Collaborative Approaches for Medical Device and Healthcare Cybersecurity; Public Workshop; Request for Comments, 56814-56816 [2014-22515]

Download as PDF 56814 Federal Register / Vol. 79, No. 184 / Tuesday, September 23, 2014 / Notices V. Transcripts As soon as possible after a transcript of the public meeting is available, it will be accessible at https:// www.regulations.gov. It may be viewed at the Division of Dockets Management (see ADDRESSES). A transcript will also be available in either hardcopy or on CD–ROM, after submission of a Freedom of Information request. Written requests are to be sent to the Division of Freedom of Information (ELEM– 1029), Food and Drug Administration, 12420 Parklawn Dr., Element Bldg., Rockville, MD 20857. mstockstill on DSK4VPTVN1PROD with NOTICES VI. References The following references have been placed on display in the Division of Dockets Management (see ADDRESSES) and may be seen between 9 a.m. and 4 p.m., Monday through Friday. (FDA has verified the Web site addresses, but FDA is not responsible for any subsequent changes to the Web sites after this document publishes in the Federal Register.) 1. CDC, ‘‘Opioids Drive Continued Increase in Drug Overdose Deaths’’, 2013, available at https://www.cdc.gov/media/releases/2013/ p0220_drug_overdose_deaths.html. 2. SAMHSA, Center for Behavioral Health Statistics and Quality. Treatment Episode Data Set (TEDS): 2001–2011. National Admissions to Substance Abuse Treatment Services. BHSIS Series S–65, HHS Publication No. (SMA) 13–4772. Rockville, MD, 2013, available at https://www.samhsa. gov/data/2k13/TEDS2011/TEDS2011N.pdf. 3. SAMHSA, Center for Behavioral Health Statistics and Quality, ‘‘Drug Abuse Warning Network,’’ 2011, available at https://samhsa. gov/data/dawn/nations/Nation_2011_ AllMA.xls. 4. SAMHSA, ‘‘Results from the 2012 National Survey on Drug Use and Health,’’ detailed table 1.1A, NSDUH Series H–46, HHS Publication No. (SMA) 13–4795. Rockville, MD, 2013, available at https://www. samhsa.gov/data/NSDUH/2012SummNat FindDetTables/NationalFindings/NSDUH results2012.pdf. 5. Institute of Medicine, ‘‘Relieving Pain in America: A Blueprint for Transforming Prevention, Care, Education, and Research,’’ available at https://www.iom.edu/Reports/ 2011/Relieving-Pain-in-America-A-Blueprintfor-Transforming-Prevention-Care-EducationResearch.aspx. 6. CDC, ‘‘Vital Signs: Overdoses of Prescription Opioid Pain Relievers—United States, 1999–2008,’’ available at https://www. cdc.gov/mmwr/preview/mmwrhtml/ mm6043a4.htm. 7. Department of Health and Human Services, ‘‘Addressing Prescription Drug Abuse in the United States—Current Activities and Future Opportunities,’’ available at https://www.cdc.gov/Homeand RecreationalSafety/pdf/HHS_Prescription_ Drug_Abuse_Report_09.2013.pdf. 8. ‘‘Draft Guidance for Industry: AbuseDeterrent Opioids—Evaluation and VerDate Sep<11>2014 17:55 Sep 22, 2014 Jkt 232001 Labeling,’’ January 2013, available at https:// www.fda.gov/downloads/Drugs/Guidance ComplianceRegulatoryInformation/ Guidances/UCM334743.pdf. 9. Janet Woodcock, M.D., letter to Center for Lawful Access and Abuse Deterrence et al., dated October 25, 2013, in Docket No. FDA–2013–P–0703, available at https:// www.regulations.gov/#!documentDetail;D= FDA-2013-P-0703-0004. Dated: September 17, 2014. Leslie Kux, Assistant Commissioner for Policy. [FR Doc. 2014–22514 Filed 9–22–14; 8:45 am] BILLING CODE 4164–01–P DEPARTMENT OF HEALTH AND HUMAN SERVICES Food and Drug Administration [Docket No. FDA–2014–N–1286] Collaborative Approaches for Medical Device and Healthcare Cybersecurity; Public Workshop; Request for Comments AGENCY: Food and Drug Administration, HHS. Notice of public workshop; request for comments. ACTION: The Food and Drug Administration (FDA) is announcing the following public workshop entitled ‘‘Collaborative Approaches for Medical Device and Healthcare Cybersecurity’’. FDA, in collaboration with other stakeholders within the Department of Health and Human Services (HHS) and the Department of Homeland Security (DHS), seeks broad input from the Healthcare and Public Health (HPH) Sector on medical device and healthcare cybersecurity. The vision for this public workshop is to catalyze collaboration among all HPH stakeholders. Participants will identify barriers to promoting cooperation; discuss innovative strategies to address challenges that may jeopardize critical infrastructure; and enable proactive development of analytical tools, processes, and best practices by the stakeholder community in order to strengthen medical device cybersecurity. Dates and Times: The public workshop will be held on October 21 and 22, 2014, from 9 a.m. to 5 p.m. Location: The public workshop will be held at the National Intellectual Property Rights Coordination Center Auditorium, 2451 Crystal Dr., suite 200, Arlington, VA 22202. Entrance for the public workshop participants is through the main doors which face Crystal Drive. Upon arrival at the facility, PO 00000 Frm 00076 Fmt 4703 Sfmt 4703 participants should visit the registration table to check in. For parking, participants may choose from a number of pay garages, including one directly beneath the facility. Contact Person: Suzanne Schwartz, Center for Devices and Radiological Health, Food and Drug Administration, 10903 New Hampshire Ave., Bldg. 66, Rm. 5418, Silver Spring, MD 20993, 301–796–6937, FAX: 301–847–8510, email: Suzanne.Schwartz@fda.hhs.gov. Registration: Registration is free and available on a first-come, first-served basis. Persons interested in attending this public workshop must register online by 4 p.m., October 14, 2014. Early registration is recommended because facilities are limited and, therefore, FDA may limit the number of participants from each organization. If time and space permit, onsite registration on the day of the public workshop will be provided beginning at 8:30 a.m. If you need special accommodations due to a disability, please contact Susan Monahan, 301–796–5661, email: Susan.Monahan@fda.hhs.gov, no later than October 15, 2014. To register for the public workshop, please visit FDA’s Medical Devices News & Events—Workshops & Conferences calendar at https:// www.fda.gov/MedicalDevices/News Events/WorkshopsConferences/ default.htm. (Select this public workshop from the posted events list.) Please provide complete contact information for each attendee, including name, title, affiliation, address, email, and telephone number. Those without Internet access should contact Suzanne Schwartz to register (see Contact Person). Registrants will receive confirmation after they have been accepted. You will be notified if you are on a waiting list. Streaming Webcast of the Public Workshop: This public workshop will also be Webcast. Persons interested in viewing the Webcast must register online by 4 p.m., October 14, 2014. Early registration is recommended because Webcast connections are limited. Organizations are requested to register all participants, but to view using one connection per location. Webcast participants will be sent technical system requirements after registration and will be sent connection access information after October 16, 2014. Most updated browsers will support the Webcast. Comments: FDA is holding this public workshop to obtain information on medical device cybersecurity. In order to permit the widest possible opportunity to obtain public comment, E:\FR\FM\23SEN1.SGM 23SEN1 Federal Register / Vol. 79, No. 184 / Tuesday, September 23, 2014 / Notices mstockstill on DSK4VPTVN1PROD with NOTICES FDA is soliciting either electronic or written comments on all aspects of the public workshop topics, regardless of attendance at the public workshop. The deadline for submitting comments related to this public workshop is November 24, 2014. Regardless of attendance at the public workshop, interested persons may submit either electronic comments regarding this document to https:// www.regulations.gov or written comments to the Division of Dockets Management (HFA–305), Food and Drug Administration, 5630 Fishers Lane, Rm. 1061, Rockville, MD 20852. It is only necessary to send one set of comments. Identify comments with the docket number found in brackets in the heading of this document. In addition, when responding to specific questions as outlined in section III of this document, please identify the question number you are addressing. Received comments may be seen in the Division of Dockets Management between 9 a.m. and 4 p.m., Monday through Friday, and will be posted to the docket at https:// www.regulations.gov. Transcripts: Please be advised that as soon as a transcript is available, it will be accessible at https:// www.regulations.gov. It may be viewed at the Division of Dockets Management (see Comments). A transcript will also be available in either hardcopy or on CD–ROM, after submission of a Freedom of Information request. Written requests are to be sent to the Division of Freedom of Information (ELEM– 1029), Food and Drug Administration, 12420 Parklawn Dr., Element Bldg., Rockville, MD 20857. A link to the transcripts will also be available approximately 45 days after the public workshop on the Internet at https://www. fda.gov/MedicalDevices/NewsEvents/ WorkshopsConferences/default.htm. (Select this public workshop from the posted events list). SUPPLEMENTARY INFORMATION: I. Background In February 2013, the President issued Executive Order 13636, ‘‘Improving Critical Infrastructure Cybersecurity,’’ recognizing that resilient infrastructure is essential to preserving national security, economic stability, and public health and safety in the United States (Ref. 1). Executive Order 13636 states that cyber threats to national security are among the most serious, so stakeholders must enhance the cybersecurity and resilience of critical infrastructure. This includes the HPH Sector. Furthermore, Presidential Policy Directive (P.P.D.) 21 tasks Federal Government entities to strengthen the VerDate Sep<11>2014 17:55 Sep 22, 2014 Jkt 232001 security and resilience of critical infrastructure against physical and cyber threats such that these efforts reduce vulnerabilities, minimize consequences, and identify and disrupt threats (Ref. 2). Moreover, P.P.D. 21 encourages all public and private owners and operators to share responsibility in achieving these outcomes. By convening this public meeting, FDA and its workshop partners strive to engage all stakeholders in HPH. These stakeholders include, but are not limited to: medical device manufacturers; healthcare facilities and personnel (e.g., healthcare providers, biomedical engineers, IT system administrators); professional and trade organizations (including medical device cybersecurity consortia); patient groups; insurance providers; cybersecurity researchers; local, State, and Federal Governments; and information security firms. Executive Order 13636 and P.P.D. 21 together serve as a call to action for promoting the cybersecurity of the Nation’s critical infrastructure. The National Institute of Standards and Technology (NIST) developed the ‘‘Framework for Improving Critical Infrastructure Cybersecurity’’ (‘‘Framework’’) with collective input from government agencies and the private sector to address Executive Order 13636’s call for a voluntary, riskbased approach, harnessing a set of industry standards and best practices to manage cybersecurity risks (Ref. 3). P.P.D. 21 identifies critical sectors within the United States and charges each with adapting and implementing the Framework. HHS, as lead for the HPH Sector, seeks to adapt the Framework across its workspace. Developing a common lexicon is critical to this public-private collaboration to address and manage medical device cybersecurity risks. This workshop is an integral step towards the HPH Sector’s collective understanding of the Framework and how it might be adapted to address the unique medical device cybersecurity needs and challenges within the sector. If exploited, cyber vulnerabilities may result in medical device malfunction, disruption of healthcare services including treatment interventions, inappropriate access to patient information, or compromised electronic health record data integrity. Such outcomes could have a profound impact on patient care and safety. As devices become more connected and interoperable, the threat potential increases. Now, rather than impacting a single device or single system, multiple devices or an entire hospital network PO 00000 Frm 00077 Fmt 4703 Sfmt 4703 56815 may be compromised. Addressing medical device cybersecurity requires recognizing interoperability and interconnectivity. Therefore, enhancing security and resilience entails designing healthcare systems for seamless integration. Such integration will foster innovative and interoperable medical devices that protect and improve patient health and safety. Advancing medical device cybersecurity measures within the HPH Sector relies upon a ‘whole of community’ approach that will require acceptance of a ‘shared ownership and shared responsibility’ model. The objectives of such a model are twofold: (1) To seek solutions that incentivize businesses to adopt best practices and industry standards to be included in product design and systems architecture, and (2) to foster stakeholder collaboration such that emerging threat and vulnerability information is readily shared. This effort requires breaking down barriers and building trust between stakeholders. Ultimately, this effort will facilitate a forum to implement HPH cyber vulnerability and threat management. II. Topics for Discussion at the Public Workshop The public workshop sessions will incorporate the following general themes: • Envisioning a collaborative environment for information sharing and developing a shared risk-assessment framework using a common lexicon; • Overcoming barriers (perceived and real) to create a community of ‘shared ownership and shared responsibility’ within the HPH Sector to increase medical device cybersecurity; • Gaining situational awareness of the current cyber threats to the HPH Sector, especially to medical devices; • Identifying cybersecurity gaps and challenges, especially end-of-life support for legacy devices and interconnectivity of medical devices; • Adapting and implementing the Framework to support management of cybersecurity risks involving medical devices; • Developing tools and standards to build a comprehensive cybersecurity program to meet the unique needs of the sector’s critical infrastructure, including medical devices; • Leveraging the technical subject matter expertise of the cybersecurity researcher community working with HPH stakeholders to identify, assess, and mitigate vulnerabilities; and • Building potential solutions: Exploring collaborative models to gather diverse experts and establish medical E:\FR\FM\23SEN1.SGM 23SEN1 56816 Federal Register / Vol. 79, No. 184 / Tuesday, September 23, 2014 / Notices device security benchmarks which are continuously validated. DEPARTMENT OF HEALTH AND HUMAN SERVICES III. Questions for Consideration Food and Drug Administration FDA also requests HPH Sector stakeholders to provide perspective on the following: 1. Are stakeholders aware of the ‘‘Framework for Improving Critical Infrastructure Cybersecurity’’? If so, how might we adapt/translate the Framework to meet the medical device cybersecurity needs of the HPH Sector? 2. How can we establish partnerships within the HPH Sector to quickly identify, analyze, communicate, and mitigate cyber threats and medical device security vulnerabilities? 3. How might the stakeholder community create incentives to encourage sharing information about medical device cyber threats and vulnerabilities? 4. What lessons learned, case studies, and best practices (from within and external to the sector) might incentivize innovation in medical device cybersecurity for the HPH Sector? What are the cybersecurity gaps from each stakeholder’s perspective: Knowledge, leadership, process, technology, risk management, or others? and, 5. How do HPH stakeholders strike the balance between the need to share health information and the need to restrict access to it? The deadline for submitting answers to these questions for consideration and any other additional comments on the proposed workshop topics is October 7, 2014. [Docket No. FDA–2013–N–0502] mstockstill on DSK4VPTVN1PROD with NOTICES IV. References 1. Executive Order 13636, ‘‘Improving Critical Infrastructure Cybersecurity,’’ Feb. 19, 2013, available at https:// www.gpo.gov/fdsys/pkg/FR-2013-02-19/ pdf/2013-03915.pdf. 2. Presidential Policy Directive 21, ‘‘Critical Infrastructure Security and Resilience,’’ Feb. 12, 2013, available at https:// www.whitehouse.gov/the-press-office/ 2013/02/12/presidential-policy-directivecritical-infrastructure-security-and-resil. 3. National Institute of Standards and Technology (NIST), ‘‘Framework for Improving Critical Infrastructure Cybersecurity,’’ version 1, Feb. 12, 2014, available at https://www.nist.gov/ cyberframework/upload/cybersecurityframework-021214-final.pdf. Dated: September 17, 2014. Leslie Kux, Assistant Commissioner for Policy. [FR Doc. 2014–22515 Filed 9–22–14; 8:45 am] BILLING CODE 4164–01–P VerDate Sep<11>2014 17:55 Sep 22, 2014 Jkt 232001 Report on the Standardization of Risk Evaluation and Mitigation Strategies; Availability AGENCY: Food and Drug Administration, HHS. ACTION: Notice; request for comments. The Food and Drug Administration (FDA) is announcing the availability of a draft report entitled ‘‘Standardizing and Evaluating Risk Evaluation and Mitigation Strategies (REMS)’’. This report describes the Agency’s findings concerning strategies to standardize risk evaluation and mitigation strategies (REMS), where appropriate, with the goal of reducing the burden of implementing REMS on practitioners, patients, and others in various health care settings. As part of the reauthorization of the Prescription Drug User Fee Act (PDUFA), FDA has committed to standardizing REMS to better integrate them into the existing and evolving health care system. FDA is publishing this report to allow the public to provide comment on the report as it relates to PDUFA. DATES: Submit either electronic or written comments by November 24, 2014. SUMMARY: Submit written requests for single copies of the draft report to the Division of Drug Information, Center for Drug Evaluation and Research, Food and Drug Administration, 10903 New Hampshire Ave., Bldg. 51, Rm. 2201, Silver Spring, MD 20993–0002. Send one self-addressed adhesive label to assist that office in processing your requests. See the SUPPLEMENTARY INFORMATION section for electronic access to the draft report. Submit electronic comments to https://www.regulations.gov. Submit written comments to the Division of Dockets Management (HFA–305), Food and Drug Administration, 5630 Fishers Lane, Rm. 1061, Rockville, MD 20852. Identify comments with the docket number found in brackets in the heading of this document. FOR FURTHER INFORMATION CONTACT: Richard Currey, Center for Drug Evaluation and Research, Food and Drug Administration, 10903 New Hampshire Ave., Bldg. 51, Rm. 6125, Silver Spring, MD 20993–0002, 301– 796–3918, FAX: 301–595–7910, email: REMS_Standardization@fda.hhs.gov; or Adam Kroetsch, Center for Drug ADDRESSES: PO 00000 Frm 00078 Fmt 4703 Sfmt 4703 Evaluation and Research, Food and Drug Administration, 10903 New Hampshire Ave., Bldg. 51, Rm. 1192, Silver Spring, MD 20993–0002; 301– 796–3842, FAX: 301–847–8443, email: REMS_Standardization@fda.hhs.gov. SUPPLEMENTARY INFORMATION: I. Background FDA is announcing the availability of a draft report entitled ‘‘Standardizing and Evaluating Risk Evaluation and Mitigation Strategies (REMS).’’ This report describes the Agency’s findings concerning strategies to standardize REMS, where appropriate, with the goal of reducing the burden on practitioners, patients, and others in various health care settings. The Food and Drug Administration Amendments Act of 2007 (Pub. L. 110–85), enacted on September 27, 2007, established FDA’s authority to require REMS for prescription drug and biological products when it determines that such a strategy is necessary to ensure that the benefits of a drug outweigh the risks. Since that time, REMS have become a key tool in augmenting FDA’s drug safety capacities. The Food and Drug Administration Safety and Innovation Act (FDASIA) (Pub. L. 112–144), enacted on July 9, 2012, amended FDA’s REMS authorities and strengthened the Agency’s ability to safeguard and advance public health. Among other things, FDASIA reauthorized the Prescription Drug User Fee Act (known as ‘‘PDUFA V,’’ reflecting the fifth reauthorization of PDUFA). As part of its PDUFA V commitments, FDA agreed, among other things, to ‘‘measure the effectiveness of REMS and standardize and better integrate REMS into the health care system.’’ To this end, ‘‘FDA will . . . continue to develop techniques to standardize REMS and with stakeholder input seek to integrate them into the existing and evolving (e.g., increasingly electronic) health care system.’’ FDA also agreed to hold one or more public meetings to explore strategies to standardize REMS, where appropriate, with the goal of reducing the burden of implementing REMS on practitioners, patients, and others in various health care settings, and to issue a report of the Agency’s findings identifying at least one priority project with a work plan for project completion in the areas of pharmacy systems, prescriber education, providing benefitrisk information to patients, and practice settings. FDA held a 2-day public meeting on REMS Standardization and Assessment on July 25–26, 2013, on approaches to standardizing REMS and better E:\FR\FM\23SEN1.SGM 23SEN1

Agencies

[Federal Register Volume 79, Number 184 (Tuesday, September 23, 2014)]
[Notices]
[Pages 56814-56816]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2014-22515]


-----------------------------------------------------------------------

DEPARTMENT OF HEALTH AND HUMAN SERVICES

Food and Drug Administration

[Docket No. FDA-2014-N-1286]


Collaborative Approaches for Medical Device and Healthcare 
Cybersecurity; Public Workshop; Request for Comments

AGENCY: Food and Drug Administration, HHS.

ACTION: Notice of public workshop; request for comments.

-----------------------------------------------------------------------

    The Food and Drug Administration (FDA) is announcing the following 
public workshop entitled ``Collaborative Approaches for Medical Device 
and Healthcare Cybersecurity''. FDA, in collaboration with other 
stakeholders within the Department of Health and Human Services (HHS) 
and the Department of Homeland Security (DHS), seeks broad input from 
the Healthcare and Public Health (HPH) Sector on medical device and 
healthcare cybersecurity. The vision for this public workshop is to 
catalyze collaboration among all HPH stakeholders. Participants will 
identify barriers to promoting cooperation; discuss innovative 
strategies to address challenges that may jeopardize critical 
infrastructure; and enable proactive development of analytical tools, 
processes, and best practices by the stakeholder community in order to 
strengthen medical device cybersecurity.
    Dates and Times: The public workshop will be held on October 21 and 
22, 2014, from 9 a.m. to 5 p.m.
    Location: The public workshop will be held at the National 
Intellectual Property Rights Coordination Center Auditorium, 2451 
Crystal Dr., suite 200, Arlington, VA 22202. Entrance for the public 
workshop participants is through the main doors which face Crystal 
Drive. Upon arrival at the facility, participants should visit the 
registration table to check in. For parking, participants may choose 
from a number of pay garages, including one directly beneath the 
facility.
    Contact Person: Suzanne Schwartz, Center for Devices and 
Radiological Health, Food and Drug Administration, 10903 New Hampshire 
Ave., Bldg. 66, Rm. 5418, Silver Spring, MD 20993, 301-796-6937, FAX: 
301-847-8510, email: Suzanne.Schwartz@fda.hhs.gov.
    Registration: Registration is free and available on a first-come, 
first-served basis. Persons interested in attending this public 
workshop must register online by 4 p.m., October 14, 2014. Early 
registration is recommended because facilities are limited and, 
therefore, FDA may limit the number of participants from each 
organization. If time and space permit, onsite registration on the day 
of the public workshop will be provided beginning at 8:30 a.m.
    If you need special accommodations due to a disability, please 
contact Susan Monahan, 301-796-5661, email: Susan.Monahan@fda.hhs.gov, 
no later than October 15, 2014.
    To register for the public workshop, please visit FDA's Medical 
Devices News & Events--Workshops & Conferences calendar at https://www.fda.gov/MedicalDevices/NewsEvents/WorkshopsConferences/default.htm. 
(Select this public workshop from the posted events list.) Please 
provide complete contact information for each attendee, including name, 
title, affiliation, address, email, and telephone number. Those without 
Internet access should contact Suzanne Schwartz to register (see 
Contact Person). Registrants will receive confirmation after they have 
been accepted. You will be notified if you are on a waiting list.
    Streaming Webcast of the Public Workshop: This public workshop will 
also be Webcast. Persons interested in viewing the Webcast must 
register online by 4 p.m., October 14, 2014. Early registration is 
recommended because Webcast connections are limited. Organizations are 
requested to register all participants, but to view using one 
connection per location. Webcast participants will be sent technical 
system requirements after registration and will be sent connection 
access information after October 16, 2014. Most updated browsers will 
support the Webcast.
    Comments: FDA is holding this public workshop to obtain information 
on medical device cybersecurity. In order to permit the widest possible 
opportunity to obtain public comment,

[[Page 56815]]

FDA is soliciting either electronic or written comments on all aspects 
of the public workshop topics, regardless of attendance at the public 
workshop. The deadline for submitting comments related to this public 
workshop is November 24, 2014.
    Regardless of attendance at the public workshop, interested persons 
may submit either electronic comments regarding this document to https://www.regulations.gov or written comments to the Division of Dockets 
Management (HFA-305), Food and Drug Administration, 5630 Fishers Lane, 
Rm. 1061, Rockville, MD 20852. It is only necessary to send one set of 
comments. Identify comments with the docket number found in brackets in 
the heading of this document. In addition, when responding to specific 
questions as outlined in section III of this document, please identify 
the question number you are addressing. Received comments may be seen 
in the Division of Dockets Management between 9 a.m. and 4 p.m., Monday 
through Friday, and will be posted to the docket at https://www.regulations.gov.
    Transcripts: Please be advised that as soon as a transcript is 
available, it will be accessible at https://www.regulations.gov. It may 
be viewed at the Division of Dockets Management (see Comments). A 
transcript will also be available in either hardcopy or on CD-ROM, 
after submission of a Freedom of Information request. Written requests 
are to be sent to the Division of Freedom of Information (ELEM-1029), 
Food and Drug Administration, 12420 Parklawn Dr., Element Bldg., 
Rockville, MD 20857. A link to the transcripts will also be available 
approximately 45 days after the public workshop on the Internet at 
https://www.fda.gov/MedicalDevices/NewsEvents/WorkshopsConferences/default.htm. (Select this public workshop from the posted events list).

SUPPLEMENTARY INFORMATION:

I. Background

    In February 2013, the President issued Executive Order 13636, 
``Improving Critical Infrastructure Cybersecurity,'' recognizing that 
resilient infrastructure is essential to preserving national security, 
economic stability, and public health and safety in the United States 
(Ref. 1). Executive Order 13636 states that cyber threats to national 
security are among the most serious, so stakeholders must enhance the 
cybersecurity and resilience of critical infrastructure. This includes 
the HPH Sector. Furthermore, Presidential Policy Directive (P.P.D.) 21 
tasks Federal Government entities to strengthen the security and 
resilience of critical infrastructure against physical and cyber 
threats such that these efforts reduce vulnerabilities, minimize 
consequences, and identify and disrupt threats (Ref. 2). Moreover, 
P.P.D. 21 encourages all public and private owners and operators to 
share responsibility in achieving these outcomes. By convening this 
public meeting, FDA and its workshop partners strive to engage all 
stakeholders in HPH. These stakeholders include, but are not limited 
to: medical device manufacturers; healthcare facilities and personnel 
(e.g., healthcare providers, biomedical engineers, IT system 
administrators); professional and trade organizations (including 
medical device cybersecurity consortia); patient groups; insurance 
providers; cybersecurity researchers; local, State, and Federal 
Governments; and information security firms.
    Executive Order 13636 and P.P.D. 21 together serve as a call to 
action for promoting the cybersecurity of the Nation's critical 
infrastructure. The National Institute of Standards and Technology 
(NIST) developed the ``Framework for Improving Critical Infrastructure 
Cybersecurity'' (``Framework'') with collective input from government 
agencies and the private sector to address Executive Order 13636's call 
for a voluntary, risk-based approach, harnessing a set of industry 
standards and best practices to manage cybersecurity risks (Ref. 3). 
P.P.D. 21 identifies critical sectors within the United States and 
charges each with adapting and implementing the Framework. HHS, as lead 
for the HPH Sector, seeks to adapt the Framework across its workspace. 
Developing a common lexicon is critical to this public-private 
collaboration to address and manage medical device cybersecurity risks. 
This workshop is an integral step towards the HPH Sector's collective 
understanding of the Framework and how it might be adapted to address 
the unique medical device cybersecurity needs and challenges within the 
sector.
    If exploited, cyber vulnerabilities may result in medical device 
malfunction, disruption of healthcare services including treatment 
interventions, inappropriate access to patient information, or 
compromised electronic health record data integrity. Such outcomes 
could have a profound impact on patient care and safety. As devices 
become more connected and interoperable, the threat potential 
increases. Now, rather than impacting a single device or single system, 
multiple devices or an entire hospital network may be compromised. 
Addressing medical device cybersecurity requires recognizing 
interoperability and interconnectivity. Therefore, enhancing security 
and resilience entails designing healthcare systems for seamless 
integration. Such integration will foster innovative and interoperable 
medical devices that protect and improve patient health and safety.
    Advancing medical device cybersecurity measures within the HPH 
Sector relies upon a `whole of community' approach that will require 
acceptance of a `shared ownership and shared responsibility' model. The 
objectives of such a model are twofold: (1) To seek solutions that 
incentivize businesses to adopt best practices and industry standards 
to be included in product design and systems architecture, and (2) to 
foster stakeholder collaboration such that emerging threat and 
vulnerability information is readily shared. This effort requires 
breaking down barriers and building trust between stakeholders. 
Ultimately, this effort will facilitate a forum to implement HPH cyber 
vulnerability and threat management.

II. Topics for Discussion at the Public Workshop

    The public workshop sessions will incorporate the following general 
themes:
     Envisioning a collaborative environment for information 
sharing and developing a shared risk-assessment framework using a 
common lexicon;
     Overcoming barriers (perceived and real) to create a 
community of `shared ownership and shared responsibility' within the 
HPH Sector to increase medical device cybersecurity;
     Gaining situational awareness of the current cyber threats 
to the HPH Sector, especially to medical devices;
     Identifying cybersecurity gaps and challenges, especially 
end-of-life support for legacy devices and interconnectivity of medical 
devices;
     Adapting and implementing the Framework to support 
management of cybersecurity risks involving medical devices;
     Developing tools and standards to build a comprehensive 
cybersecurity program to meet the unique needs of the sector's critical 
infrastructure, including medical devices;
     Leveraging the technical subject matter expertise of the 
cybersecurity researcher community working with HPH stakeholders to 
identify, assess, and mitigate vulnerabilities; and
     Building potential solutions: Exploring collaborative 
models to gather diverse experts and establish medical

[[Page 56816]]

device security benchmarks which are continuously validated.

III. Questions for Consideration

    FDA also requests HPH Sector stakeholders to provide perspective on 
the following:
    1. Are stakeholders aware of the ``Framework for Improving Critical 
Infrastructure Cybersecurity''? If so, how might we adapt/translate the 
Framework to meet the medical device cybersecurity needs of the HPH 
Sector?
    2. How can we establish partnerships within the HPH Sector to 
quickly identify, analyze, communicate, and mitigate cyber threats and 
medical device security vulnerabilities?
    3. How might the stakeholder community create incentives to 
encourage sharing information about medical device cyber threats and 
vulnerabilities?
    4. What lessons learned, case studies, and best practices (from 
within and external to the sector) might incentivize innovation in 
medical device cybersecurity for the HPH Sector? What are the 
cybersecurity gaps from each stakeholder's perspective: Knowledge, 
leadership, process, technology, risk management, or others? and,
    5. How do HPH stakeholders strike the balance between the need to 
share health information and the need to restrict access to it?
    The deadline for submitting answers to these questions for 
consideration and any other additional comments on the proposed 
workshop topics is October 7, 2014.

IV. References

1. Executive Order 13636, ``Improving Critical Infrastructure 
Cybersecurity,'' Feb. 19, 2013, available at https://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-03915.pdf.
2. Presidential Policy Directive 21, ``Critical Infrastructure 
Security and Resilience,'' Feb. 12, 2013, available at https://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil.
3. National Institute of Standards and Technology (NIST), 
``Framework for Improving Critical Infrastructure Cybersecurity,'' 
version 1, Feb. 12, 2014, available at https://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf.

    Dated: September 17, 2014.
Leslie Kux,
Assistant Commissioner for Policy.
[FR Doc. 2014-22515 Filed 9-22-14; 8:45 am]
BILLING CODE 4164-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.