Cover Image for Operational Security: Malware Management
Cover Image for Operational Security: Malware Management
373 Going

Operational Security: Malware Management

Hosted by Ghana Health Service ICT Department
Virtual
Registration
Welcome! To join the event, please register below.
About Event

Information Security plays a critical role in the health sector due to the volume and sensitivity of data routinely handled in the delivery of healthcare services. The Health Sector has been designated as a Critical Information Infrastructure (CII) by the Cyber Security Authority (CSA), as any disruption to its systems, networks, processes, or information assets could have a devastating impact on national security and the social and economic well-being of the population.

As a public health institution, the Ghana Health Service (GHS) is responsible for safeguarding Protected Health Information (PHI) and ensuring the confidentiality, integrity, and availability of its digital systems and data. In response to this responsibility, GHS has developed and is implementing an Information Security Policy, Strategy, and Standards to guide, direct, and protect its ICT ecosystem.

These policies apply to all digital assets of the Service and are binding on all staff and third-party service providers. They are designed to proactively identify and mitigate risks that could compromise system availability, data integrity, confidentiality, service delivery, and the Service's reputation.

Purpose of the Webinar

This webinar forms part of the ongoing dissemination of the GHS Information Security Policies and focuses specifically on Operational Security (Section 4.7), with emphasis on Malware Management, Detection, and Prevention.

Webinar Objective

The objective of this webinar is to strengthen staff awareness and operational capacity to implement the Ghana Health Service Operational Security Policy by promoting compliance, continuous monitoring, and effective prevention of technical vulnerabilities, while ensuring the security and privacy of computer systems and networks in accordance with applicable data protection and cybersecurity regulations.

Presentation Highlights

  • Overview of Operational Security controls within the GHS Information Security Policy

  • Understanding malware threats and their impact on health sector systems

  • GHS requirements for anti-malware software, firewalls, and intrusion prevention systems (IPS)

  • Malware detection, isolation, and incident escalation procedures

  • Controls on unauthorised software, devices, and UPnP access

  • Role of logging, monitoring, audits, and vulnerability management in securing systems

  • Staff roles and responsibilities in ensuring compliance with data protection and cybersecurity regulations

Live Demonstration

  • A live practical demonstration will be conducted

For more inquiries, call Gideon +233 55 432 8935 or Benjamin +233 24 124 6642

373 Going