthcare<\/li>\n<li aria-level=\"2\">Protecting the Privacy of Healthcare Data in the Cloud<\/li>\n<li aria-level=\"2\">Governance, Risk, and Compliance (GRC)<\/li>\n<li aria-level=\"2\">Ransomware in the Healthcare Industry<strong><b><br \/>\n<\/b><\/strong><b><\/b><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"3\">Healthcare Initiatives for considerations<\/li>\n<li aria-level=\"3\">Open Discussion, Q&amp;A<strong><strong><b><br \/>\n<\/b><\/strong><\/strong><\/p>\n<h4><strong><strong><b>[Healthcare Publications in Design, Peer Review]<\/b><\/strong><\/strong><\/h4>\n<\/li>\n<li aria-level=\"2\"><strong><b>Telehealth Risk Management<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">The global pandemic has changed the rules governing telehealth dramatically, prompting HDOs to quickly update the required changes for achieving an effective governance and risk program. Having the processes in place will ensure a smooth and seamless transition to the new requirements while improving the current risk posture.\u00a0.\n<ul>\n<li>Copy Edit and Design, Preparing for publication as soon as possible<strong><br \/>\n<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\" aria-level=\"2\">\n<ul>\n<li style=\"list-style-type: none;\" aria-level=\"2\"><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong><b>The Use of Blockchain in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">This paper\u00a0investigates current blockchain use cases\u00a0in the medical field and the impact they may have. It begins with a description of blockchain technology and then discusses the benefits of using blockchain in healthcare, such as increasing the\u00a0security of telehealth systems.\u00a0\u00a0By using blockchain, organizations may be able to efficiently share healthcare data while ensuring patient privacy and data security at the same time.\n<ul>\n<li>Copy Edit and Design, Preparing for publication as soon as possible<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Protecting the Privacy of Healthcare Data in the Cloud<\/strong><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\" aria-level=\"2\">\n<ul>\n<li style=\"list-style-type: none;\" aria-level=\"2\">Privacy is concerned with decisions about who should legitimately have the capability to access and alter information. In healthcare, the value associated with technology is connected to the collection of personal information. Ideally, technology should optimize the benefits individuals derive from technology while protecting the individual&#8217;s privacy.<strong><br \/>\n<\/strong><\/p>\n<ul>\n<li aria-level=\"2\">Peer Review until June 1st<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"3\"><strong><strong>Healthcare Publications in Development<br \/>\n<\/strong><\/strong><\/p>\n<ul>\n<li aria-level=\"2\"><strong><b>Information Technology Governance, Risk and Compliance in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">GRC is the policies and procedures that manage the organization&#8217;s process for aligning the management and control of information with business objectives, the organization&#8217;s risk tolerance, and how they comply with regulations and manage risk. This paper shows how to create a program for each and then integrate them into one cohesive and effective program.\n<ul>\n<li aria-level=\"2\">Draft in internal review<b>,<\/b>\u00a0ready for public peer review<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><b>Ransomware in the Healthcare Industry<\/b>\n<ul>\n<li aria-level=\"2\">Ransomware is the fastest-growing malware threat today and is already an epidemic. The number of ransomware incidents affecting healthcare has grown substantially in the past few years. And has quickly become extremely lucrative for criminal enterprises. Ransomware directly affects the ability of the Healthcare Delivery Organization (HDO) to access their data.\n<ul>\n<li aria-level=\"2\">Draft in internal review,\u00a0open for comments and recommendation<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Healthcare initiative topics for consideration<\/strong>\n<ul>\n<li aria-level=\"2\">On hold until the current papers (Telehealth Risk, Blockchain in Healthcare) that are in the last stage of publication are released, so that we can clear our queue of projects to focus on.\n<ul>\n<li aria-level=\"1\">AI in healthcare systems<\/li>\n<li aria-level=\"1\">Healthcare Interoperability between providers<\/li>\n<li aria-level=\"1\">Covid tracking and tracing, post mass vaccinations<\/li>\n<li aria-level=\"1\">Building a Successful Vendor Risk Assessment (VRA) Program<strong><br \/>\n<\/strong><\/li>\n<li aria-level=\"1\">Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<li aria-level=\"1\">Cloud based Electronic Health Records<\/li>\n<li aria-level=\"1\">Regulations Frameworks (HIPAA, GDPR, GAPP)<\/li>\n<li aria-level=\"1\">Standards activities (ISO, NIST, EU, California law)<\/li>\n<li aria-level=\"1\">Medical device and Health IT Joint Security Plan<\/li>\n<li aria-level=\"1\">Technologies to protect healthcare data<\/li>\n<li aria-level=\"1\">Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Open Discussion, Q&amp;A<br \/>\n<\/strong><\/li>\n<li><strong>Next Meeting<\/strong>\n<ul>\n<li aria-level=\"1\">\u00a0Wednesday, May 26<sup>th<\/sup>, 11:30 AM PT<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2021\u5e744\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e744\u670829\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>HIM Activities, CSA Events<\/strong>\n<ul>\n<li>Chapter Events\n<ul>\n<li>April 28th &#8211; May 20th, 2021<\/li>\n<\/ul>\n<\/li>\n<li>RSA Conference 2021<\/li>\n<li>CCAK Exam now available<\/li>\n<li>CSA Blog<\/li>\n<li>Healthcare Playbook\n<ul>\n<li aria-level=\"3\">A paper in development outside of the working group connecting the CCM and STAR to sector specific requirements in the healthcare industry.<\/li>\n<li aria-level=\"3\">We are looking for subject matter experts from the HIM working group who would be interested in reviewing the Healthcare Playbook.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Healthcare Publications in Development<\/strong>\n<ul>\n<li aria-level=\"2\"><strong>Telehealth Risk Management<\/strong>\n<ul>\n<li aria-level=\"2\">The global pandemic has changed the rules governing telehealth dramatically, prompting HDOs to quickly update the required changes for achieving an effective governance and risk program. Having the processes in place will ensure a smooth and seamless transition to the new requirements while improving the current risk posture.\n<ul>\n<li aria-level=\"2\">Copy Edit and Design phase, preparing for publication as soon as possible<br \/>\n<strong><br \/>\n<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong><b>The Use of Blockchain in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">This paper\u00a0investigates current blockchain use cases\u00a0in the medical field and the impact they may have. It begins with a description of blockchain technology and then discusses the benefits of using blockchain in healthcare, such as increasing the\u00a0security of telehealth systems.\u00a0\u00a0By using blockchain, organizations may be able to efficiently share healthcare data while ensuring patient privacy and data security at the same time.\n<ul>\n<li>Copy Edit and Design phase, preparing for publication as soon as possible<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Protecting the Privacy of Healthcare Data in the Cloud<\/strong>\n<ul>\n<li aria-level=\"2\">\u00a0Privacy is concerned with decisions about who should legitimately have the capability to access and alter information. In healthcare, the value associated with technology is connected to the collection of personal information. Ideally, technology should optimize the benefits individuals derive from technology while protecting the individual&#8217;s privacy.<strong><br \/>\n<\/strong><\/p>\n<ul>\n<li aria-level=\"2\">Ready for public peer review, will post link when available<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong><b>Information Technology Governance, Risk and Compliance in Healthcare<\/b><\/strong>\n<ul>\n<li aria-level=\"2\">GRC is the policies and procedures that manage the organization&#8217;s process for aligning the management and control of information with business objectives, the organization&#8217;s risk tolerance, and how they comply with regulations and manage risk. This paper shows how to create a program for each and then integrate them into one cohesive and effective program.\n<ul>\n<li aria-level=\"2\">Draft in internal review open for comments, soon ready for public peer review<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><b>Ransomware in the Healthcare Industry<\/b>\n<ul>\n<li aria-level=\"2\">Ransomware is the fastest-growing malware threat today and is already an epidemic. The number of ransomware incidents affecting healthcare has grown substantially in the past few years. And has quickly become extremely lucrative for criminal enterprises. Ransomware directly affects the ability of the Healthcare Delivery Organization (HDO) to access their data.\n<ul>\n<li aria-level=\"2\">Draft in internal review open for comments<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Healthcare initiative topics for consideration<\/strong>\n<ul>\n<li aria-level=\"1\">AI in healthcare systems<\/li>\n<li aria-level=\"1\">Healthcare Interoperability between providers<\/li>\n<li aria-level=\"1\">Covid tracking and tracing, post mass vaccinations<\/li>\n<li aria-level=\"1\">Building a Successful Vendor Risk Assessment (VRA) Program<strong><br \/>\n<\/strong><\/li>\n<li aria-level=\"1\">Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<li aria-level=\"1\">Cloud based Electronic Health Records<\/li>\n<li aria-level=\"1\">Regulations Frameworks (HIPAA, GDPR, GAPP)<\/li>\n<li aria-level=\"1\">Standards activities (ISO, NIST, EU, California law)<\/li>\n<li aria-level=\"1\">Medical device and Health IT Joint Security Plan<\/li>\n<li aria-level=\"1\">Technologies to protect healthcare data<\/li>\n<li aria-level=\"1\">Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<li><strong><strong>Open Discussion, Q&amp;A<\/strong><\/strong><\/li>\n<li><strong>Next Meeting<\/strong>\n<ul>\n<li aria-level=\"1\">\u00a0Wednesday, May 12<sup>th<\/sup>, 11:30 AM PT<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>2-1-2.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e744\u670815\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events<\/strong>\n<ul>\n<li>Chapter Events\n<ul>\n<li><strong>April 20th &#8211; 27th, 2021<\/strong><\/li>\n<\/ul>\n<\/li>\n<li>RSA Conference 2021\n<ul>\n<li aria-level=\"3\">May 17th &#8211; 20th, 2021<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"3\"><strong>CCAK Exam now available<br \/>\n<\/strong><\/li>\n<li aria-level=\"3\"><strong>CSA Blog<br \/>\n<\/strong><\/li>\n<li aria-level=\"3\"><strong>Research Lifecycle &#8211; 20 Steps to Publication<\/strong><\/li>\n<li aria-level=\"2\"><strong>Open Discussion, Q&amp;A<\/strong><\/li>\n<li aria-level=\"2\"><strong>Healthcare Publications in Progress<\/strong>\n<ul>\n<li aria-level=\"2\"><strong>Protecting the Privacy of Healthcare Data in the Cloud<\/strong>\n<ul>\n<li aria-level=\"2\">Draft in internal review open for feedback, ready for public peer review.<strong><br \/>\n<\/strong><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Governance, Risk, and Compliance (GRC)<\/strong>\n<ul>\n<li aria-level=\"2\">Draft in internal review open for feedback, soon ready for public peer review.<strong><br \/>\n<\/strong><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"1\"><strong>Ransomware in the Healthcare Industry<\/strong>\n<ul>\n<li aria-level=\"1\">Jim will soon be posting an early draft of a paper on ransomware general knowledge and prevention recommendations in which others can contribute content and provide feedback to.<\/li>\n<li><b>Ransomware Notes<\/b><b>\u00a0<\/b>\n<ul>\n<li>Ransomware is a type of malware that infects systems and files, rendering them inaccessible until a ransom is paid. When this occurs in the healthcare industry, critical processes are slowed or become completely inoperable, slowing the medical process and ultimately soaking up funds that may otherwise have been allocated.<\/li>\n<li>One of the most common delivery systems is phishing spam, attachments that come to the victim in an email, masquerading as a file they should trust. Once they&#8217;re downloaded and opened, they can take over the victim&#8217;s computer, especially if they have built-in social engineering tools that trick users into allowing administrative access. There are several things the malware might do once it&#8217;s taken over the victim&#8217;s computer, but by far the most common action is to encrypt some or all of the user&#8217;s files.<\/li>\n<li>Overall, Emsisoft data shows at least 2,354 US government, healthcare, and schools were impacted by ransomware attacks in 2020<\/li>\n<li>The second half of the year saw some of the greatest impact from ransomware, with a host of healthcare ransomware victims were driven into EHR downtime. These attacks also caused other life-threatening disruptions, including the diversion of ambulances, inaccessible lab tests, radiation treatments for cancer patients were delayed, medical records were rendered temporarily inaccessible and, in some cases, permanently lost, while hundreds of staff were furloughed as a result of the disruptions.<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/healthitsecurity.com\/news\/560-healthcare-providers-fell-victim-to-ransomware-attacks-in-2020\" target=\"_blank\" rel=\"noopener\">https:\/\/healthitsecurity.com\/news\/560-healthcare-providers-fell-victim-to-ransomware-attacks-in-2020<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-attacks-now-to-blame-for-half-of-healthcare-data-breaches\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.zdnet.com\/article\/ransomware-attacks-now-to-blame-for-half-of-healthcare-data-breaches\/<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare initiative topics for Consideration<\/strong>\n<ul>\n<li aria-level=\"1\"><strong>AI in healthcare systems<\/strong><\/li>\n<li aria-level=\"1\"><strong>Healthcare Interoperability between providers<\/strong><\/li>\n<li aria-level=\"1\"><strong>Covid tracking and tracing, post mass vaccinations<\/strong><\/li>\n<li aria-level=\"1\"><strong>Building a Successful Vendor Risk Assessment (VRA) Program<\/strong><\/li>\n<li aria-level=\"1\">Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<li aria-level=\"1\">Cloud based Electronic Health Records<\/li>\n<li aria-level=\"1\">Regulations Frameworks (HIPAA, GDPR, GAPP)<\/li>\n<li aria-level=\"1\">Standards activities (ISO, NIST, EU, California law)<\/li>\n<li aria-level=\"1\">Medical device and Health IT Joint Security Plan<\/li>\n<li aria-level=\"1\">Technologies to protect healthcare data<\/li>\n<li aria-level=\"1\">Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"1\"><strong>\u00a0Upcoming Zoom meeting:<\/strong>\u00a0April 28<sup>th<\/sup>, 11:30 AM PT<\/li>\n<\/ul>\n<p>2-1-3.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e744\u67081\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li>CSA Events\n<ul>\n<li>CCAK Exam now available<\/li>\n<li>CCM v4 additional mapping, updates<\/li>\n<li>Call for Participation<\/li>\n<li>Zero Trust Security and the use of the Cloud<\/li>\n<li>SecureWorld Mid-Atlantic virtual conference<\/li>\n<li>EMEA Summit 2021<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\">Certificate of Cloud Auditing Knowledge (CCAK) Exam<\/li>\n<li aria-level=\"2\">HIM Circle Community<\/li>\n<li><strong>Healthcare Publications<\/strong>\n<ul>\n<li aria-level=\"2\"><strong>Telehealth Risk Management<\/strong>\n<ul>\n<li aria-level=\"2\">Out of public peer review 3\/22, in design phase, waiting for release date.<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>The Use of Blockchain in Healthcare<\/strong>\n<ul>\n<li aria-level=\"2\">\u00a0Out of public peer review 3\/31, in design phase, waiting for release date.<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Protecting the Privacy of Healthcare Data in the Cloud<\/strong>\n<ul>\n<li aria-level=\"2\"><strong>Draft in internal review open for feedback, soon ready for public peer review.<br \/>\n<\/strong><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\"><strong>Governance, Risk, and Compliance (GRC)<\/strong>\n<ul>\n<li aria-level=\"2\"><strong>Draft in internal review open for feedback, soon ready for public peer review.<br \/>\n<\/strong><\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"1\"><strong>Ransomware in the Healthcare Industry<\/strong>\n<ul>\n<li aria-level=\"1\">Jim will soon be posting an early draft of a paper on ransomware general knowledge and prevention recommendations in which others can contribute content and provide feedback to.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Ransomware Notes\u00a0<\/strong>\n<ul>\n<li>Ransomware is a type of malware that infects systems and files, rendering them inaccessible until a ransom is paid. When this occurs in the healthcare industry, critical processes are slowed or become completely inoperable, slowing the medical process and ultimately soaking up funds that may otherwise have been allocated.<\/li>\n<li>There are several things the malware might do once it&#8217;s taken over the victim&#8217;s computer, but by far the most common action is to encrypt some or all of the user&#8217;s files.<\/li>\n<li>One of the most common delivery systems is phishing spam, attachments that come to the victim in an email, masquerading as a file they should trust. Once they&#8217;re downloaded and opened, they can take over the victim&#8217;s computer, especially if they have built-in social engineering tools that trick users into allowing administrative access.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Ransomware Stats<\/strong>\n<ul>\n<li>Overall, Emsisoft data shows at least 2,354 US government, healthcare, and schools were impacted by ransomware attacks in 2020.<\/li>\n<li>The second half of the year saw some of the greatest impact from ransomware, with a host of healthcare ransomware victims were driven into EHR downtime.<\/li>\n<li>These attacks also caused other life-threatening disruptions, including the diversion of ambulances, inaccessible lab tests, and the like.<\/li>\n<li>&#8220;The impact of the attacks was alarming: ambulances were rerouted, radiation treatments for cancer patients were delayed, medical records were rendered temporarily inaccessible and, in some cases, permanently lost, while hundreds of staff were furloughed as a result of the disruptions,&#8221; researchers wrote.&#8221;<\/li>\n<li><a href=\"https:\/\/healthitsecurity.com\/news\/560-healthcare-providers-fell-victim-to-ransomware-attacks-in-2020\" target=\"_blank\" rel=\"noopener\">https:\/\/healthitsecurity.com\/news\/560-healthcare-providers-fell-victim-to-ransomware-attacks-in-2020<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/ransomware-attacks-now-to-blame-for-half-of-healthcare-data-breaches\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.zdnet.com\/article\/ransomware-attacks-now-to-blame-for-half-of-healthcare-data-breaches\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"1\"><strong>Open Discussion, Q&amp;A<br \/>\n<\/strong><\/li>\n<li aria-level=\"1\"><strong>Future Healthcare Topics<\/strong>\n<ul>\n<li><strong>AI and IoT in remote healthcare<\/strong>\n<ul>\n<li>Examine how modern and future AI and IoT systems are being integrated and utilized by healthcare cloud providers to offer enhanced support and opportunity to their patients.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Building a Successful Vendor Risk Assessment (VRA) Program<\/strong>\n<ul>\n<li>Ashish Vashishtha shared a presentation from HITRUST on Vendor Risk Assessments in healthcare and proposed it as a topic to pursue for the working group.<\/li>\n<li><a href=\"https:\/\/hitrustalliance.org\/documents\/hitrust2017\/presentations\/May-9-2pm-Building-a-Successful-Vendor-Risk-Assessment_FINAL.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/hitrustalliance.org\/documents\/hitrust2017\/presentations\/May-9-2pm-Building-a-Successful-Vendor-Risk-Assessment_FINAL.pdf<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Covid vaccine tracking\/tracing<\/strong>\n<ul>\n<li>Discussed issues with deploying the vaccine, how it&#8217;s currently being distributed, and the recent &#8220;loss&#8221; of millions of vaccines. Started to come up with ways to research\/report on the situation.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Regulations Frameworks (HIPAA, GDPR, GAPP)<\/strong>\n<ul>\n<li>At a previous meeting, Ashish commented that he has experience with regulatory frameworks and could speak on the topic in the future.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Other Ideas<\/strong>\n<ul>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<li>Cloud based Electronic Health Records<\/li>\n<li>Standards activities (ISO, NIST, EU, California laws)<\/li>\n<li>Medical device and Health IT Joint Security Plan<\/li>\n<li>Technologies to protect healthcare data<\/li>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00a0Upcoming Zoom meeting:<\/strong>\u00a0April 14<sup>th<\/sup>, 11:30 AM PT\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Discuss and address feedback for the privacy and GRC healthcare papers<\/li>\n<li>Continuing Ransomware discussion and planning for development of that paper<\/li>\n<li>Review next Healthcare topic ideas and review status<\/li>\n<\/ul>\n<\/li>\n<li>Review HIM Artifacts<\/li>\n<li>HIM on CSA websites<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2021\u5e743\u6708]<\/p>\n<p>1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e743\u670817\u65e5\uff08\u6728\uff094:30am\uff5e5:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><b>Intro<\/b>\n<ul>\n<li>CSA Events\n<ul>\n<li>Call for Participation<\/li>\n<li>Exploring Cloud identities, API&#8217;s and automation<\/li>\n<li>Zero Trust Security and the use of the Cloud<\/li>\n<li>APAC Virtual Summit 2021<\/li>\n<li>EMEA Summit 2021<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\">Certificate of Cloud Auditing Knowledge (CCAK) Exam<\/li>\n<li aria-level=\"2\">HIM Circle community<\/li>\n<\/ul>\n<\/li>\n<li><strong>Peer Review<\/strong>\n<ul>\n<li><b><strong>Telehealth Risk Management\u00a0<\/strong><\/b>\n<ul>\n<li>Until March 22<sup>nd<\/sup>, 2021<\/li>\n<\/ul>\n<\/li>\n<li><strong>Blockchain in healthcare &#8211; HIM_BC Collab<\/strong>\n<ul>\n<li>Completed peer review process in blockchain group, now going to be released from the Health Information Management group<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><b>Healthcare Publications in Progress<br \/>\n<\/b><\/p>\n<ul>\n<li><strong>Protecting the Privacy of Healthcare Data in the Cloud<\/strong>\n<ul>\n<li>Draft, internal review looking for feedback. Most likely ready for peer review in April<\/li>\n<\/ul>\n<\/li>\n<li><strong>Governance, Risk, and Compliance (GRC)<\/strong>\n<ul>\n<li>Draft, internal review looking for feedback<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><b>Open Discussion, Q&amp;A<br \/>\n<\/b><\/li>\n<li><strong>Future Healthcare Topics<br \/>\n<\/strong><\/p>\n<ul>\n<li><b>Ransomware<\/b>\n<ul>\n<li>It was agreed from the group that Ransomware would be a good next topic to research and create a publication from because of the increased number of attacks that healthcare providers have had to deal with, and the immense loss that can be suffered, with 46% of healthcare data breaches being ransomware attacks. Ransomware attackers are using double extortion techniques as a method to force victims to give in and pay instead of restoring the network themselves, rather than risk private medical information being released or destroyed.<\/li>\n<\/ul>\n<\/li>\n<li><strong>AI, IoT in Healthcare<\/strong>\n<ul>\n<li>Examine how modern and future AI and IoT systems are being integrated and utilized by healthcare cloud providers to offer enhanced support and opportunity to their patients.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Covid vaccine tracking\/tracing<\/strong>\n<ul>\n<li>Discussed issues with deploying the vaccine, how it&#8217;s currently being distributed, and the recent &#8220;loss&#8221; of millions of vaccines. Started to come up with ways to research\/report on the situation.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Regulations Frameworks (HIPAA, GDPR, GAPP)<\/strong>\n<ul>\n<li>Ashish Vashishtha commented that he has experience with regulatory frameworks and could speak on the topic in the future.<\/li>\n<\/ul>\n<\/li>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Cloud based Electronic Health Records<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Standards activities (ISO, NIST, EU, California laws)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Medical device and Health IT Joint Security Plan<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Technologies to protect healthcare data<\/li>\n<\/ul>\n<ul>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00a0Next Zoom meeting:<\/strong>\u00a0March 31<sup>st<\/sup>, 11:30 AM PT<\/li>\n<\/ul>\n<p>2-1-2.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e743\u67084\u65e5\uff08\u6728\uff094:30am\uff5e5:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><b>Intro<\/b>\n<ul>\n<li>CSA Events\n<ul>\n<li>Journey to the Cloud with Confidence<\/li>\n<li>CCSK Training and Certification Guidelines<\/li>\n<li>CSA APAC Virtual Summit 2021<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\">Certificate of Cloud Auditing Knowledge (CCAK) Exam<\/li>\n<li aria-level=\"2\">HIM Circle community<\/li>\n<\/ul>\n<\/li>\n<li><b><b>Healthcare Publications in Progress<\/b><\/b>\n<ul>\n<li><b><strong>Telehealth Risk Management\u00a0<\/strong><\/b>\n<ul>\n<li><em>Currently in Peer Review until\u00a0<strong>March 22<sup>nd<\/sup><\/strong>\u00a0available for public distribution and review<br \/>\n<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Governance, Risk, and Compliance (GRC)<\/strong>\n<ul>\n<li><em>Draft, internal review looking for feedback<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Protecting the Privacy of Healthcare Data in the Cloud<\/strong>\n<ul>\n<li><em>Draft, internal review\u00a0looking for feedback<br \/>\n<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Blockchain in healthcare &#8211; HIM_BC Collab<\/strong>\n<ul>\n<li><em>Lead authored by Jim Angle, in review with Blockchain working group<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><b>Open Discussion, Q&amp;A<br \/>\n<\/b><\/li>\n<li><strong>Future Healthcare Topics<\/strong><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><b>IoT, AI, Ransomware healthcare risks<\/b><b><\/b>\n<ul>\n<li>Vince and Michael Roza discussed risks that AI and ransomware have on healthcare systems.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Covid vaccine tracking\/tracing<\/strong>\n<ul>\n<li>Discussed issues with deploying the vaccine, how it&#8217;s currently being distributed, and the recent &#8220;loss&#8221; of millions of vaccines. Started to come up with ways to research\/report on the situation.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Regulations Frameworks (HIPAA, GDPR, GAPP)<\/strong>\n<ul>\n<li>Ashish Vashishtha commented that he has experience with regulatory frameworks and could speak on the topic in the future.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Cloud based Electronic Health Records<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Standards activities (ISO, NIST, EU, California laws)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Medical device and Health IT Joint Security Plan<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Technologies to protect healthcare data<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00a0Next Zoom meeting:<\/strong>\u00a0March 17<sup>th<\/sup>, 11:30 AM PT<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Review comments from healthcare papers, and plan next steps.<\/li>\n<li>Review HIM Artifacts<\/li>\n<li>HIM on CSA website<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2021\u5e742\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e742\u670818\u65e5\uff08\u6728\uff094:30am\uff5e5:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><b>Intro<\/b>\n<ul>\n<li>CSA Events\n<ul>\n<li>Journey to the Cloud with Confidence<\/li>\n<li>CSA APAC Virtual Summit 2021<\/li>\n<\/ul>\n<\/li>\n<li aria-level=\"2\">Certificate of Cloud Auditing Knowledge (CCAK) Exam<\/li>\n<li aria-level=\"2\">HIM Circle community<\/li>\n<\/ul>\n<\/li>\n<li><b>Current Healthcare projects<\/b>\n<ul>\n<li><b><strong>Telehealth Risk Assessment\u00a0<\/strong><\/b>\n<ul>\n<li>Draft, ready for public peer review<\/li>\n<li>Reviewed latest changes, all comments and specific feedback have been addressed, and the paper is ready for public peer review, and\u00a0among healthcare and cyber security professionals inside and out of CSA. The peer review link will be included as soon as it&#8217;s available.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Governance, Risk, and Compliance (GRC)<\/strong>\n<ul>\n<li><em><strong>-Draft, ready for internal review<\/strong><\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Protecting the Privacy of Healthcare Data in the Cloud<\/strong>\n<ul>\n<li>\u00a0<b>&#8211;<\/b><em><b>Draft,\u00a0<\/b>ready for internal\u00a0<b>review<br \/>\n<\/b><br \/>\n<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Blockchain in healthcare &#8211; HIM_BC Collab\u00a0<\/strong>\n<ul>\n<li>\u00a0A new paper authored by Jim Angle, in collaboration with the Blockchain working group, now in peer review<\/li>\n<li><em><strong>-Peer review in Blockchain group.<\/strong><\/em><br \/>\n<b><\/b><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><b>Open Discussion, Q&amp;A<br \/>\n<\/b><\/li>\n<li><strong>Future Healthcare Topics &#8211; 2020, 2021<\/strong><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Covid vaccine tracking\/tracing &#8211;\u00a0<\/strong>Discussed issues with deploying the vaccine, how it&#8217;s currently being distributed, and the recent &#8220;loss&#8221; of millions of vaccines. Started to come up with ways to research\/report on the situation.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Cloud based Electronic Health Records<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Regulations Frameworks (HIPAA, GDPR, GAPP)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Standards activities (ISO, NIST, EU, California laws)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Medical device and Health IT Joint Security Plan<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Technologies to protect healthcare data<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<li><strong>\u00a0Next Zoom meeting:<\/strong>\u00a0March 3<sup>rd<\/sup>, 11:30 AM PT<\/li>\n<\/ul>\n<p>2-1-2.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e742\u67084\u65e5\uff08\u6728\uff094:30am\uff5e5:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<p><b>CSA Events<\/b><\/p>\n<ul>\n<li><b>CSA Cloudbytes Connect (February 2<\/b><b><sup>nd<\/sup>\u00a0&#8211;\u00a0<\/b><b>4<\/b><b><sup>th<\/sup>)<\/b><b><br \/>\n<\/b><\/p>\n<ul>\n<li>Reviewed the &#8220;Birds of a Feather&#8221; Healthcare session and the discussion topics that came from it.<\/li>\n<li>Reviewed the agenda for the last day of Cloudbytes Connect for Friday, February 4th.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>Current Healthcare Project<\/b><\/p>\n<ul>\n<li><strong>Telehealth Risk Assessment\u00a0<\/strong><\/li>\n<li>Reviewed latest changes and suggested feedback, plan next steps.<\/li>\n<li>Jim will be following up with others on remaining specific questions he had regarding suggested changed.<\/li>\n<li>After finalizing the remaining feedback, the Telehealth Risk Assessment will be submitted for public peer review and ready for wider distribution among healthcare and cyber security professionals inside and out of CSA.<\/li>\n<\/ul>\n<p><b>Open Discussion, Q&amp;A<\/b><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Future Healthcare Topics &#8211; 2020, 2021<\/strong><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Blockchain in healthcare &#8211; HIM_BC Collab\u00a0<\/strong>&#8211;\u00a0 A new paper authored by Jim Angle, in collaboration with the Blockchain working group, now in peer review.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Covid vaccine tracking\/tracing &#8211;\u00a0<\/strong>Discussed issues with deploying the vaccine, how it&#8217;s currently being distributed, and the recent &#8220;loss&#8221; of millions of vaccines. Started to come up with ways to research\/report on the situation.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Cloud based Electronic Health Records<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Governance, Risk, and Compliance (GRC) &#8211; Circle Unpublished paper<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Regulations Frameworks (HIPAA, GDPR, GAPP)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Standards activities (ISO, NIST, EU, California laws)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Medical device and Health IT Joint Security Plan<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Technologies to protect healthcare data<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>\u00a0Next Zoom meeting:<\/strong>\u00a0February\u00a017<sup>th<\/sup>, 11:30 AM PT<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2021\u5e741\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting Call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e741\u670821\u65e5\uff08\u6728\uff094:30am\uff5e5:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><b>CSA Events<\/b><b><\/b>\n<ul>\n<li>\u00a0New HIM webpage layout with research and blogs.<\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/<\/a><b><\/b>\n<ul>\n<li>New website changes, Circle character guide, CCAK, upcoming Cloudbytes webinars, Chapter webinars.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><b>Current Healthcare projects<\/b>\n<ul>\n<li>Telehealth Risk Assessment<\/li>\n<li>Reviewed latest changes and suggested feedback, plan next steps.<\/li>\n<li>Jim will be following up with others on a few specific questions he had regarding suggested changed.<\/li>\n<li>After finalizing the remaining feedback, the Telehealth Risk Assessment will be submitted for public peer review and ready for wider distribution among healthcare and cyber security professionals inside and out of CSA.<\/li>\n<\/ul>\n<\/li>\n<li><b>Open Discussion, Q&amp;A<\/b>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Future Healthcare Topics &#8211; 2020, 2021<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Blockchain in healthcare &#8211; HIM_BC Collab\u00a0<\/strong>&#8211;\u00a0 A new paper authored by Jim Angle, in collaboration with the Blockchain working group, now in peer review.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Covid vaccine tracking\/tracing\u00a0<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Cloud based Electronic Health Records<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Governance, Risk, and Compliance (GRC) &#8211; Circle Unpublished paper<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Regulations Frameworks (HIPAA, GDPR, GAPP)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Standards activities (ISO, NIST, EU, California laws<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Medical device and Health IT Joint Security Plan<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Technologies to protect healthcare data<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>\u00a0Next Zoom meeting:<\/strong>\u00a0February\u00a03<sup>rd<\/sup>, 11:30 AM PT<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>2-1-2.\u00a0<strong><u>Health Information Management Meeting (Call)<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2021\u5e741\u67089\u65e5\uff08\u6728\uff094:30am\uff5e5:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><b>CSA Events<\/b><b><\/b>\n<ul>\n<li>\u00a0New HIM webpage layout with research and blogs.<\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/<\/a><b><\/b>\n<ul>\n<li>New website changes, Circle character guide, CCAK, upcoming Cloudbytes webinars, Chapter webinars.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><b>Current Healthcare projects<\/b>\n<ul>\n<li>Telehealth Risk Assessment<\/li>\n<li>Review current material, plan next steps<\/li>\n<\/ul>\n<\/li>\n<li><b>Open Discussion, Q&amp;A<\/b><\/li>\n<li><b><b>Current Project<\/b><\/b><\/li>\n<li><b>Telehealth Risk Assessment<\/b><\/li>\n<\/ul>\n<div>5 risk assessment questions in progress. Work on this paper can be tracked in the discussion post.<\/div>\n<p>1. How to do a risk assessment, starting with HDO and including cloud.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>Specific things to look assess, may include some kind of checklist guidance.<\/li>\n<li>Documents to review, what to look for in different third party assessment reports.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>2. HIPAA and GDPR compliance, what the basic requirements are and steps to take to comply.<\/p>\n<ol>\n<li>List of must do things for both privacy and security<\/li>\n<\/ol>\n<p>3. Basic steps to ensure secure use: IAM, data transmission, and data storage.<\/p>\n<div>4. Cross-Border\/ Offshoring of Healthcare Information<\/div>\n<ol>\n<li>\n<div>Implications, restrictions<\/div>\n<\/li>\n<li>Regulatory differences<\/li>\n<\/ol>\n<p>5. EU&#8217;s Directive on Security of Network and Information Systems (NIS Directive) compliance.<br \/>\n1. Concerns for OES (Operators of Essential Services)<br \/>\n<strong>Future Healthcare Topics\u00a0&#8211; 2020, 2021<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Blockchain in healthcare &#8211; HIM_BC Collab\u00a0<\/strong>&#8211;\u00a0 A new paper authored by Jim Angle, in collaboration with the Blockchain working group, now in peer review.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Covid vaccine tracking\/tracing\u00a0<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Cloud based Electronic Health Records<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Governance, Risk, and Compliance (GRC) &#8211; Circle Unpublished paper<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Regulations Frameworks (HIPAA, GDPR, GAPP)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Standards activities (ISO, NIST, EU, California laws<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Medical device and Health IT Joint Security Plan<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Technologies to protect healthcare data<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>\u00a0Next Zoom meeting:<\/strong>\u00a0January\u00a020th, 11:30 AM PT\n<ul>\n<li><strong>Next meeting we will have a final internal review of the Telehealth Risk Assessment before it goes in Peer Review.<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2020\u5e7412\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting Call\u00a0<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2020\u5e7412\u67089\u65e5\uff08\u6728\uff094:30pm\uff5e5:30pm (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<p><b>CSA Events<\/b><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>New HIM webpage layout with research and blogs.<\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/<\/a><b><\/b>\n<ul>\n<li>New website changes, Circle character guide, CCAK, Cloudbytes webinars, Chapter webinars.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>Current Healthcare projects<\/b><\/p>\n<ul>\n<li>Telehealth Risk Assessment<\/li>\n<li>Review current material, plan next steps<\/li>\n<\/ul>\n<p><b>Open Discussion, Q&amp;A<\/b><\/p>\n<p><b>Current Project<br \/>\nTelehealth Risk Assessment<\/b><\/p>\n<div>5 risk assessment questions in progress. Work on this paper can be tracked in the discussion post.<\/div>\n<div>1. How to do a risk assessment, starting with HDO and including cloud.<\/div>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>Specific things to look assess, may include some kind of checklist guidance.<\/li>\n<li>Documents to review, what to look for in different third party assessment reports.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>2. HIPAA and GDPR compliance, what the basic requirements are and steps to take to comply.<\/p>\n<ol>\n<li>List of must do things for both privacy and security<\/li>\n<\/ol>\n<p>3. Basic steps to ensure secure use: IAM, data transmission, and data storage.<\/p>\n<div>4. Cross-Border\/ Offshoring of Healthcare Information<\/div>\n<ol>\n<li>\n<div>Implications, restrictions<\/div>\n<\/li>\n<li>Regulatory differences<\/li>\n<\/ol>\n<p>5. EU&#8217;s Directive on Security of Network and Information Systems (NIS Directive) compliance.<br \/>\n1. Concerns for OES (Operators of Essential Services)<\/p>\n<p><strong>Future Healthcare Topics\u00a0&#8211; 2020, 2021<\/strong><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Blockchain in healthcare &#8211; HIM_BC Collab\u00a0<\/strong>&#8211;\u00a0 A new paper authored by Jim Angle, in collaboration with the Blockchain working group, now in peer review.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Covid vaccine tracking\/tracing\u00a0<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Cloud based Electronic Health Records<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Governance, Risk, and Compliance (GRC) &#8211; Circle Unpublished paper<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Regulations Frameworks (HIPAA, GDPR, GAPP)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Standards activities (ISO, NIST, EU, California laws<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Medical device and Health IT Joint Security Plan<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Technologies to protect healthcare data<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>\u00a0Next Zoom meeting:<\/strong>\u00a0January\u00a06th, 11:30 AM PT\n<ul>\n<li>We will be skipping the next bi-weekly call for the holidays and will regroup after the new year, continuing work on the Telehealth Risk Assessment paper and other upcoming healthcare topics.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2020\u5e7411\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u7279\u306b\u306a\u3057<\/strong><\/p>\n<p>[2020\u5e7410\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>Health Information Management Meeting (Relaunch call)\u00a0<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2020\u5e7410\u670829\u65e5\uff08\u6728\uff093:30am\uff5e4:30am (JST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li>Working group governance &#8211; John Yeoh\n<ul>\n<li>Why Health Information Management?\n<ul>\n<li>The HIM working group aims to provide direct influence on how health information service providers deliver secure cloud solutions (services, transport, applications and storage) to their clients, and foster cloud awareness within all aspects of healthcare and related industries.<\/li>\n<\/ul>\n<\/li>\n<li>CSA Research Portfolio<\/li>\n<li>Recent healthcare news, Covid-19<\/li>\n<\/ul>\n<\/li>\n<li>Working Group Activities &#8211; Alex Kaluza\n<ul>\n<li>HIM Leadership\n<ul>\n<li>Co-Chairs\n<ul>\n<li>Dr. Jim Angle &#8211; Vulnerability Management at Trinity Health\n<ul>\n<li>2020 Ron Knode Service Award Recipient<\/li>\n<\/ul>\n<\/li>\n<li>Vince Campitelli &#8211; Enterprise Security Specialist at Cloud Security Alliance<\/li>\n<\/ul>\n<\/li>\n<li>CSA Research\n<ul>\n<li>Alex Kaluza &#8211; Research Analyst<\/li>\n<li>John Yeoh &#8211; Research Global Director<strong><br \/>\n<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Latest Publications &#8211; Jim Angle\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/managing-the-risk-for-medical-devices-connected-to-the-cloud\/\" target=\"_blank\" rel=\"noopener\">Managing the Risk for Medical Devices Connected to the Cloud<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/\" target=\"_blank\" rel=\"noopener\">Telehealth Data in the Cloud<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/\" target=\"_blank\" rel=\"noopener\">Healthcare Big Data in the Cloud<\/a><\/li>\n<\/ul>\n<\/li>\n<li><b>Healthcare Info Security Interview &#8211; Jim Angle<\/b>\n<ul>\n<li>This August, Jim Angle had a podcast interview on cloud security and telehealth with Healthcare Info Security to address the privacy concerns, and the increase in telehealth demand from COVID-19. The Telehealth paper was also picked up by Cyber Security news site Dark Reading.\n<ul>\n<li><a href=\"https:\/\/www.healthcareinfosecurity.com\/interviews\/how-to-address-telehealth-cloud-security-risks-i-4744\" target=\"_blank\" rel=\"noopener\">https:\/\/www.healthcareinfosecurity.com\/interviews\/how-to-address-telehealth-cloud-security-risks-i-4744<\/a><\/li>\n<li><a href=\"https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136\" target=\"_blank\" rel=\"noopener\">https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><b>Current Project &#8211; Vince Campitelli<\/b>\n<ul>\n<li>Telehealth Risk Assessment, based on CSA&#8217;s Perspective on Cloud Risk Management recent publication.\n<ul>\n<li>CSA&#8217;s Perspective on Cloud Risk Management<\/li>\n<li>Initial draft on HIPAA and GDPR compliance, what the basic requirements are and steps to take to comply.<\/li>\n<li>More assistance from the HIM working group needed to answer additional risk assessment questions, which can be found in the discussion post,\u00a0here.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><b>Future Topics &#8211; Vince Campitelli<\/b>\n<ul>\n<li>Best Practices: Medical Devices in the Cloud; Implementation Guide<\/li>\n<li>Cloud based Electronic Health Records<\/li>\n<li>Governance, Risk, and Compliance (GRC), Regulations Frameworks (HIPAA, GDPR, GAPP), and Standards activities (ISO, NIST, EU, California law)<\/li>\n<li>Technologies to protect healthcare data<\/li>\n<li>Health industry cybersecurity best practices<\/li>\n<\/ul>\n<\/li>\n<li><b>Call for Action &#8211; Alex Kaluza<\/b>\n<ul>\n<li>Join the next Health Information Management Zoom meeting\n<ul>\n<li>Next meeting November 11th 11:30 AM PT<\/li>\n<\/ul>\n<\/li>\n<li>Understand and discuss the latest trends in cloud and healthcare services\n<ul>\n<li>Circle Health Information Management working group<\/li>\n<\/ul>\n<\/li>\n<li>Participate in CSA open peer reviews and surveys<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2020\u5e749\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>CSA India Virtual Summit 2020<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u65e5\u6642\uff1a2020\u5e749\u670824\u65e5\uff08\u6728\uff091:45pm\uff5e (IST)<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(Zoom)<br \/>\n<a href=\"https:\/\/www.csaapac.org\/indiavsummit2020.html\">https:\/\/www.csaapac.org\/indiavsummit2020.html<\/a><br \/>\n[\u6982\u8981]<br \/>\nPanel Discussion : Impact of COVID-19 on Cloud Adoption &amp; Security<br \/>\nThe lockdown has been an inflexion point in the adoption of cloud computing; we have observed increased usage and adoption. The increased usage as well as new cloud adoption during the current crisis is a positive outcome of the lockdown. The distinguished panel from APAC &amp; India will offer their views and perspectives.<\/p>\n<p><strong>Moderator: <\/strong>Vandana VERMA (Global Board of Directors at OWASP and President at InfosecGirls)<strong><br \/>\nPanelists:<br \/>\n<\/strong>Satyavathi DIVADRI (Chairman, CSA Bangalore Chapter)<br \/>\nDr. Eiji SASAHARA (ED, CSA Japan Chapter)<br \/>\nDr. Hing-Yan LEE (EVP APAC, CSA)<\/p>\n<p>2-1-2.\u00a0<strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u65e5\u6642\uff1a2020\u5e749\u67083\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events Calendar<\/strong>\n<ul>\n<li>SECtember &#8211; September 8<sup>th<\/sup>&#8211; 25<sup>th<\/sup>\u00a011:00 AM &#8211; 12:00 PM, Everyday sessions<\/li>\n<li>CSA Virtual EMEA Congress &#8211; November 3rd &#8211; 5th<\/li>\n<li>Cloudbytes Connect (TBD)<\/li>\n<li>ISC2 &#8211; December 16 -18th<\/li>\n<li>re:Invent &#8211; December 16 -18th<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><b>Telehealth Risk Assessment<\/b>\n<ul>\n<li>\u00a01. How to do a risk assessment, starting with HDO and including cloud.\n<ol>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Specific things to look assess, may include some kind of checklist guidance.<\/li>\n<li>Documents to review, what to look for in different third party assessment reports.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>2. HIPAA and GDPR compliance, what the basic requirements are and steps to take to comply.<br \/>\n-List of must do things for both privacy and security.<br \/>\n3. Basic steps to ensure secure use: IAM, data transmission, and data storage.<br \/>\n4. Cross-Border\/ Offshoring of Healthcare Information<br \/>\n-Implications, restrictions<br \/>\n-Regulatory differences<\/li>\n<li>5. EU&#8217;s Directive on Security of Network and Information Systems (NIS Directive) compliance.<br \/>\n-Concerns for OES (Operators of Essential Services)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ol>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ol>\n<ul>\n<li><b>Recent HIM Publications<br \/>\n<\/b><\/li>\n<li><b>Telehealth Data in the Cloud Released July 23rd\u00a0<\/b>&#8211; June 18th\n<ul>\n<li>The Telehealth paper was picked up by Cyber Security\u00a0news site Dark Reading.\n<ul>\n<li>What are the HIPAA\/HITECH challenges you&#8217;re facing?<\/li>\n<li>What security breaches and incidents are you concerned with?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Big Data in the Cloud<\/strong>\n<ul>\n<li>Release Date: July 23rd<\/li>\n<li><strong>Blog Post:\u00a0<\/strong><a href=\"https:\/\/cloudsecurityalliance.org\/blog\/2020\/07\/23\/healthcare-big-data-in-the-cloud-summary\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/blog\/2020\/07\/23\/healthcare-big-data-in-the-cloud-summary\/<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong><strong>Future Initiative Topics<br \/>\n<\/strong><\/strong><\/p>\n<ul>\n<li>Governance, Risk, and Compliance (GRC)<\/li>\n<li>Privacy of Healthcare Data in the Cloud<\/li>\n<li>Blockchain in Healthcare<\/li>\n<li>Regulations Frameworks ( HIPAA, GDPR,GAPP?)<\/li>\n<li>Standards activities ( ISO,NIST,)<\/li>\n<li>Privacy challenges of Cloud for HC (data location, trans-border concerns, third-party risk)<\/li>\n<li>Technologies to protect HC data<\/li>\n<li>Cloud based Electronic Health Records, Intersection of wearable devices and healthcare, implementation guide, risk chart<\/li>\n<\/ul>\n<ul>\n<li><strong><strong>HIM Relaunch Call &#8211;\u00a0September 30th<br \/>\n<\/strong><\/strong><\/p>\n<ul>\n<li>Targeted push on social media of call from CSA marketing and membership<\/li>\n<li>Cvent registration page with meeting agenda<\/li>\n<li>HIM Charter, research lifecycle, and working group activities<\/li>\n<li>Co-Chair&#8217;s present on recently released healthcare publications and topics<\/li>\n<li>Call to Action &#8211; How to contribute<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2020\u5e748\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u65e5\u6642\uff1a2020\u5e748\u67086\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events Calendar<\/strong>\n<ul>\n<li>Blackhat (7.31-8.6, Las Vegas)\u00a0 *Moved to Virtual,\u00a0\u00a0happening now<\/li>\n<li>SECtember (September 14th-18th, Seattle) *Moved to Virtual\n<ul>\n<li>Jim submitted to present\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/managing-the-risk-for-medical-devices-connected-to-the-cloud\" target=\"_blank\" rel=\"noopener\">Managing the Risk for Medical Devices Connected to the Cloud<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><b>Telehealth Data in the Cloud<\/b>\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/<\/a><\/li>\n<li>The Telehealth paper was picked up by Cyber Security\u00a0news site Dark Reading.\n<ul>\n<li><a href=\"https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136\" target=\"_blank\" rel=\"noopener\">https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136<\/a>\n<ul>\n<li>What are the HIPAA\/HITECH challenges you&#8217;re facing?<\/li>\n<li>What security breaches and incidents are you concerned with?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Big Data in the Cloud<\/strong>\n<ul>\n<li>Release Date: July 23rd<\/li>\n<li><strong>Blog Post:\u00a0<\/strong><a href=\"https:\/\/cloudsecurityalliance.org\/blog\/2020\/07\/23\/healthcare-big-data-in-the-cloud-summary\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/blog\/2020\/07\/23\/healthcare-big-data-in-the-cloud-summary\/<\/a><\/li>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/?_ga=2.107318596.796172200.1594946318-1650702952.1573547217\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/<\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong>Other Future Initiative Topics<\/strong>\n<ul>\n<li><strong>Proposed Topics<\/strong>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Governance, Risk, and Compliance (GRC)<\/li>\n<li>Privacy of Healthcare Data in the Cloud<\/li>\n<li>Blockchain in Healthcare<\/li>\n<\/ul>\n<\/li>\n<li><b><b><strong>Reports Finds IoT Devices Host Social Media Apps, FDA-Recalled Platforms<\/strong><br \/>\n<\/b><\/b><\/p>\n<ul>\n<li><a href=\"https:\/\/healthitsecurity.com\/news\/reports-finds-iot-devices-using-social-media-apps-fda-recalled-platforms\" target=\"_blank\" rel=\"noopener\">https:\/\/healthitsecurity.com\/news\/reports-finds-iot-devices-using-social-media-apps-fda-recalled-platforms<\/a><\/li>\n<li>&#8220;An analysis of over 5 million IoT, IoMT, and unmanaged devices found a host of security risks, including those in the healthcare sector, from Facebook and YouTube applications running on MRI and CT machines, to a trove of medical devices operating on legacy platforms or systems recalled by the Food and Drug Administration.&#8221;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<\/ul>\n<ul>\n<li><strong>Thoughts on Next Project,\u00a0<\/strong><b>Telehealth Risk Assessment:<\/b><\/li>\n<li><strong>Questions to first be addressed by Health Information working group volunteer<\/strong>s\n<ul>\n<li>How to do a risk assessment, starting with HDO and including cloud.\n<ul>\n<li>Specific things to look assess, may include some kind of checklist guidance.<\/li>\n<li>Documents to review, what to look for in different third party assessment reports.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>HIPAA and GDPR compliance, what the basic requirements are and steps to take to comply.\n<ul>\n<li>List of must do things for both privacy and security.<\/li>\n<li>Basic steps to ensure secure use: IAM, data transmission, and data storage<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li><strong>Other Projects<\/strong>\n<ul>\n<li>Cloud based Electronic Health Records,\u00a0Intersection of wearable devices and healthcare, and other proposed healthcare topics are currently on hold, and will be brought up in future meetings.<\/li>\n<li>Guest Speaker from Blockchain, other WG&#8217;s with complementary topics.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>HIM Relaunch Call<\/strong>\n<ul>\n<li>Review and present revised HIM Charter.<\/li>\n<li>Co-Chair&#8217;s present on recent released HIM publications.<\/li>\n<li>Targeted push of call from CSA marketing and membership, potential survey to gather more interest.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2020\u5e747\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li>\u00a0\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u65e5\u6642\uff1a2020\u5e747\u670823\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events Calendar<\/strong>\n<ul>\n<li>Blackhat (7.31-8.6, Las Vegas) *Moved to Virtual<\/li>\n<li>SECtember (September 14th-18th, Seattle)\n<ul>\n<li>Jim submitted to present\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/managing-the-risk-for-medical-devices-connected-to-the-cloud\" target=\"_blank\" rel=\"noopener\">Managing the Risk for Medical Devices Connected to the Cloud<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<li><b>Telehealth Data in the Cloud<\/b>\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/<\/a><\/li>\n<li>The Telehealth paper was picked up by Cyber Security\u00a0news site Dark Reading.\n<ul>\n<li><a href=\"https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136\" target=\"_blank\" rel=\"noopener\">https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136<\/a>\n<ul>\n<li>What are the HIPAA\/HITECH challenges you&#8217;re facing?<\/li>\n<li>What security breaches and incidents are you concerned with?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Big Data in the Cloud<\/strong>\n<ul>\n<li>Release Date: July 23rd<\/li>\n<li><strong><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/?_ga=2.107318596.796172200.1594946318-1650702952.1573547217\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/<\/a><\/strong>\n<ul>\n<li><b>Introduction:<\/b>\u00a0A digital transformation is emerging within the healthcare industry. The use of cloud computing, big data analytics, coupled with the move to consumer centric healthcare are changing the way healthcare is delivered. This digital transformation has changed healthcare in ways that were not possible just a few years ago. Healthcare Delivery Organizations (HDO) have access to large quantities of data that if collated, analyzed, and properly utilized can provide tremendous benefit to both the HDO and the patient.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Other Future Initiative Topics<\/strong>\n<ul>\n<li><strong>Proposed Topics by Jim Angle\u00a0<\/strong>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Governance, Risk, and Compliance (GRC)<\/li>\n<li>Privacy of Healthcare Data in the Cloud<\/li>\n<li>Blockchain in Healthcare<\/li>\n<\/ul>\n<\/li>\n<li><b>Diego Diviani, standards, regulation ideas<\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Privacy challenges of Cloud for HC (data location, trans-border concerns, third-party risk)<\/li>\n<li>Standards activities ( ISO,NIST,)<\/li>\n<li>Regulations Frameworks ( HIPAA, GDPR,GAPP?)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Technologies to protect HC data<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Jim and Patty will be compiling questions for a risk assessment paper related to the Telehealth data in the Cloud for a potential future release.<\/li>\n<li>Cloud based Electronic Health Records,\u00a0Intersection of wearable devices and healthcare, and other proposed healthcare topics are currently on hold, and will be brought up in future meetings.<\/li>\n<li>Guest Speaker from Blockchain, other WG&#8217;s with complementary topics.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>HIM Relaunch Call<\/strong>\n<ul>\n<li>Review and present revised HIM Charter.<\/li>\n<li>Co-Chair&#8217;s present on recent released HIM publications.<\/li>\n<li>Potential deep-dive into new or existing Healthcare related topic.<\/li>\n<li>Targeted push of call from CSA marketing and membership, potential survey to gather more interest.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>2-1-2.\u00a0<strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u65e5\u6642\uff1a2020\u5e747\u67089\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events Calendar<\/strong>\n<ul>\n<li><strong>Federal Summit<\/strong>\u00a0&#8211; CSA Research Director John Yeoh gave his first hand experience being at the one of the first in-person Cybersecurity conference in months. Low attendance, controlled environment, but quality presentations and content.<\/li>\n<li>Healthcare in Big Data, Release Date: July 15th<\/li>\n<li>CSA CloudBytes Connect\u00a0<strong>(July event)<\/strong><\/li>\n<li>Blackhat (7.31-8.6, Las Vegas) *Moved to Virtual<\/li>\n<li>SECtember (September 14th-18th, Seattle)\n<ul>\n<li>Jim submitted to present\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/managing-the-risk-for-medical-devices-connected-to-the-cloud\" target=\"_blank\" rel=\"noopener\">Managing the Risk for Medical Devices Connected to the Cloud<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\"><\/li>\n<li><b>Telehealth Data in the Cloud<\/b>\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/<\/a><\/li>\n<li>The Telehealth paper was picked up by Cyber Security\u00a0news site Dark Reading.\n<ul>\n<li><a href=\"https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136\" target=\"_blank\" rel=\"noopener\">https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136<\/a>\n<ul>\n<li>What are the HIPAA\/HITECH challenges you&#8217;re facing?<\/li>\n<li>What security breaches and incidents are you concerned with?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Big Data in the Cloud<\/strong>\n<ul>\n<li>Design Phase, Release Date: July 15th<\/li>\n<li><strong><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/?_ga=2.107318596.796172200.1594946318-1650702952.1573547217\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/artifacts\/healthcare-big-data-in-the-cloud\/<\/a><\/strong>\n<ul>\n<li><b>Introduction:<\/b>\u00a0A digital transformation is emerging within the healthcare industry. The use of cloud computing, big data analytics, coupled with the move to consumer centric healthcare are changing the way healthcare is delivered. This digital transformation has changed healthcare in ways that were not possible just a few years ago. Healthcare Delivery Organizations (HDO) have access to large quantities of data that if collated, analyzed, and properly utilized can provide tremendous benefit to both the HDO and the patient.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Other Future Initiative Topics<\/strong>\n<ul>\n<li>The Co-Chairs discussed privacy related healthcare topics for potential paper ideas.<\/li>\n<li>Cloud based Electronic Health Records,\u00a0Intersection of wearable devices and healthcare, and other proposed healthcare topics are currently on hold, and will be brought up in future meetings.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>HIM Relaunch Call<\/strong>\n<ul>\n<li>Review and present revised HIM Charter.<\/li>\n<li>Co-Chair&#8217;s present on recent released HIM publications.<\/li>\n<li>Guest Speaker from Blockchain, other WG&#8217;s with complementary topics.<\/li>\n<li>Potential deep-dive into new or existing Healthcare related topic.<\/li>\n<li>Targeted push of call from CSA marketing and membership, potential survey to gather more interest.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2020\u5e746\u6708]<br \/>\n1. \u56fd\u5185\u6d3b\u52d5<br \/>\n2020\u5e74\u5ea6(2020\u5e746\u6708\uff5e2021\u5e745\u6708\uff09\u6d3b\u52d5\u8a08\u753b\uff0f\u76ee\u6a19<\/p>\n<ul>\n<li>\u00a0\u56fd\u5185\u6d3b\u52d5\n<ul>\n<li>\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\uff0f\u533b\u85ac\u54c1\uff0f\u533b\u7642\u6a5f\u5668\u7523\u696d\u3001\u533b\u7642\u6a5f\u95a2\uff0f\u4ecb\u8b77\u65bd\u8a2d\uff0f\u5065\u5eb7\u5897\u9032\u30b5\u30fc\u30d3\u30b9\u4e8b\u696d\u8005\u3001\u60a3\u8005\uff0f\u6d88\u8cbb\u8005\u3092\u542b\u3080\u5065\u5eb7\u533b\u7642\u60c5\u5831\u30d0\u30ea\u30e5\u30fc\u30c1\u30a7\u30fc\u30f3\u5168\u4f53\u306b\u304a\u3051\u308bCSA\u30ac\u30a4\u30c0\u30f3\u30b9\u3001CCM\u3001STAR\u8a8d\u8a3c\u3001\u533b\u7642\u6a5f\u5668\uff0f\u9060\u9694\u533b\u7642\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u3001IoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\u3001\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u30b3\u30f3\u30c6\u30ca\uff0f\u30de\u30a4\u30af\u30ed\u30b5\u30fc\u30d3\u30b9\u30ac\u30a4\u30c0\u30f3\u30b9\u7b49\u306e\u6709\u52b9\u6d3b\u7528\u306e\u63a8\u9032\u6d3b\u52d5<\/li>\n<li>CSA\u306e\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u304c\u4e3b\u5c0e\u3059\u308bCSA\u30ac\u30a4\u30c0\u30f3\u30b9\u3001CCM\u304a\u3088\u3073\u305d\u306e\u4ed6\u767a\u884c\u6587\u66f8\u985e\uff08\u4f8b\uff0eIoT\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ac\u30a4\u30c0\u30f3\u30b9\uff09\u306b\u95a2\u3059\u308b\u3001\u696d\u754c\u306e\u8996\u70b9\u306b\u7acb\u3063\u305f\u30d4\u30a2\u30ec\u30d3\u30e5\u30fc\u306e\u5b9f\u65bd\u304a\u3088\u3073\u30d5\u30a3\u30fc\u30c9\u30d0\u30c3\u30af\u306e\u63d0\u4f9b<\/li>\n<li>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u306b\u95a2\u308f\u308b\u56fd\u5185\u5916\u306e\u4e3b\u8981\u306a\u30b9\u30c6\u30fc\u30af\u30db\u30eb\u30c0\u30fc\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\uff08\u4f8b\uff0e\u30d5\u30a9\u30fc\u30ab\u30b9\u30b0\u30eb\u30fc\u30d7\u3001\u696d\u754c\u56e3\u4f53\u3001\u7814\u7a76\u6a5f\u95a2\u3001\u30d5\u30a9\u30fc\u30e9\u30e0\u3001\u5b66\u8853\u56e3\u4f53\u306a\u3069\uff09\u3068\u306e\u7a4d\u6975\u7684\u306a\u5354\u696d\u6d3b\u52d5<\/li>\n<li>\u4e0a\u8a18\u306b\u95a2\u3059\u308b\u5468\u77e5\u3001\u8a8d\u77e5\u3001\u7814\u7a76\u306e\u6a5f\u4f1a\u3092\u8a08\u753b\uff0f\u5b9f\u884c\u3059\u308b\u305f\u3081\u306b\u3001\u95a2\u6771\u5206\u79d1\u4f1a\u304a\u3088\u3073\u95a2\u897f\u5206\u79d1\u4f1a\u3092\u8a2d\u7f6e\u3059\u308b\u3068\u3068\u3082\u306b\u3001\u30aa\u30f3\u30e9\u30a4\u30f3\u30c4\u30fc\u30eb\u3092\u6d3b\u7528\u3059\u308b<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\n<ul>\n<li>CSA HIM-WG\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\u3078\u306e\u7a4d\u6975\u7684\u30b3\u30df\u30c3\u30c8\u30e1\u30f3\u30c8<\/li>\n<li>CSA\u6d77\u5916\u30c1\u30e3\u30d7\u30bf\u30fc\u3068\u306e\u9023\u643a\u6d3b\u52d5\u5f37\u5316\uff08\u4f8b\uff1a\u4e2d\u56fd\u3001\u6771\u5357\u30a2\u30b8\u30a2\u3001\u30a4\u30f3\u30c9\u3001EMEA\uff09<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u65e5\u6642\uff1a2020\u5e746\u670825\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events Calendar<\/strong>\n<ul>\n<li>Telehealth paper, released 6\/16.<\/li>\n<li>Healthcare in Big Data, peer review ended 6\/17.<\/li>\n<li>CSA CloudBytes Connect\u00a0(July event)\n<ul>\n<li>Submission for\u00a0Health Information Management to\u00a0speak on a Healthcare topic or the latest release.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Blackhat (7.31-8.6, Las Vegas) *Moved to Virtual<\/li>\n<li>SECtember (September 14th-18th, Seattle)\n<ul>\n<li>Jim submitted to present<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><b>Telehealth Data in the Cloud<\/b>\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/artifacts\/telehealth-data-in-the-cloud\/<\/a><\/li>\n<li>The Telehealth paper was picked up by Cyber Security\u00a0news site Dark Reading.\n<ul>\n<li><a href=\"https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136\" target=\"_blank\" rel=\"noopener\">https:\/\/www.darkreading.com\/cloud\/cloud-security-alliance-offers-tips-to-protect-telehealth-data\/d\/d-id\/1338136<\/a>\n<ul>\n<li>What are the HIPAA\/HITECH challenges you&#8217;re facing?<\/li>\n<li>What security breaches and incidents are you concerned with?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Healthcare Big Data in the Cloud<\/strong>\n<ul>\n<li>Jim Angle addressed some of the remaining feedback of a few remaining questions, and discussed with Vince how to handle responding to those.<\/li>\n<li>Will be going into design phase before release.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Other Future Initiative Topics<\/strong>\n<ul>\n<li>Cloud based Electronic Health Records,\u00a0Intersection of wearable devices and healthcare, and other proposed healthcare topics are currently on hold, and will be brought up in future meetings.<\/li>\n<li>If anyone has a healthcare topic of interest they would like brought up at the next meeting (7\/8) please let myself, or one of the Co-Chair&#8217;s know.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>2-1-2.\u00a0<strong><u>Cloud Security Alliance &#8211; Delaware Valley Chapter<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2020\u5e746\u670825\u65e5\uff08\u6728\uff091:00am\uff5e2:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3\u958b\u50ac<br \/>\n<a href=\"https:\/\/www.eventbrite.com\/e\/lessons-from-leveraging-risk-management-for-cybersecurity-in-healthcare-tickets-103708069628\">https:\/\/www.eventbrite.com\/e\/lessons-from-leveraging-risk-management-for-cybersecurity-in-healthcare-tickets-103708069628<\/a><br \/>\n\u6f14\u984c\uff1aLessons from Leveraging Risk Management for Cyber security in Healthcare<br \/>\n\u8b1b\u5e2b\uff1aBoris Vishnevsky, Principal, Complex Solutions and Cyber Security at Slalom &amp; Adjunct Professor at Thomas Jefferson University.<br \/>\n[\u6982\u8981]<br \/>\nWhat comparison between human and computer viruses can teach us about risk management?<br \/>\nCOVID-19 pandemic made us appreciate viruses as critical players in the history of humanity.<br \/>\nAs we continue to learn to live in a \u201cnew normal\u201d imposed on the world by this global pandemic, we forced to rethink our approaches to managing risks.<br \/>\nIf we parallel the evolution, compare the history of biological and computer-based viruses, we can develop a new appreciation for leveraging modern risk management frameworks such as NIST RMF and CSA CAIQ. The comparison of origin, spread, and mitigation of viruses can help draw essential lessons in risk management. These lessons apply to both cybersecurity as well as population health.<br \/>\nIn this session, we review, compare, and contrast risk mitigation techniques for biological and computer viruses based on risk management practices defined by CSA and NIST.<\/p>\n<p>2-1-3.\u00a0<strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u65e5\u6642\uff1a2020\u5e746\u670811\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events Calendar<\/strong>\n<ul>\n<li>Telehealth paper now in design phase, released 6\/22.<\/li>\n<li>CSA CloudBytes Connect\u00a0<strong>(July event)<\/strong>\n<ul>\n<li>Submission for\u00a0Health Information Management to\u00a0speak on a Healthcare topic or the latest release.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Blackhat (7.31-8.6, Las Vegas) *Moved to Virtual<\/li>\n<li>SECtember (September 14th-18th, Seattle)\n<ul>\n<li>Submission to present a HIM release<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Telehealth Paper<\/strong>\n<ul>\n<li>Peer review is now closed, currently in the design phase to be released June 22nd.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Current Initiative<\/strong>\n<ul>\n<li>Healthcare Big Data in the Cloud<em>\u00a0<\/em>\n<ul>\n<li>The next paper of focus for the HIM group, still in open peer review for another week until 6\/17.<\/li>\n<li>Co-Chair Jim Angle addressed some feedback that he&#8217;s received, and additions he has made to the paper.<\/li>\n<li>Any feedback or comments regarding the paper, or direction in which to take it are welcome.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li><strong>Other Initiatives<\/strong>\n<ul>\n<li>Cloud based Electronic Health Records,\u00a0Intersection of wearable devices and healthcare, and other proposed healthcare topics are currently on hold, and will be brought up in future meetings.<\/li>\n<li>If anyone has a healthcare topic of interest they would like brought up at the next meeting (6\/24), please let myself, or one of the Co-Chair&#8217;s know.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2020\u5e745\u6708]<\/p>\n<ol>\n<li style=\"text-align: left;\"><strong>\u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong><u>1-1. OWASP Secure Medical Device Deployment Standard Version 2.0\u65e5\u672c\u8a9e\u7ffb\u8a33\u7248\u4f5c\u6210<\/u><\/strong><strong><u>\uff08\u30ec\u30d3\u30e5\u30fc\u4e2d\uff09<\/u><\/strong><\/li>\n<\/ul>\n<p><strong>\u00a0 \u00a0 \u00a0 2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02-1. <\/strong><strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/strong><\/p>\n<p>2-1-1.\u00a0<strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u65e5\u6642\uff1a2020\u5e745\u670814\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n[\u6982\u8981]<\/p>\n<ul>\n<li><strong>CSA Events Calendar<\/strong>\n<ul>\n<li>Telehealth paper in peer review until May 17th<\/li>\n<li>CSA CloudBytes Connect (May 26-28th)<br \/>\n<a href=\"https:\/\/web.cvent.com\/event\/356caa07-5b61-4592-a600-06e37119d1ac\/summary\" target=\"_blank\" rel=\"noopener\">https:\/\/web.cvent.com\/event\/356caa07-5b61-4592-a600-06e37119d1ac\/summary<\/a><\/li>\n<li>CSA CloudBytes Connect (July event)\n<ul>\n<li>Submission for\u00a0Health Information Management to\u00a0speak on a Healthcare topic or the latest release.<\/li>\n<\/ul>\n<ul>\n<li>New date for Federal Summit (June 25, Washington DC)<\/li>\n<\/ul>\n<\/li>\n<li>SECtember (September 14th-18th, Seattle)\n<ul>\n<li>Submission to present a HIM release<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Review of latest Healthcare releases\u00a0<strong>Managing the Risk for Medical Devices Connected to the Cloud<\/strong>\n<ul>\n<li><a href=\"https:\/\/cloudsecurityalliance.org\/press-releases\/2020\/03\/12\/newest-cloud-security-alliance-paper-sheds-light-on-best-practices-for-managing-risks-associated-with-cloud-connected-medical-devices\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cloudsecurityalliance.org\/press-releases\/2020\/03\/12\/newest-cloud-security-alliance-paper-sheds-light-on-best-practices-for-managing-risks-associated-with-cloud-connected-medical-devices\/<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><b>Telehealth Paper<\/b>\n<ul>\n<li>Open discussion between co-chairs addressing remaining unresolved comments from the paper.<\/li>\n<li>Making sure the paper is addressing the needs of the Health Delivery Organizations and those who can most benefit from it.\n<ul>\n<li><strong><em>Posting for open peer review, ready for public comments.<\/em><\/strong><strong><em>\u00a0<\/em><\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><b>Other Initiatives\u00a0<\/b>\n<ul>\n<li><strong>Healthcare Big Data in the Cloud<\/strong>\u00a0paper will be brought up and focused on in future meetings.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[2020\u5e744\u6708]<\/p>\n<ol>\n<li style=\"text-align: left;\"><strong>\u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong><u>1-1. OWASP Secure Medical Device Deployment Standard Version 2.0\u65e5\u672c\u8a9e\u7ffb\u8a33\u7248\u4f5c\u6210<\/u><\/strong><strong><u>\uff08\u30ec\u30d3\u30e5\u30fc\u4e2d\uff09<br \/>\n<\/u><\/strong>\uff08\u82f1\u8a9e\u539f\u6587\uff09<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/owasp-secure-medical-devices-deployment-standard\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/owasp-secure-medical-devices-deployment-standard\/<\/a><\/li>\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/strong><strong><u><br \/>\n<\/u><\/strong>2-1-1.\u00a0<strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2020\u5e744\u670830\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n<strong>1) Intro<\/strong>.<\/li>\n<li>Explanation of the CSA working groups and the Circle platform. How to join HIM community and contribute.<br \/>\n<a href=\"https:\/\/circle.cloudsecurityalliance.org\/home\">https:\/\/circle.cloudsecurityalliance.org\/home <\/a><\/li>\n<li>Review of latest Healthcare releases Managing the Risk for Medical Devices Connected to the Cloud<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/press-releases\/2020\/03\/12\/newest-cloud-security-alliance-paper-sheds-light-on-best-practices-for-managing-risks-associated-with-cloud-connected-medical-devices\/\">https:\/\/cloudsecurityalliance.org\/press-releases\/2020\/03\/12\/newest-cloud-security-alliance-paper-sheds-light-on-best-practices-for-managing-risks-associated-with-cloud-connected-medical-devices\/<\/a><br \/>\n<strong>2) Telehealth Paper<\/strong><\/li>\n<li>Initial open discussion from the Telehealth paper written by Dr. Jim Angle.<\/li>\n<li>Making sure the paper is addressing the needs of the Health Delivery Organizations and those who can most benefit from it.<\/li>\n<li>Posting for open peer review, ready for public comments.<br \/>\n<strong>3) Other Initiatives<\/strong><\/li>\n<li>Healthcare Big Data in the Cloud paper will be brought up and focused on in future meetings.<strong>4) CSA Events Calendar<\/strong><\/li>\n<li>CSA CloudBytes Connect (May 26-28th)<br \/>\nHealth Information Management could host a Virtual Summit on a Healthcare topic or the latest release.<br \/>\n<a href=\"https:\/\/web.cvent.com\/event\/356caa07-5b61-4592-a600-06e37119d1ac\/summary\">https:\/\/web.cvent.com\/event\/356caa07-5b61-4592-a600-06e37119d1ac\/summary<\/a><\/li>\n<li>New date for Federal Summit (June 25, Washington DC)2-1-2. <strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2020\u5e744\u67082\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aAlex Kaluza (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n<strong>1) Intro<\/strong>.<\/li>\n<li>Introduction of Health Information Management and other CSA working groups.<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/covid-19\">https:\/\/cloudsecurityalliance.org\/covid-19<\/a> to find the latest response from CSA.<\/li>\n<li>Explanation of Circle platform, how to join HIM community and contribute<br \/>\n<a href=\"https:\/\/circle.cloudsecurityalliance.org\/home\">https:\/\/circle.cloudsecurityalliance.org\/home<\/a><\/li>\n<\/ul>\n<p><strong>\u00a0 \u00a0 \u00a0 2) CSA Events Calendar<\/strong><\/p>\n<ul>\n<li>New tentative date for Federal Summit (June 25, Washington DC)<\/li>\n<li>Potentially have HIM WG could host a Virtual Summit on a Healthcare topic, or the latest release, Managing the Risk for Medical Devices Connected to the Cloud.<\/li>\n<\/ul>\n<p><strong>\u00a0 \u00a0 \u00a0 3) HIM Potential Initiatives<\/strong><\/p>\n<ul>\n<li>Telehealth<\/li>\n<li>Cloud-based Electronic Health Records<\/li>\n<li>The intersection of wearable devices and healthcare<\/li>\n<li>Big Data<\/li>\n<li>Group discussion of a few potential working group initiatives, and how to prioritize them.<\/li>\n<li>Telehealth is the consensus favorite for the next initiative, as it is critically important right now across the world, and new standards and guidelines should be brought up to date.<\/li>\n<\/ul>\n<p><strong>\u00a0 \u00a0 \u00a04) Other Initiatives<\/strong><\/p>\n<ul>\n<li>An extension of the Medical Devices in the Cloud paper, and still in development.<\/li>\n<li>Health Information Risk Chart<\/li>\n<li>Medical device and Health IT Joint Security Plan (JSP) &amp; Health Industry Cybersecurity Practices (HICP)<\/li>\n<li>These are both on Hold for now, but can work as support content in the future after more related initiatives are completed.<\/li>\n<\/ul>\n<p><strong>\u00a0 \u00a05) Closing Discussion<\/strong><\/p>\n<ul>\n<li>Jim will put together an Abstract draft for the Telehealth initiative.<\/li>\n<\/ul>\n<p><strong>\u00a0 \u00a06) Next Meeting<\/strong><\/p>\n<ul>\n<li>Wednesday, April 29th.<\/li>\n<\/ul>\n<p>[2020\u5e743\u6708]<\/p>\n<ol>\n<li style=\"text-align: left;\"><strong>\u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong><u>1-1. OWASP Secure Medical Device Deployment Standard Version 2.0\u65e5\u672c\u8a9e\u7ffb\u8a33\u7248\u4f5c\u6210<\/u><\/strong><strong><u>\uff08\u9032\u884c\u4e2d\uff09<br \/>\n<\/u><\/strong>\uff08\u82f1\u8a9e\u539f\u6587\uff09<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/owasp-secure-medical-devices-deployment-standard\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/owasp-secure-medical-devices-deployment-standard\/<\/a><\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u><\/strong>2-1-1. <strong><u>Managing the Risk for Medical Devices Connected to the Cloud<\/u><\/strong><strong><u>\uff082020\u5e743\u670816\u65e5\u516c\u958b\u6e08\uff09<br \/>\n<\/u><\/strong><a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/managing-the-risk-for-medical-devices-connected-to-the-cloud\/\">https:\/\/cloudsecurityalliance.org\/artifacts\/managing-the-risk-for-medical-devices-connected-to-the-cloud\/<\/a><\/li>\n<\/ol>\n<p>[2020\u5e742\u6708]<\/p>\n<ol>\n<li style=\"text-align: left;\"><strong><strong>\u56fd\u5185\u6d3b\u52d5<\/strong><\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong><u>1-1. OWASP Night 2020\/02 @Security Days 2020<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u4e3b\u50ac\uff1aOWASP Japan<br \/>\n<a href=\"https:\/\/f2ff.jp\/introduction\/2419?project_id=20200202\">https:\/\/f2ff.jp\/introduction\/2419?project_id=20200202<\/a><br \/>\n\u65e5\u6642\uff1a2020\u5e742\u67085\u65e5\uff08\u6c34\uff0906:00 pm &#8211; 08:30 pm<br \/>\n\u5834\u6240\uff1aJP\u30bf\u30ef\u30fc KITTE<br \/>\n\u6982\u8981\uff1a\u533b\u7642\u6a5f\u5668\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308bOWASP\u3068CSA\u306e\u9023\u643a<br \/>\n1. \u8f38\u51fa\u6226\u7565\u306b\u8d64\u4fe1\u53f7\u304c\u706f\u308b\u65e5\u672c\u306e\u533b\u7642\u6a5f\u5668<br \/>\n2. \u533b\u7642\u6a5f\u5668\u958b\u767a\u306b\u304a\u3051\u308bOWASP\u3068CSA\u306e\u9023\u643a\u6d3b\u52d5<br \/>\n3. \u307e\u3068\u3081\uff0fQ&amp;A \uff5e\u85ac\u5bb3\u30a8\u30a4\u30ba\u4e8b\u4ef6\u306e\u6559\u8a13\u3092\u6d3b\u304b\u3059\uff5e<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/owaspcsa\">https:\/\/www.slideshare.net\/esasahara\/owaspcsa<\/a><\/li>\n<li><strong><u>1-2. <\/u><\/strong><strong><u>\u30d5\u30a1\u30fc\u30deIT\uff06\u30c7\u30b8\u30bf\u30eb\u30a8\u30ad\u30b9\u30dd 2020\uff08\u5ef6\u671f\uff09<br \/>\n<\/u><\/strong>\u4e3b\u50ac\uff1aUBM\u30b8\u30e3\u30d1\u30f3<br \/>\n\u5f8c\u63f4\uff1a\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u65e5\u6642\uff1a\u6642\u671f\u672a\u5b9a<br \/>\n\u5834\u6240\uff1a\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8<br \/>\n\u6982\u8981\uff1a\u30d6\u30fc\u30b9\u51fa\u5c55<br \/>\n<a href=\"https:\/\/www.pharmait-expo.com\/\">https:\/\/www.pharmait-expo.com\/<\/a><\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u><\/strong>2-1-1. <strong><u>Managing the Risk for Medical Devices Connected to the Cloud<\/u><\/strong><strong><u>\uff08\u9032\u884c\u4e2d\uff09<br \/>\n<\/u><\/strong>\u30c9\u30e9\u30d5\u30c8\u7b2c\uff13\u7248<\/li>\n<\/ol>\n<p>[2020\u5e741\u6708]<\/p>\n<ol>\n<li style=\"text-align: left;\"><strong>\u56fd\u5185\u6d3b\u52d5<br \/>\n<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong><u>1-1. <\/u><\/strong><strong><u>AI \u3092\u6d3b\u7528\u3057\u305f\u533b\u7642\u6a5f\u5668\u306e\u958b\u767a\u3068\u767a\u5c55\u3092\u76ee\u6307\u3059\u5354\u8b70\u4f1a<br \/>\n\u7b2c3 \u56de\u52c9\u5f37\u4f1a\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u4e3b\u50ac\uff1aAI \u3092\u6d3b\u7528\u3057\u305f\u533b\u7642\u6a5f\u5668\u306e\u958b\u767a\u3068\u767a\u5c55\u3092\u76ee\u6307\u3059\u5354\u8b70\u4f1a<br \/>\n\u65e5\u6642\uff1a2020\u5e741\u670827\u65e5\uff08\u6708\uff09 06:30 pm &#8211; 08 :00 pm<br \/>\n\u5834\u6240\uff1a\u6771\u4eac\u30ac\u30fc\u30c7\u30f3\u30c6\u30e9\u30b9\u7d00\u5c3e\u4e95\u753a\u7d00\u5c3e\u4e95\u30bf\u30ef\u30fc<br \/>\n\u6982\u8981\uff1aAI\u533b\u7642\u6a5f\u5668\u306b\u6c42\u3081\u3089\u308c\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3068\u56fd\u5185\u5916\u306e\u52d5\u5411<br \/>\n1. \u30e1\u30ac\u30fb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u4e8b\u696d\u8005\u3068\u533b\u7642AI<br \/>\n2. AI\u502b\u7406\u3068\u516c\u5171\u8abf\u9054\u57fa\u6e96\u306e\u56fd\u969b\u52d5\u5411<br \/>\n3. SaMD\u3068\u533b\u7642\u6a5f\u5668\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u3081\u3050\u308b\u56fd\u969b\u6a19\u6e96\u5316\u52d5\u5411<br \/>\n4. \u307e\u3068\u3081\uff0fQ&amp;A<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/ai-224224836\">https:\/\/www.slideshare.net\/esasahara\/ai-224224836<\/a><\/li>\n<li><strong><u>1-2<\/u><\/strong><strong><u>. HIM-WG<\/u><\/strong><strong><u>\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2020\u5e741\u67087\u65e5\uff08\u706b\uff097:00pm\uff5e9:00pm<br \/>\n\u5834\u6240\uff1a\u682a\u5f0f\u4f1a\u793eMICIN\u4f1a\u8b70\u5ba4\uff08\u6771\u4eac\u90fd\u5343\u4ee3\u7530\u533a\u5927\u624b\u753a2-6-2 \u65e5\u672c\u30d3\u30eb13\u968e\uff09<br \/>\n\u6982\u8981\uff1a\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u6226\u7565\u3092\u652f\u3048\u308b\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u3068OT\uff0fIT\u30ea\u30b9\u30af\u7ba1\u7406\u6b27\u5dde\u9023\u5408\uff08EU\uff09\u306f\u3001\u6c17\u5019\u5909\u52d5\uff0f\u74b0\u5883\u653f\u7b56\u3092\u80cc\u666f\u306b\u3001\u751f\u547d\u30fb\u5065\u5eb7\u95a2\u9023\u5206\u91ce\u306e\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u6226\u7565\u3092\u7a4d\u6975\u7684\u306b\u63a8\u9032\u3057\u3066\u3044\u307e\u3059\u3002\u6a19\u6e96\u5316\u3055\u308c\u305f\u30c7\u30b8\u30bf\u30eb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u305d\u3053\u304b\u3089\u751f\u6210\u30fb\u53ce\u96c6\u30fb\u4fdd\u5b58\u3055\u308c\u308b\u30c7\u30fc\u30bf\u5229\u6d3b\u7528\u3092\u57fa\u8ef8\u3068\u3059\u308b\u300c\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u300d\u306b\u3088\u308a\u3001\u5f93\u6765\u5206\u65ad\u3055\u308c\u3066\u3044\u305f\u30a6\u30a7\u30c3\u30c8\u3068\u30c9\u30e9\u30a4\u3001\u5236\u5fa1\u6280\u8853\uff08OT\uff09\u3068\u60c5\u5831\u6280\u8853\uff08OT)\u306a\u3069\u306e\u76f8\u4e92\u9023\u643a\u304c\u9032\u307f\u3001\u69d8\u3005\u306a\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u304c\u671f\u5f85\u3055\u308c\u308b\u53cd\u9762\u3001\u30c7\u30fc\u30bf\u54c1\u8cea\u4fdd\u8a3c\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u30b5\u30a4\u30d0\u30fc\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30fb\u30ea\u30b9\u30af\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u3001\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u306a\u3069\u30ea\u30b9\u30af\u7ba1\u7406\u4e0a\u306e\u8ab2\u984c\u3082\u5c71\u7a4d\u3057\u3066\u3044\u307e\u3059\u3002\u4eca\u56de\u306f\u3001\u30af\u30e9\u30a6\u30c9\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u8996\u70b9\u304b\u3089\u3001\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u3068\u30ea\u30b9\u30af\u306e\u30d0\u30e9\u30f3\u30b9\u3092\u691c\u8a0e\u3057\u3066\u3044\u304d\u307e\u3059\u30021. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u3068\u306f\u4f55\u304b\uff1f<br \/>\n1-1. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306e\u5b9a\u7fa9<br \/>\n1-2. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306b\u304a\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9\u3068\u6c17\u5019\u5909\u52d5\uff0f\u74b0\u5883\u306e\u95a2\u4fc2<br \/>\n1-3. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306e\u793e\u4f1a\u5b9f\u88c5\u3068ICT\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0<br \/>\n1-4. SDGs\u6295\u8cc7\u304b\u3089\u307f\u305f\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u5e02\u5834\u3068\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7<br \/>\n2. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u3068\u306f\u4f55\u304b\uff1f<br \/>\n2-1. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u5b9a\u7fa9<br \/>\n2-2. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u6280\u8853\u62e1\u5f35\uff1a\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\uff0fIoT\uff0fAI<br \/>\n2-3. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\uff0f\u5065\u5eb7\u533b\u7642\u5206\u91ce\u306b\u304a\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u9069\u7528\u4e8b\u4f8b<br \/>\n2-4. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306eQMS\u3068\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n3. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306b\u304a\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306eOT\uff0fIT\u30ea\u30b9\u30af\u7ba1\u7406<br \/>\n3-1. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306eOT\uff0fIT\u69cb\u9020\u3068\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30ca\u30eb\u30ea\u30b9\u30af<br \/>\n3-2. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306eOT\uff0fIT\u69cb\u9020\u3068\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30ca\u30eb\u30ea\u30b9\u30af<br \/>\n3-3. \u4e3b\u8981\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u4e8b\u696d\u8005\u306e\u53d6\u7d44\u304b\u3089\u4fef\u77b0\u3059\u308b\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u3068\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u30ea\u30b9\u30af\u7ba1\u7406<br \/>\n3-4. \u4ed6\u696d\u7a2e\u4e8b\u4f8b\u304b\u3089\u4fef\u77b0\u3059\u308bOT\uff0fIT\u306e\u30b5\u30a4\u30d0\u30fc\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30fb\u30ea\u30b9\u30af\u30de\u30cd\u30b8\u30e1\u30f3\u30c8<br \/>\n4. \u307e\u3068\u3081\uff0fQ&amp;A<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/otit\">https:\/\/www.slideshare.net\/esasahara\/otit<\/a><\/li>\n<li><strong><u>1-3. <\/u><\/strong><strong><u>\u30d5\u30a1\u30fc\u30deIT\uff06\u30c7\u30b8\u30bf\u30eb\u30a8\u30ad\u30b9\u30dd 2020\uff08\u4e88\u5b9a\uff09<br \/>\n<\/u><\/strong>\u4e3b\u50ac\uff1aUBM\u30b8\u30e3\u30d1\u30f3<br \/>\n\u5f8c\u63f4\uff1a\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u65e5\u6642\uff1a2020\u5e743\u670816\u65e5\uff08\u6708\uff09\uff5e18\u65e5\uff08\u6c34\uff09<br \/>\n\u5834\u6240\uff1a\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8<br \/>\n\u6982\u8981\uff1a\u30d6\u30fc\u30b9\u51fa\u5c55<br \/>\n<a href=\"https:\/\/www.pharmait-expo.com\/\">https:\/\/www.pharmait-expo.com\/<\/a><\/li>\n<\/ul>\n<ol start=\"2\">\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u><\/strong>2-1-1. <strong><u>Managing the Risk for Medical Devices Connected to the Cloud<\/u><\/strong><strong><u>\uff08\u9032\u884c\u4e2d\uff09<br \/>\n<\/u><\/strong>\u30c9\u30e9\u30d5\u30c8\u7b2c\uff13\u7248<\/li>\n<\/ol>\n<p>[2019\u5e7412\u6708]<\/p>\n<p>1. \u56fd\u5185\u6d3b\u52d5<\/p>\n<ul>\n<li><strong><u>1-1. HIM-WG<\/u><\/strong><strong><u>\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u4e88\u5b9a\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2020\u5e741\u67087\u65e5\uff08\u706b\uff097:00pm\uff5e9:00pm<br \/>\n\u5834\u6240\uff1a\u682a\u5f0f\u4f1a\u793eMICIN\u4f1a\u8b70\u5ba4\uff08\u6771\u4eac\u90fd\u5343\u4ee3\u7530\u533a\u5927\u624b\u753a2-6-2 \u65e5\u672c\u30d3\u30eb13\u968e\uff09<br \/>\n\u6982\u8981\uff1a\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u6226\u7565\u3092\u652f\u3048\u308b\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u3068OT\uff0fIT\u30ea\u30b9\u30af\u7ba1\u7406\u6b27\u5dde\u9023\u5408\uff08EU\uff09\u306f\u3001\u6c17\u5019\u5909\u52d5\uff0f\u74b0\u5883\u653f\u7b56\u3092\u80cc\u666f\u306b\u3001\u751f\u547d\u30fb\u5065\u5eb7\u95a2\u9023\u5206\u91ce\u306e\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u6226\u7565\u3092\u7a4d\u6975\u7684\u306b\u63a8\u9032\u3057\u3066\u3044\u307e\u3059\u3002\u6a19\u6e96\u5316\u3055\u308c\u305f\u30c7\u30b8\u30bf\u30eb\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u305d\u3053\u304b\u3089\u751f\u6210\u30fb\u53ce\u96c6\u30fb\u4fdd\u5b58\u3055\u308c\u308b\u30c7\u30fc\u30bf\u5229\u6d3b\u7528\u3092\u57fa\u8ef8\u3068\u3059\u308b\u300c\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u300d\u306b\u3088\u308a\u3001\u5f93\u6765\u5206\u65ad\u3055\u308c\u3066\u3044\u305f\u30a6\u30a7\u30c3\u30c8\u3068\u30c9\u30e9\u30a4\u3001\u5236\u5fa1\u6280\u8853\uff08OT\uff09\u3068\u60c5\u5831\u6280\u8853\uff08OT)\u306a\u3069\u306e\u76f8\u4e92\u9023\u643a\u304c\u9032\u307f\u3001\u69d8\u3005\u306a\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u304c\u671f\u5f85\u3055\u308c\u308b\u53cd\u9762\u3001\u30c7\u30fc\u30bf\u54c1\u8cea\u4fdd\u8a3c\uff0f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001\u30b5\u30a4\u30d0\u30fc\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30fb\u30ea\u30b9\u30af\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\u3001\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u306a\u3069\u30ea\u30b9\u30af\u7ba1\u7406\u4e0a\u306e\u8ab2\u984c\u3082\u5c71\u7a4d\u3057\u3066\u3044\u307e\u3059\u3002\u4eca\u56de\u306f\u3001\u30af\u30e9\u30a6\u30c9\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u8996\u70b9\u304b\u3089\u3001\u30a4\u30ce\u30d9\u30fc\u30b7\u30e7\u30f3\u3068\u30ea\u30b9\u30af\u306e\u30d0\u30e9\u30f3\u30b9\u3092\u691c\u8a0e\u3057\u3066\u3044\u304d\u307e\u3059\u30021. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u3068\u306f\u4f55\u304b\uff1f<br \/>\n1-1. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306e\u5b9a\u7fa9<br \/>\n1-2. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306b\u304a\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9\u3068\u6c17\u5019\u5909\u52d5\uff0f\u74b0\u5883\u306e\u95a2\u4fc2<br \/>\n1-3. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306e\u793e\u4f1a\u5b9f\u88c5\u3068ICT\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0<br \/>\n1-4. SDGs\u6295\u8cc7\u304b\u3089\u307f\u305f\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u5e02\u5834\u3068\u30b9\u30bf\u30fc\u30c8\u30a2\u30c3\u30d7<br \/>\n2. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u3068\u306f\u4f55\u304b\uff1f<br \/>\n2-1. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u5b9a\u7fa9<br \/>\n2-2. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u6280\u8853\u62e1\u5f35\uff1a\u30d3\u30c3\u30b0\u30c7\u30fc\u30bf\uff0fIoT\uff0fAI<br \/>\n2-3. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\uff0f\u5065\u5eb7\u533b\u7642\u5206\u91ce\u306b\u304a\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u9069\u7528\u4e8b\u4f8b<br \/>\n2-4. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306eQMS\u3068\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n3. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306b\u304a\u3051\u308b\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306eOT\uff0fIT\u30ea\u30b9\u30af\u7ba1\u7406<br \/>\n3-1. \u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u306eOT\uff0fIT\u69cb\u9020\u3068\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30ca\u30eb\u30ea\u30b9\u30af<br \/>\n3-2. \u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306eOT\uff0fIT\u69cb\u9020\u3068\u30aa\u30da\u30ec\u30fc\u30b7\u30e7\u30ca\u30eb\u30ea\u30b9\u30af<br \/>\n3-3. \u4e3b\u8981\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u4e8b\u696d\u8005\u306e\u53d6\u7d44\u304b\u3089\u4fef\u77b0\u3059\u308b\u30d0\u30a4\u30aa\u30a8\u30b3\u30ce\u30df\u30fc\u3068\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u30ea\u30b9\u30af\u7ba1\u7406<br \/>\n3-4. \u4ed6\u696d\u7a2e\u4e8b\u4f8b\u304b\u3089\u4fef\u77b0\u3059\u308bOT\uff0fIT\u306e\u30b5\u30a4\u30d0\u30fc\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u30fb\u30ea\u30b9\u30af\u30de\u30cd\u30b8\u30e1\u30f3\u30c8<br \/>\n4. \u307e\u3068\u3081\uff0fQ&amp;A<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/otit\">https:\/\/www.slideshare.net\/esasahara\/otit<\/a><\/li>\n<\/ul>\n<p>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/p>\n<ul>\n<li><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u>2019\u5e7412\u6708\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/strong><\/li>\n<\/ul>\n<p>[2019\u5e7411\u6708]<\/p>\n<ul>\n<li><strong>1. \u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<li><strong><u>2019\u5e7411\u6708\u306e\u56fd\u5185\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/u><\/strong><\/li>\n<\/ul>\n<ul>\n<li><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><strong><br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><br \/>\n<\/strong><\/li>\n<li><strong>2-1-1.<\/strong> <strong><u>Press Release: Cloud Security Alliance Health Information Management Working Group Co-Chair Dr. Jim Angle to Present at HIMSS.(2019\u5e7411\u670820\u65e5\uff09<br \/>\n<\/u><\/strong>SEATTLE \u2013\u00a0 The\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/\">Cloud Security Alliance<\/a>\u00a0(CSA), the world\u2019s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, is pleased to share that Dr. Jim Angle, manager of Network Security \u2013 Vulnerability Management at Trinity Health and co-chair of CSA\u2019s Health Information Management Working Group, will be presenting \u201cManaging the Risk for Medical Devices Connected to the Cloud\u201d at the\u00a0<a href=\"https:\/\/www.himssconference.org\/\">HIMSS Global Health Conference &amp; Exhibition<\/a>\u00a0(Orlando) on March 11 at 2:30 p.m. In his talk, Dr. Angle will share some of his key insights that laid the groundwork for the white paper of the same name by CSA\u2019s\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/working-groups\/containerization\/\">Health Information Management (HIM) Working Group<\/a>, sharing with attendees how to apply the IoT Security Controls Framework to highly sensitive medical systems that support critical services.<br \/>\nIn his presentation, Dr. Angle will offer best practices to manage the risk inherent with operating modern-day medical devices. Today\u2019s cloud-connected medical devices are capable of collecting, processing, and storing electronically protected health information (ePHI), as well as managing life-critical functions, all with increasing reliance on complex software to manage vital functions. Dr. Angle will identify the requirements for purchasing new devices, managing the risk using degrees of separation from the patient, and continuous monitoring of these devices to ensure the mitigating control\u2019s effectiveness.<br \/>\n\u201cHow we manage devices is directly related to how close the device is to the patient \u2013 you can\u2019t manage an implanted device the same way you would an ultrasound machine. To effectively manage risk, you have to examine it based on the degrees of separation between the patient and the device. The HIM Working Group document, as Dr. Angle will show, delves into how applying the\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/artifacts\/iot-security-controls-framework\/\">CSA IoT Controls Framework<\/a>\u00a0to each degree can mitigate many of the risks associated with an IoT system that incorporates multiple types of connected devices, cloud services, and networking technologies,\u201d said Vince Campitelli, CSA enterprise security specialist and co-chair of the HIM Working Group.<br \/>\nDr. Angle has a Doctorate in Business Administration with a specialization in Computer and Information Security. He has over 25 years of experience in multiple areas of IT, culminating as the Deputy CIO for an army hospital, and more than 19 years of information security experience in both government service and the private sector. Currently, he is the manager of Network Security \u2013 Vulnerability Management at Trinity Health, where he previously held positions as Regional Information Security Officer and Security Architect.<br \/>\nThe\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/working-groups\/containerization\/\">Health Information Management Working Group<\/a>\u00a0aims to provide a direct influence on how health information service providers deliver secure cloud solutions (services, transport, applications, and storage) to their clients, and foster cloud awareness within all aspects of healthcare and related industries. Individuals interested in becoming involved in the future research and initiatives of this group are invited to do so by visiting the\u00a0<a href=\"https:\/\/cloudsecurityalliance.org\/research\/join-working-group\/\">Join page<\/a>.<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.org\/press-releases\/2019\/11\/20\/cloud-security-alliance-health-information-management-working-group-co-chair-dr-jim-angle-to-present-at-himss\/\"><strong>https:\/\/cloudsecurityalliance.org\/press-releases\/2019\/11\/20\/cloud-security-alliance-health-information-management-working-group-co-chair-dr-jim-angle-to-present-at-himss\/<\/strong><\/a><\/li>\n<li><strong>2-1-2.<\/strong> <strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e7411\u670821\u65e5\uff08\u6728\uff094:30am\uff5e5:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aShamun Mahmud (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n1) Brief overview on CSA, and the HIM WG<br \/>\n2) Upcoming CSA Events<br \/>\n3) Open Peer Reviews<br \/>\n4) Current and future HIM WG Initiatives<br \/>\n5) Deep dive into &#8220;Managing the Risk of Medical Devices Connected to the Cloud&#8221; (Current Initiative)Next steps: Post up-to-date version of the position paper to G-drive and Basecamp. Illicit feedback from entire HIM WG. Aim for peer review.<\/li>\n<\/ul>\n<p>[2019\u5e7410\u6708]<\/p>\n<ul>\n<li><strong>1. \u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<li><strong><u>2019\u5e7410\u6708\u306e\u56fd\u5185\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/u><\/strong><\/li>\n<\/ul>\n<ul>\n<li><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><br \/>\n<\/strong><\/li>\n<li><strong>2-1-1.<\/strong> <strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e7410\u670824\u65e5\uff08\u6728\uff093:30am\uff5e4:30am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aShamun Mahmud (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n1)\u00a0\u00a0CSA News\/Updates<br \/>\n2) Healthcare IT in the News<br \/>\n3) Updates on the current deliverables<\/li>\n<\/ul>\n<p>[2019\u5e749\u6708]<\/p>\n<ul>\n<li><strong>1. \u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<li><strong><u>2019\u5e749\u6708\u306e\u56fd\u5185\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/u><\/strong><\/li>\n<\/ul>\n<ul>\n<li><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><br \/>\n<\/strong><\/li>\n<li><strong>2-1-1.<\/strong> <strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e749\u670827\u65e5\uff08\u91d1\uff094:00am\uff5e5:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aShamun Mahmud (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n1)\u00a0Brief overview on CSA<br \/>\n2) Upcoming CSA Events<br \/>\n3) Open Peer Reviews<br \/>\n4) Current and future HIM WG Initiatives<br \/>\n5) Deep dive into &#8220;Managing the Risk of Medical Devices Connected to the Cloud&#8221; (Current Initiative)<br \/>\n6) Discussion of upcoming IEEE online meeting, how to collaborate with the specified IEEE WG<br \/>\n7) Conclusion and next steps (read the paper, provide comments)<\/li>\n<\/ul>\n<p>[2019\u5e748\u6708]<\/p>\n<ul>\n<li><strong>1. \u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<li><strong><u>1-1. HIM-WG<\/u><\/strong><strong><u>\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e749\u67084\u65e5\uff08\u6c34\uff097:00pm\uff5e9:00pm<br \/>\n\u5834\u6240\uff1a\u682a\u5f0f\u4f1a\u793eMICIN\u4f1a\u8b70\u5ba4\uff08\u6771\u4eac\u90fd\u5343\u4ee3\u7530\u533a\u5927\u624b\u753a2-6-2 \u65e5\u672c\u30d3\u30eb13\u968e\uff09<br \/>\n\u6982\u8981\uff1a\u4e16\u754c\u306e\u6f6e\u6d41\u306b\u5b66\u3076SaMD\uff0fAI\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u52d5\u5411<br \/>\n1.\u30bb\u30fc\u30d5\u30c6\u30a3\uff0fOT\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff0fIT\uff1a<br \/>\n\u30ab\u30ca\u30c0\u306b\u5b66\u3076\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n2. \u5e02\u8ca9\u524d\uff0f\u958b\u767a\u3068\u5e02\u8ca9\u5f8c\uff0f\u904b\u7528\u306e\u4e00\u4f53\u5316\uff1a<br \/>\n\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u306b\u5b66\u3076\u88fd\u54c1\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n3. SaMD\uff0fAI\u3068\u533b\u7642\u6a5f\u5668\uff0f\u975e\u533b\u7642\u6a5f\u5668\uff1a<br \/>\n\u30d5\u30e9\u30f3\u30b9\u306b\u5b66\u3076\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n4. \u4e16\u754c\u306e\u6f6e\u6d41\u304b\u3089\u4e57\u308a\u9045\u308c\u305f\u65e5\u672c\u306eSaMD\uff0fAI\u306b\u6557\u8005\u5fa9\u6d3b\u6226\u306f\u3042\u308b\u304b<br \/>\n<a href=\"https:\/\/www.slideshare.net\/esasahara\/samdai\">https:\/\/www.slideshare.net\/esasahara\/samdai<\/a><\/li>\n<\/ul>\n<ul>\n<li><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u>2019\u5e748\u6708\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/strong><\/li>\n<\/ul>\n<p>[2019\u5e747\u6708]<\/p>\n<ul>\n<li><strong>1. \u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<li><strong><u>1-1. HIM-WG<\/u><\/strong><strong><strong><u>\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u4e88\u5b9a\uff09<br \/>\n<\/u><\/strong><\/strong>\u65e5\u6642\uff1a2019\u5e749\u67084\u65e5\uff08\u6c34\uff097:00pm\uff5e9:00pm<br \/>\n\u5834\u6240\uff1a\u682a\u5f0f\u4f1a\u793eMICIN\u4f1a\u8b70\u5ba4\uff08\u6771\u4eac\u90fd\u5343\u4ee3\u7530\u533a\u5927\u624b\u753a2-6-2 \u65e5\u672c\u30d3\u30eb13\u968e\uff09<br \/>\n\u6982\u8981\uff1a\u4e16\u754c\u306e\u6f6e\u6d41\u306b\u5b66\u3076SaMD\uff0fAI\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u52d5\u5411<br \/>\n1.\u30bb\u30fc\u30d5\u30c6\u30a3\uff0fOT\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\uff0fIT\uff1a<br \/>\n\u30ab\u30ca\u30c0\u306b\u5b66\u3076\u30c7\u30b8\u30bf\u30eb\u30c4\u30a4\u30f3\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n2. \u5e02\u8ca9\u524d\uff0f\u958b\u767a\u3068\u5e02\u8ca9\u5f8c\uff0f\u904b\u7528\u306e\u4e00\u4f53\u5316\uff1a<br \/>\n\u30aa\u30fc\u30b9\u30c8\u30e9\u30ea\u30a2\u306b\u5b66\u3076\u88fd\u54c1\u30e9\u30a4\u30d5\u30b5\u30a4\u30af\u30eb\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n3. SaMD\uff0fAI\u3068\u533b\u7642\u6a5f\u5668\uff0f\u975e\u533b\u7642\u6a5f\u5668\uff1a<br \/>\n\u30d5\u30e9\u30f3\u30b9\u306b\u5b66\u3076\u30ea\u30b9\u30af\u30d9\u30fc\u30b9\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<br \/>\n4. \u4e16\u754c\u306e\u6f6e\u6d41\u304b\u3089\u4e57\u308a\u9045\u308c\u305f\u65e5\u672c\u306eSaMD\uff0fAI\u306b\u6557\u8005\u5fa9\u6d3b\u6226\u306f\u3042\u308b\u304b<\/li>\n<\/ul>\n<ul>\n<li><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u>2-1-1.<\/strong> <strong><u>Contributors Needed: Healthcare Information Management (HIM) Working Group.<\/u><\/strong><strong><u>\uff08\u7d99\u7d9a\u4e2d\uff09<br \/>\n<\/u><\/strong>The CSA HIM Working Group is searching for contributors to participate in the development of white-papers on security guidance for Healthcare InfoSec as well as reference architectures and best practices for Healthcare InfoSec. The working group is looking for contributors who have expertise and experience working with Healthcare InfoSec or related technologies. If you are interested in being part of these projects, please sign up for the working group<\/li>\n<\/ul>\n<p>[2019\u5e746\u6708]<\/p>\n<ul>\n<li><strong>1. \u56fd\u5185\u6d3b\u52d5<br \/>\n<\/strong>2019\u5e746\u6708\u306e\u56fd\u5185\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/li>\n<\/ul>\n<ul>\n<li><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u>2-1-1.<\/strong> <strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e746\u670821\u65e5\uff08\u91d1\uff094:00am\uff5e5:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aShamun Mahmud (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\n1) Best Practices: Medical Devices in the Cloud. Current work in progress. Also craft an Implementation guide mapping Dr. Angle\u2019s purchasing checklist to CSA\u2019s IoT Framework. DRAFT copy (of spreadsheet) posted<br \/>\n2) Health Information Risk Chart (Basecamp): Review the spreadsheet by mid- August. Compile and buildout the chart. DRAFT copy posted<br \/>\n3) Medical device and Health IT Joint Security Plan (JSP):\u00a0Review the JSP\u00a0by mid-May. Compile and craft a response. ON HOLD<br \/>\n4) Health Industry Cybersecurity Practices (HICP): Review the HICP\u00a0by mid-June. Compile and craft a response. ON HOLD<\/li>\n<\/ul>\n<p>[2019\u5e745\u6708]<\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 1.\u56fd\u5185\u6d3b\u52d5<\/strong><\/p>\n<ul>\n<li><strong><u>1-1. HIM-WG<\/u><\/strong><strong><strong><u>\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong><\/strong>\u65e5\u6642\uff1a2019\u5e745\u670822\u65e5\uff08\u6c34\uff097:00pm\uff5e9:00pm<br \/>\n\u5834\u6240\uff1a\u682a\u5f0f\u4f1a\u793eMICIN\u4f1a\u8b70\u5ba4\uff08\u6771\u4eac\u90fd\u5343\u4ee3\u7530\u533a\u5927\u624b\u753a2-6-2 \u65e5\u672c\u30d3\u30eb13\u968e\uff09<br \/>\n\u6982\u8981\uff1aSecuring Digital Health<br \/>\n1.\u30c7\u30b8\u30bf\u30eb\u30d8\u30eb\u30b9\u3068SDGs<br \/>\n2.DGHP: Securing Digital Health<br \/>\n3.ENISA: \u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30ab\u30eb\u30c1\u30e3\u30fc\u30fb\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3<\/li>\n<li><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u>2-1-1.<\/strong> <strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e745\u670810\u65e5\uff08\u91d1\uff094:00am\uff5e5:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aShamun Mahmud (CSA)<br \/>\n\u6982\u8981\uff1aHIM Working Group Initiatives explained<br \/>\nRespond to Current documents (uploaded to Basecamp)<br \/>\n1. Medical Devices: Managing the Risk (NCIJ): Review the presentation and actual article by mid-June. Also craft an Implementation guide mapping Dr. Angle\u2019s purchasing checklist to CSA\u2019s IoT Framework<br \/>\n2. Health Information Risk Chart (Basecamp): Review the spreadsheet by mid- June. Compile and craft a response<br \/>\n3. Medical device and Health IT Joint Security Plan (JSP): Review the JSP by mid-May. Compile and craft a response<br \/>\n4. Health Industry Cybersecurity Practices (HICP): Review the HICP by mid-June. Compile and craft a responseMedical Device Security &#8211; Managing the risk<br \/>\n1. Threat Environment<br \/>\n2. Legacy Medical Devices<br \/>\n3. Securing Medical Devices<br \/>\n4. New Medical Devices<br \/>\n5. Conclusion<\/li>\n<\/ul>\n<p>[2019\u5e744\u6708]<\/p>\n<p><strong>\u00a0 \u00a0 \u00a0 1.\u56fd\u5185\u6d3b\u52d5<\/strong><\/p>\n<ul>\n<li><strong><u>1-1. HIM-WG<\/u><\/strong><strong><u>\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u4e88\u5b9a\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e745\u670822\u65e5\uff08\u6c34\uff097:00pm\uff5e9:00pm<br \/>\n\u5834\u6240\uff1a\u682a\u5f0f\u4f1a\u793eMICIN\u4f1a\u8b70\u5ba4\uff08\u6771\u4eac\u90fd\u5343\u4ee3\u7530\u533a\u5927\u624b\u753a2-6-2 \u65e5\u672c\u30d3\u30eb13\u968e\uff09<br \/>\n\u6982\u8981\uff1aTBD<\/li>\n<li><strong><u>1-2. HIM-WG<\/u><\/strong><strong><u>\u95a2\u897f\u30df\u30fc\u30c6\u30a3\u30f3\u30b0\uff08\u4e88\u5b9a\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e746\u67083\u65e5\uff08\u6708\uff096:30pm\uff5e8:30pm<br \/>\n\u5834\u6240\uff1aTBD<br \/>\n\u6982\u8981\uff1a<br \/>\n1. CSA\u30b8\u30e3\u30d1\u30f3\u30b5\u30df\u30c3\u30c82019\u306erecap<br \/>\n2. CSA\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5\u5831\u544a<br \/>\n-HIM-WG<br \/>\n-IoT-WG<br \/>\n-Application Containers &amp; Microservices WG<br \/>\n3. \u95a2\u6771HIM-WG\u306e\u6d3b\u52d5\u5831\u544a\uff085\/22\u52c9\u5f37\u4f1a\u958b\u50ac\u4e88\u5b9a)<br \/>\n4. \u65e5\u672c\u56fd\u5185\u306e\u52d5\u5411\uff08\u4eee\uff09<br \/>\n-\u6b21\u4e16\u4ee3\u533b\u7642\u57fa\u76e4\u6cd5\u306e\u53d6\u7d44<br \/>\n-\u533b\u7642API\u306e\u53d6\u7d44<br \/>\n5. 2019\u5e74\u5ea6\u95a2\u897fHIM-WG\u6d3b\u52d5\u8a08\u753b\u306b\u3064\u3044\u3066<br \/>\n6. \u81ea\u7531\u8a0e\u8ad6<\/li>\n<li><strong>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u>2-1-1.<\/strong> <strong><u>CSA Health Information Management WG call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e744\u670826\u65e5\uff08\u91d1\uff093:00am\uff5e4:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aShamun Mahmud (CSA)<br \/>\n\u6982\u8981\uff1aHIM Working Group Initiatives explained<br \/>\nRespond to Current documents (uploaded to Basecamp)<br \/>\n1. Medical device and Health IT Joint Security Plan (JSP):\u00a0Review the JSP\u00a0by mid-May.\u00a0 Compile and craft a response<br \/>\n2. Health Industry Cybersecurity Practices (HICP): Review the HICP\u00a0by mid-June. Compile and craft a response<br \/>\n3. Medical Devices: Managing the Risk (NCIJ): Review the\u00a0\u00a0 presentation and actual article by mid-June. Also craft an Implementation guide mapping Dr. Angle\u2019s purchasing checklist to CSA\u2019s IoT Framework<br \/>\n4. Health Information Risk Chart (Basecamp): Review the spreadsheet by\u00a0\u00a0 mid-June. Compile and craft a response<\/li>\n<\/ul>\n<p>[2019\u5e743\u6708]<\/p>\n<ol>\n<li><strong>\u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong><u>1-1. \u6176\u61c9\u7fa9\u587e\u5927\u5b66\u7d4c\u55b6\u7ba1\u7406\u7814\u7a76\u79d12018\u5e74\u5ea6\u5927\u548c\u8a3c\u5238\u672a\u6765\u5148\u5c0e\u30c1\u30a7\u30a2\u30b7\u30c3\u30d7\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e742\u670824\u65e5\uff08\u65e5\uff091:10pm\uff5e14:30pm<br \/>\n\u5834\u6240\uff1a\u6176\u61c9\u7fa9\u587e\u5927\u5b66\u65e5\u5409\u30ad\u30e3\u30f3\u30d1\u30b9\u5354\u751f\u9928<br \/>\n\u30c6\u30fc\u30de\uff1a\u300cA Framework for SDGs, Regional Health and Global Health\u300d<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9 \u65e5\u5370\u4eba\u6750\u80b2\u6210\u30fb\u4ea4\u6d41\u30a4\u30cb\u30b7\u30a2\u30c6\u30a3\u30d6\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong><u>1-2. HIM-WG<\/u><\/strong><strong><u>\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e743\u670813\u65e5\uff08\u6c34\uff097:00pm\uff5e9:00pm<br \/>\n\u5834\u6240\uff1a\u682a\u5f0f\u4f1a\u793eMICIN\u4f1a\u8b70\u5ba4\uff08\u6771\u4eac\u90fd\u5343\u4ee3\u7530\u533a\u5927\u624b\u753a2-6-2 \u65e5\u672c\u30d3\u30eb13\u968e\uff09<br \/>\n\u6982\u8981\uff1a\u300chealthcare business trend 2019\u300d<br \/>\nCSA Summit 2019\u5831\u544a\u306a\u3069<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong><u>1-3. Medtec Japan 2019<\/u><\/strong><strong><u>\uff0f\u30d5\u30a1\u30fc\u30deIT\uff06\u30c7\u30b8\u30bf\u30eb\u30a8\u30ad\u30b9\u30dd 2019\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u4e3b\u50ac\uff1aUBM\u30b8\u30e3\u30d1\u30f3<br \/>\n\u5f8c\u63f4\uff1a\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u65e5\u6642\uff1a2019\u5e743\u670818\u65e5\uff08\u6708\uff099:30am\uff5e10:15am<br \/>\n\u5834\u6240\uff1a\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8<br \/>\n\u6982\u8981\uff1a\u300cIoT\u3001AI\u3068\u4eca\u5f8c\u306e\u533b\u7642\u6a5f\u5668\u300d\uff08Medtec Japan 2019\uff09<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u7b39\u539f\u82f1\u53f8\u3000\u3000\u3000\u3000\u3000<a href=\"http:\/\/www.medtecjapan.com\/\">http:\/\/www.medtecjapan.com\/<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<br \/>\n<\/strong><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n<\/u><\/strong>2-1-1. <strong><u>CSA IoT and Healthcare Meeting at RSA<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e743\u67085\u65e5\uff08\u706b\uff0911:30am\uff5e1:00pm<br \/>\n\u5834\u6240\uff1aGalvanize San Francisco, 44 Tehama St, San Francisco, 94105<br \/>\n\u6982\u8981\uff1a<br \/>\nThe CSA cordially invites our IoT and HIM WGs to an in-person session during RSAC 2019, lunch will be provided. Topics to be\u3000discussed include (but not limited to) \u2013<\/li>\n<\/ol>\n<ol>\n<li>Brief overviews of\n<ol>\n<li>IoT WG<\/li>\n<li>HIM WG<\/li>\n<\/ol>\n<\/li>\n<li>Discussion of Medical Device and Healthcare IT Joint Security Plan (the \u201cPlan\u201d)\n<ol>\n<li>Online location of the Plan here: lIT Joint Security Plan<\/li>\n<li>Preliminary comments will be discussed at the meeting, please submit comments and concerns by February 22, 2019.<\/li>\n<\/ol>\n<\/li>\n<li>We will also review a recent release from HHS entitled Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).2-1-2. <strong><u>CSA Health Information Management WG Kick-off call<\/u><\/strong><strong><u>\uff08\u7d42\u4e86\uff09<br \/>\n<\/u><\/strong>\u65e5\u6642\uff1a2019\u5e743\u670815\u65e5\uff08\u91d1\uff093:00am\uff5e4:00am<br \/>\n\u5834\u6240\uff1a\u30aa\u30f3\u30e9\u30a4\u30f3(WebEX)<br \/>\n\u30b3\u30fc\u30c7\u30a3\u30cd\u30fc\u30bf\u30fc\uff1aShamun Mahmud (CSA)<br \/>\n\u6982\u8981\uff1a<br \/>\nCurrent Trends in Healthcare\u00a0 &#8211; (Technology Impacts and Influence of Cloud)<\/li>\n<\/ol>\n<ol>\n<li>Focus on Consumerism<\/li>\n<li>Impact of Healthcare Regulation and Restructuring of Financial Risks<\/li>\n<li>Influence of Digitalization \u2013 Open topicHIM Working Group Initiatives explained<br \/>\nRespond to Current documents (uploaded to Basecamp)<\/li>\n<\/ol>\n<ol>\n<li>Medical device and Health IT Joint Security Plan (JSP):\u00a0Review the JSP\u00a0by mid-April.\u00a0 Compile and craft a response<\/li>\n<li>Health Industry Cybersecurity Practices (HICP): Review the HICP\u00a0by mid-July. Compile and craft a response<\/li>\n<\/ol>\n<p>[2019\u5e742\u6708]<\/p>\n<ol>\n<li><strong>\u56fd\u5185\u6d3b\u52d5<\/strong><\/li>\n<\/ol>\n<ul>\n<li><strong><u>\u6176\u61c9\u7fa9\u587e\u5927\u5b66\u7d4c\u55b6\u7ba1\u7406\u7814\u7a76\u79d12018\u5e74\u5ea6\u5927\u548c\u8a3c\u5238\u672a\u6765\u5148\u5c0e\u30c1\u30a7\u30a2\u30b7\u30c3\u30d7\uff08\u7d42\u4e86\uff09<\/u><\/strong><\/li>\n<\/ul>\n<p>\u65e5\u6642\uff1a2019\u5e742\u670824\u65e5\uff08\u65e5\uff09\u5348\u5f8c\u4e88\u5b9a<\/p>\n<p>\u5834\u6240\uff1a\u6176\u61c9\u7fa9\u587e\u5927\u5b66\u65e5\u5409\u30ad\u30e3\u30f3\u30d1\u30b9\u5354\u751f\u9928<\/p>\n<p>\u30c6\u30fc\u30de\uff1a\uff08\u4eee\uff09\u30a4\u30f3\u30c9\u306e\u4fdd\u5065\u533b\u7642\u3068ICT<\/p>\n<p>\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9 \u65e5\u5370\u4eba\u6750\u80b2\u6210\u30fb\u4ea4\u6d41\u30a4\u30cb\u30b7\u30a2\u30c6\u30a3\u30d6\u3000\u7b39\u539f\u82f1\u53f8<\/p>\n<ul>\n<li><strong><u>HIM-WG<\/u><\/strong><strong><u>\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u4e88\u5b9a\uff09<\/u><\/strong><\/li>\n<\/ul>\n<p>\u65e5\u6642\uff1a2019\u5e743\u670813\u65e5\uff08\u6c34\uff09\u5915\u65b9\u4e88\u5b9a<\/p>\n<p>\u5834\u6240\uff1a\u65e5\u672c\u6a4b\u8fd1\u8fba<\/p>\n<p>\u30c6\u30fc\u30de\uff1aCSA Summit 2019\u5831\u544a\u4f1a\u306a\u3069<\/p>\n<ul>\n<li><strong><u>Medtec Japan 2019<\/u><\/strong><strong><u>\uff0f\u30d5\u30a1\u30fc\u30deIT\uff06\u30c7\u30b8\u30bf\u30eb\u30a8\u30ad\u30b9\u30dd 2019\uff08\u4e88\u5b9a\uff09<\/u><\/strong><\/li>\n<\/ul>\n<p>\u4e3b\u50ac\uff1aUBM\u30b8\u30e3\u30d1\u30f3<\/p>\n<p>\u5f8c\u63f4\uff1a\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<\/p>\n<p>\u65e5\u6642\uff1a2019\u5e743\u670818\u65e5\uff08\u6708\uff099:30\uff5e16:30\uff08\u4e88\u5b9a\uff09<\/p>\n<p>\u5834\u6240\uff1a\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8<\/p>\n<p>\u6982\u8981\uff1a\uff08\u4eee\uff09IoT\u3001AI\u3068\u4eca\u5f8c\u306e\u533b\u7642\u6a5f\u5668<\/p>\n<p>\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u7b39\u539f\u82f1\u53f8<\/p>\n<p><a href=\"http:\/\/www.medtecjapan.com\/\">http:\/\/www.medtecjapan.com\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li><strong>\u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/strong><\/li>\n<\/ol>\n<p><strong>2-1. <\/strong><strong>\u3000<u>CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<\/u><\/strong><\/p>\n<p>CSA IoT and Healthcare Meeting at RSA<\/p>\n<p>\u65e5\u6642\uff1a2019\u5e743\u67085\u65e5\uff08\u706b\uff0911:30\uff5e13:00\uff08\u4e88\u5b9a\uff09<\/p>\n<p>\u5834\u6240\uff1aGalvanize San Francisco, 44 Tehama St, San Francisco, 94105<\/p>\n<p>\u6982\u8981\uff1a<\/p>\n<p>The CSA cordially invites our IoT and HIM WGs to an in-person session during RSAC 2019, lunch will be provided. Topics to be discussed include (but not limited to) \u2013<\/p>\n<ol>\n<li>Brief overviews of\n<ol>\n<li>IoT WG<\/li>\n<li>HIM WG<\/li>\n<\/ol>\n<\/li>\n<li>Discussion of Medical Device and Healthcare IT Joint Security Plan (the \u201cPlan\u201d)\n<ol>\n<li>Online location of the Plan here: lIT Joint Security Plan<\/li>\n<li>Preliminary comments will be discussed at the meeting, please submit comments and concerns by February 22, 2019.<\/li>\n<\/ol>\n<\/li>\n<li>We will also review a recent release from HHS entitled Cybersecurity Practices: Managing Threats and Protecting Patients (HICP).<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>2019\u5e741\u6708<\/p>\n<ul>\n<li>1. \u56fd\u5185\u6d3b\u52d5<\/li>\n<li>1-1. \u516c\u958b\u7814\u7a76\u4f1a\u300c\u30a2\u30d3\u30ea\u30c6\u30a3\u5b9f\u8a3c\u90fd\u5e02\u300d\u30ad\u30c3\u30af\u30aa\u30d5\u30bb\u30df\u30ca\u30fc\uff08\u7d42\u4e86\uff09<br \/>\n\u4e3b\u50ac\uff1a\u6cc9\u5927\u6d25\u5e02\uff0f\u30b0\u30ed\u30fc\u30d0\u30eb\u30d8\u30eb\u30b9\u30a4\u30cb\u30b7\u30e3\u30c6\u30a3\u30d6\u95a2\u4fc2\u6a5f\u95a2\u9023\u9023\u7d61\u4f1a\u8b70<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u670815\u65e5\uff08\u706b\uff09\u5348\u5f8c01:00\uff5e04:55<br \/>\n\u5834\u6240\uff1a\u6cc9\u5927\u6d25\u5e02\u30c6\u30af\u30b9\u30d4\u30a2\u5927\u962a\u5927\u30db\u30fc\u30eb<br \/>\n\uff08\u5927\u962a\u5e9c\u6cc9\u5927\u6d25\u5e02\u65ed\u753a22-45\uff09<br \/>\n\u6982\u8981\uff1a\u300c\u30a4\u30f3\u30c9\u306e\u4e88\u9632\u4fdd\u5065\u3068ICT\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u300d<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u65e5\u5370\u4eba\u6750\u80b2\u6210\u30fb\u4ea4\u6d41\u30a4\u30cb\u30b7\u30e3\u30c6\u30a3\u30d6\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<li>1-2. \u5730\u57df\u9593\u4ea4\u6d41\u2f40\u63f4\uff08RIT\uff09 \u4e8b\u696d \u7b2c\u2f06\u56de \u56fd\u5185\u7814\u7a76\u4f1a \u300c\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u5206\u91ce\u306e\u2f76\u56fd\u5e02\u5834\u53c2\u2f0a\u306b\u3064\u3044\u3066\u300d\uff08\u7d42\u4e86\uff09<br \/>\n\u4e3b\u50ac\uff1a\u5927\u962a\u5e9c\u5546\u2f2f\u52b4\u50cd\u90e8\uff0f\u30b8\u30a7\u30c8\u30ed\u2f24\u962a\u672c\u90e8<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u2f4925\u2f47\uff08\u2fa6\uff09\u5348\u5f8c2\u664200\u5206\u301c\u5348\u5f8c4\u664230\u5206<br \/>\n\u5834\u6240\uff1a\u30b8\u30a7\u30c8\u30ed\u2f24\u962a\u672c\u90e8 \u30bb\u30df\u30ca\u30fc\u30eb\u30fc\u30e0<br \/>\n\uff08\u2f24\u962a\u5e02\u4e2d\u592e\u533a\u5b89\u2f1f\u753a2-3-13 \u2f24\u962a\u56fd\u969b\u30d3\u30eb\u30c7\u30a3\u30f3\u30b029\u968e\uff09<br \/>\n\u6982\u8981\uff1a\u300c\u2f76\u56fd\u306e\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u5e02\u5834\u306e\u6982\u6cc1\u306b\u3064\u3044\u3066\u300d\u300d<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\uff0f\u5728\u2f47\u2f76\u56fd\u5546\u2f2f\u4f1a\u8b70\u6240\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<li>1-3. \u6176\u61c9\u7fa9\u587e\u5927\u5b66\u7d4c\u55b6\u7ba1\u7406\u7814\u7a76\u79d12018\u5e74\u5ea6\u5927\u548c\u8a3c\u5238\u672a\u6765\u5148\u5c0e\u30c1\u30a7\u30a2\u30b7\u30c3\u30d7\uff08\u4e88\u5b9a\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e742\u670824\u65e5\uff08\u65e5\uff09\u5348\u5f8c\u4e88\u5b9a<br \/>\n\u5834\u6240\uff1a\u6176\u61c9\u7fa9\u587e\u5927\u5b66\u65e5\u5409\u30ad\u30e3\u30f3\u30d1\u30b9\u5354\u751f\u9928<br \/>\n\u30c6\u30fc\u30de\uff1a\uff08\u4eee\uff09\u30a4\u30f3\u30c9\u306e\u4fdd\u5065\u533b\u7642\u3068ICT<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9 \u65e5\u5370\u4eba\u6750\u80b2\u6210\u30fb\u4ea4\u6d41\u30a4\u30cb\u30b7\u30a2\u30c6\u30a3\u30d6\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<li>1-4. HIM-WG\u6771\u4eac\u52c9\u5f37\u4f1a\uff08\u4e88\u5b9a\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e743\u670813\u65e5\uff08\u6c34\uff09\u5915\u65b9\u4e88\u5b9a<br \/>\n\u5834\u6240\uff1a\u65e5\u672c\u6a4b\u8fd1\u8fba<br \/>\n\u30c6\u30fc\u30de\uff1aCSA Summit 2019\u5831\u544a\u4f1a\u306a\u3069<\/li>\n<li>1-5. Medtec Japan 2019\uff0f\u30d5\u30a1\u30fc\u30deIT\uff06\u30c7\u30b8\u30bf\u30eb\u30a8\u30ad\u30b9\u30dd 2019\uff08\u4e88\u5b9a\uff09<br \/>\n\u4e3b\u50ac\uff1aUBM\u30b8\u30e3\u30d1\u30f3<br \/>\n\uff08\u4eca\u5e74\u5ea6\u3082\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3078\u5f8c\u63f4\u4f9d\u983c\u3042\u308a\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e743\u670818\u65e5\uff08\u6708\uff099:30\uff5e16:30\uff08\u4e88\u5b9a\uff09<br \/>\n\u5834\u6240\uff1a\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8<br \/>\n\u6982\u8981\uff1a\uff08\u4eee\uff09IoT\u3001AI\u3068\u4eca\u5f8c\u306e\u533b\u7642\u6a5f\u5668<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<li>2. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/li>\n<li>2-1. \u3000CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\nHIPAA\u500b\u4eba\u30c7\u30fc\u30bf\u6f0f\u3048\u3044\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u50be\u5411\u306b\u95a2\u3059\u308b\u30c7\u30a3\u30b9\u30ab\u30c3\u30b7\u30e7\u30f3<br \/>\n\uff08\u53c2\u8003\uff09Summary of Recent Healthcare Data Breaches<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li>2018\u5e7412\u6708<\/li>\n<li>1. \u56fd\u5185\u6d3b\u52d5<\/li>\n<li>1-1. \u516c\u958b\u7814\u7a76\u4f1a\u300c\u30a2\u30d3\u30ea\u30c6\u30a3\u5b9f\u8a3c\u90fd\u5e02\u300d\u30ad\u30c3\u30af\u30aa\u30d5\u30bb\u30df\u30ca\u30fc\uff08\u4e88\u5b9a\uff09<br \/>\n\u4e3b\u50ac\uff1a\u6cc9\u5927\u6d25\u5e02\uff0f\u30b0\u30ed\u30fc\u30d0\u30eb\u30d8\u30eb\u30b9\u30a4\u30cb\u30b7\u30e3\u30c6\u30a3\u30d6\u95a2\u4fc2\u6a5f\u95a2\u9023\u9023\u7d61\u4f1a\u8b70<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u670815\u65e5\uff08\u706b\uff09\u5348\u5f8c01:00\uff5e04:55<br \/>\n\u5834\u6240\uff1a\u6cc9\u5927\u6d25\u5e02\u30c6\u30af\u30b9\u30d4\u30a2\u5927\u962a\u5927\u30db\u30fc\u30eb<br \/>\n\uff08\u5927\u962a\u5e9c\u6cc9\u5927\u6d25\u5e02\u65ed\u753a22-45\uff09<br \/>\n\u6982\u8981\uff1a\u300c\u30a4\u30f3\u30c9\u306e\u4e88\u9632\u4fdd\u5065\u3068ICT\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u300d<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u65e5\u5370\u4eba\u6750\u80b2\u6210\u30fb\u4ea4\u6d41\u30a4\u30cb\u30b7\u30e3\u30c6\u30a3\u30d6\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<li>1-2. \u5730\u57df\u9593\u4ea4\u6d41\u2f40\u63f4\uff08RIT\uff09 \u4e8b\u696d \u7b2c\u2f06\u56de \u56fd\u5185\u7814\u7a76\u4f1a \u300c\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u5206\u91ce\u306e\u2f76\u56fd\u5e02\u5834\u53c2\u2f0a\u306b\u3064\u3044\u3066\u300d\uff08\u4e88\u5b9a\uff09<br \/>\n\u4e3b\u50ac\uff1a\u5927\u962a\u5e9c\u5546\u2f2f\u52b4\u50cd\u90e8\uff0f\u30b8\u30a7\u30c8\u30ed\u2f24\u962a\u672c\u90e8<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u2f4925\u2f47\uff08\u2fa6\uff09\u5348\u5f8c2\u664200\u5206\u301c\u5348\u5f8c4\u664230\u5206<br \/>\n\u5834\u6240\uff1a\u30b8\u30a7\u30c8\u30ed\u2f24\u962a\u672c\u90e8 \u30bb\u30df\u30ca\u30fc\u30eb\u30fc\u30e0<br \/>\n\uff08\u2f24\u962a\u5e02\u4e2d\u592e\u533a\u5b89\u2f1f\u753a2-3-13 \u2f24\u962a\u56fd\u969b\u30d3\u30eb\u30c7\u30a3\u30f3\u30b029\u968e\uff09<br \/>\n\u6982\u8981\uff1a\u300c\u2f76\u56fd\u306e\u30e9\u30a4\u30d5\u30b5\u30a4\u30a8\u30f3\u30b9\u5e02\u5834\u306e\u6982\u6cc1\u306b\u3064\u3044\u3066\u300d\u300d<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\uff0f\u5728\u2f47\u2f76\u56fd\u5546\u2f2f\u4f1a\u8b70\u6240\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<li>1-3. Medtec Japan 2019\uff0f\u30d5\u30a1\u30fc\u30deIT\uff06\u30c7\u30b8\u30bf\u30eb\u30a8\u30ad\u30b9\u30dd 2019\uff08\u4e88\u5b9a\uff09<br \/>\n\u4e3b\u50ac\uff1aUBM\u30b8\u30e3\u30d1\u30f3<br \/>\n\uff08\u4eca\u5e74\u5ea6\u3082\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3078\u5f8c\u63f4\u4f9d\u983c\u3042\u308a\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e743\u670818\u65e5\uff08\u6708\uff099:30\uff5e16:30\uff08\u4e88\u5b9a\uff09<br \/>\n\u5834\u6240\uff1a\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8<br \/>\n\u6982\u8981\uff1a\uff08\u4eee\uff09IoT\u3001AI\u3068\u4eca\u5f8c\u306e\u533b\u7642\u6a5f\u5668<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u7b39\u539f\u82f1\u53f82. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d5<\/li>\n<li>2-1. \u3000CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n2018\u5e7412\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/li>\n<li>2018\u5e7411\u67081. \u56fd\u5185\u6d3b\u52d5<\/li>\n<li>1-1. \u7406\u5316\u5b66\u7814\u7a76\u6240\u3068\u306e\u9023\u643a\u6d3b\u52d5(\u7d42\u4e86)<br \/>\n\u4e3b\u50ac\uff1a\u56fd\u7acb\u7814\u7a76\u958b\u767a\u6cd5\u4eba\u3000\u7406\u5316\u5b66\u7814\u7a76\u6240<br \/>\n\u65e5\u6642\uff1a2018\u5e7411\u670812\u65e5\uff08\u6708\uff09\u5348\u5f8c04:00\uff5e05:00<br \/>\n\u5834\u6240\uff1aiKAfE \uff08\u5065\u5eb7\u201c\u751f\u304d\u6d3b\u201d\u7f85\u91dd\u76e4\u30ea\u30b5\u30fc\u30c1\u30b3\u30f3\u30d7\u30ec\u30c3\u30af\u30b9\uff08\u4e09\u5bae\u62e0\u70b9\uff09\uff09<br \/>\n\u5175\u5eab\u770c\u795e\u6238\u5e02\u4e2d\u592e\u533a\u96f2\u4e95\u901a5-3-1 \u30b5\u30f3\u30d1\u30eb\uff17\u968e\uff3bJR\u4e09\u30ce\u5bae\u99c5\u3001\u6771\u53e3\u5f92\u6b69\uff3d<br \/>\n\u6982\u8981\uff1a\u30c7\u30b8\u30bf\u30eb\u30d8\u30b9\u3068\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6700\u65b0\u56fd\u969b\u52d5\u5411\u306b\u3064\u3044\u3066<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<li>1-2. \u516c\u958b\u7814\u7a76\u4f1a\u300c\u30a2\u30d3\u30ea\u30c6\u30a3\u5b9f\u8a3c\u90fd\u5e02\u300d\u30ad\u30c3\u30af\u30aa\u30d5\u30bb\u30df\u30ca\u30fc\uff08\u4e88\u5b9a\uff09<br \/>\n\u4e3b\u50ac\uff1a\u6cc9\u5927\u6d25\u5e02\uff0f\u30b0\u30ed\u30fc\u30d0\u30eb\u30d8\u30eb\u30b9\u30a4\u30cb\u30b7\u30e3\u30c6\u30a3\u30d6\u95a2\u4fc2\u6a5f\u95a2\u9023\u9023\u7d61\u4f1a\u8b70<br \/>\n\u65e5\u6642\uff1a2019\u5e741\u670815\u65e5\uff08\u706b\uff09\u5348\u5f8c01:00\uff5e04:55<br \/>\n\u5834\u6240\uff1a\u6cc9\u5927\u6d25\u5e02\u30fb\u30c6\u30af\u30b9\u30d4\u30a2\u5927\u962a3\u968e301\u4f1a\u8b70\u5ba4<br \/>\n\u6982\u8981\uff1a\u300c\u30a4\u30f3\u30c9\u306e\u4e88\u9632\u4fdd\u5065\u3068ICT\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u300d<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9<br \/>\n\u65e5\u5370\u4eba\u6750\u80b2\u6210\u30fb\u4ea4\u6d41\u30a4\u30cb\u30b7\u30e3\u30c6\u30a3\u30d6\u3000\u7b39\u539f\u82f1\u53f8<\/li>\n<li>1-3. Medtec Japan 2019\uff08\u4e88\u5b9a\uff09<br \/>\n\u4e3b\u50ac\uff1aUBM\u30b8\u30e3\u30d1\u30f3\uff08Healthcare IT\u30b8\u30e3\u30d1\u30f3\u306e\u4e3b\u50ac\u8005\uff09<br \/>\n\u65e5\u6642\uff1a2019\u5e743\u670818\u65e5\uff08\u6708\uff099:30\uff5e16:30\uff08\u4e88\u5b9a\uff09<br \/>\n\u5834\u6240\uff1a\u6771\u4eac\u30d3\u30c3\u30b0\u30b5\u30a4\u30c8<br \/>\n\u6982\u8981\uff1a\uff08\u4eee\uff09IoT\u3001AI\u3068\u4eca\u5f8c\u306e\u533b\u7642\u6a5f\u5668<br \/>\n\u8b1b\u5e2b\uff1a\u4e00\u822c\u793e\u56e3\u6cd5\u4eba\u65e5\u672c\u30af\u30e9\u30a6\u30c9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30e9\u30a4\u30a2\u30f3\u30b9\u3000\u7b39\u539f\u82f1\u53f82. \u30b0\u30ed\u30fc\u30d0\u30eb\u6d3b\u52d52-1. \u3000CSA\u30b0\u30ed\u30fc\u30d0\u30ebHIM WG\u306e\u6d3b\u52d5<br \/>\n2018\u5e7411\u6708\u306e\u6d3b\u52d5\u306f\u7279\u306b\u306a\u3057<\/li>\n<li>2018\u5e7410\u6708<br \/>\n<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2018\/12\/mobile_health_1810.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e749\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201809.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e748\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201808.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e747\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201807.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e746\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201806.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e745\u6708<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201805.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e744\u6708<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201804.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e743\u6708<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201803.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e742\u6708<br \/>\n<a href=\"https:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201802.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2018\u5e741\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201801.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e7412\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201712.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e7411\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201711.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e7410\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201710.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e749\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/201709.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e748\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20178.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e747\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20177.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e746\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20176.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e745\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20175.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e744\u6708<br \/>\n<a href=\"http:\/\/cloudsecurityalliance.jp\/WG_PUB\/Mobile_WG\/20174.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a><\/li>\n<li>2017\u5e743\u6708\u4ee5\u524d\u306e\u6d3b\u52d5\u5831\u544a\u306f<a href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/wp-content\/uploads\/2018\/12\/mobile_health_1810.pdf\">\u3053\u3061\u3089\u3092\u53c2\u7167<\/a>\u3057\u3066\u304f\u3060\u3055\u3044\u3002<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>\u5065\u5eb7\u533b\u7642\u60c5\u5831\u7ba1\u7406\u30e6\u30fc\u30b6\u30fc\u30ef\u30fc\u30ad\u30f3\u30b0\u30b0\u30eb\u30fc\u30d7\u306e\u30da\u30fc\u30b8 <a class=\"mh-excerpt-more\" href=\"https:\/\/www.cloudsecurityalliance.jp\/site\/?page_id=4094\" title=\"Healthcare_WG\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"parent":1155,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4094","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/4094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4094"}],"version-history":[{"count":77,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/4094\/revisions"}],"predecessor-version":[{"id":20421,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/4094\/revisions\/20421"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=\/wp\/v2\/pages\/1155"}],"wp:attachment":[{"href":"https:\/\/www.cloudsecurityalliance.jp\/site\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}