Expert view

Key questions about cybersecurity in the pharmaceutical industry: Q&A with GlobalData thematic analyst

Credit: Bert van Dijk/Getty images.

Powered by

Wafaa Hasan, MSc, is a senior digital health and thematic analyst in the pharma team at GlobalData’s London office. Her responsibilities involve writing reports and providing insights on digital strategy across disease areas and channels. Prior to working in the digital health team, Wafaa worked in the Thematic Intelligence team at GlobalData, where she contributed to quantitative and qualitative analysis reports on disruptive themes and technologies, with a focus on pharma, healthcare and medical devices sectors.

Lara Virrey: What are the biggest cybersecurity challenges facing pharmaceutical companies today?

Wafaa Hasan: For biopharmaceutical companies, the primary dangers cyberattacks pose are intellectual property (IP) loss and operational disruption. Losing IP and proprietary information erodes their competitive advantage as innovations are stolen. For example, in December 2020, data related to Pfizer and BioNTech’s Covid-19 vaccine was stolen and released online. Meanwhile operational disruption at any stage of the value chain hinders output and ultimately revenue.   

Undefended breaches will always beget reputational damage and litigation risk, and recent regulation punishes the exposure of personal data more severely, so companies involved in handling sensitive personal health data, such as those conducting clinical trials, have to be aware of the dangers.

Lara Virrey: How can pharma companies best defend themselves against cyber threats?  

Wafaa Hasan: Due to the sensitive nature of their research, intellectual property and personal data they handle, there are several practices that pharma companies can use to effectively defend themselves against cyber threats. For instance, pharma companies can conduct regular risk assessments that determine and evaluate any potential weakness and dangers in the organisation’s systems, procedures, and infrastructure. Effective resource allocation and security measure prioritisation will be made possible by this review.   

Pharma companies can also use role-based access controls (RBAC), multi-factor authentication (MFA), and strong passwords to make sure that only authorised users can access sensitive systems.  

Conducting regular training programs for employees is crucial in any pharma organisation to educate employees about common cyber threats, phishing attacks, and encourage employees to report suspicious activities promptly. Another practice is to use security information and event management (SIEM) tools, firewalls, intrusion detection and prevention systems (IDPS), and endpoint protection. These technologies provide proactive defence against cyberattacks by being able to identify and stop threats in real time.  

 Additionally, DevSecOps has been discussed for several years but will be more broadly implemented in development cycles in the coming years. DevSecOps is a software delivery model that involves introducing cybersecurity early in the software development life cycle. This means security is ingrained in the early stages of app development and involves early collaboration between developers and security teams. DevSecOps has many benefits, including improving security posture and integration, faster delivery of applications as security is already ingrained into the application, and reducing costs by identifying potential vulnerabilities and bugs before deployment.

Lara Virrey: How has the nature of cybersecurity threats to the healthcare industry changed in the past two to three years?

Wafaa Hasan: The rush from office-based work to remote working caused by the Covid-19 pandemic significantly increased cyber risk. The increased use of technology such as collaboration tools increased the potential attack surface for hackers, and the high speed of transition required meant that many IT security teams had insufficient time to install adequate security defences. Companies also moved more sensitive operations and information online than before, making attacks more costly.  

Malicious actors took advantage of this environment through cyberattacks such as phishing, ransomware, and supply chain attacks. Companies involved in developing Covid-19 vaccines and therapeutics became targets of cybercriminals looking to steal proprietary information about these products.  

Even after the Covid-19 pandemic, cyber risk is higher than ever, for example, in April 2023 generics drug manufacturer Sun Pharmaceuticals disclosed a ransomware attack compromising its file systems, resulting in the theft of both company and personal data.

Lara Virrey: Is the pace of innovation in security technologies keeping up with evolving threats?  

Wafaa Hasan: Yes, although it is a constant challenge, the rate of innovation in security technology is generally keeping up with changing threats. Cyber dangers are continually changing, with new attack methods, strategies, and flaws appearing all the time. To counter these growing dangers, security technology vendors diligently create new solutions and updates. It's crucial to remember that the cyber threat landscape is complicated and evolving quickly. Attackers frequently outsmart security systems and develop new ways to exploit weaknesses.  

There are several areas where security technologies are evolving. For instance, artificial intelligence (AI and machine learning (ML) are becoming particularly popular for incident response, given the increasing number of cyberattacks organisations must deal with every year. Automating incident response with AI makes it easier to resolve more incidents quickly, reducing the organisation’s downtime and resources required to deal with IT security.   

Behavioural analytics tools can also be used to establish baselines of normal user behaviour and identify anomalous activities that may indicate a security breach.   

Companies rushed to adopt the cloud when the Covid-19 pandemic pushed employees to work from home, which increased the attack surface area and exposed entry points for bad actors. The misconfiguration of security settings that fail to provide adequate security for cloud data is a growing problem in cloud security. Without strong security measures, cyberattackers can target those misconfigurations to steal cloud data.   

Endpoints, or entry points, are end-user devices connected to a network. Examples are laptops, smartphones, or IoT sensors and devices. The need to work remotely during the pandemic caused a proliferation of laptop endpoints connected to the cloud. 5G networks will also increase the proliferation of IoT devices as they provide greater capacity for device connection. However, more endpoints mean more entry points for attackers to exploit. Endpoint protection and zero-trust models help contain attacks and protect the entire network in the event of one endpoint being exploited.

Lara Virrey: Are pharma companies doing enough to protect themselves against cyber threats?   

Wafaa Hasan: In comparison to other industries, news of successful cyberattacks on pharma companies are relatively uncommon. Large-scale attacks such as the NotPetya malware attack in 2017 have been a warning for the industry, with Merck & Co’s estimating that damages from NotPetya amounted to $1.4bn as the company’s supply chain backlogged.   

However, cyberattacks are still increasing in frequency and intensity, so pharma companies need to keep updating and investing in their cybersecurity capabilities, for example through the adoption of zero-trust architecture.   

Companies such as Sanofi and Johnson & Johnson are industry leaders in the theme, investing in comprehensive cybersecurity measures. However, others, such as Shanghai Henlius Biotech and Cadila have been identified as laggards in the cybersecurity theme by GlobalData, and need to do more to protect company operations and sensitive personal data.

GlobalData, the leading provider of industry intelligence, provided the underlying data, research, and analysis used to produce this article.

GlobalData’s Thematic Intelligence uses proprietary data, research, and analysis to provide a forward-looking perspective on the key themes that will shape the future of the world’s largest industries and the organisations within them.

Go to article: Home | Cyber risk is higher than everGo to article: ContentsGo to article: ForewordGo to article: The state of cybersecurity in 2023Go to article: The history of cybersecurityGo to article: PharmaGo to article: The impact of cybersecurity on the pharmaceutical industryGo to article: Case studies: cybersecurity in the pharmaceutical industryGo to article: Latest news: cybersecurity in pharma Go to article: Q&A with GlobalData thematic analystGo to article: Key cybersecurity trends in PharmaGo to article: Cybersecurity in pharma: securing the future Go to article: Deal activity related to cybersecurity in the pharmaceutical industry since 2018Go to article: Cybersecurity hiring trends in the global pharmaceutical industry since 2020Go to article: Cybersecurity patent applications in the global pharma industry since 2020Go to article: MedicalGo to article: Mentions of cybersecurity in pharma industry company filings since 2020 Go to article: The impact of cybersecurity on the medical device industry Go to article: Case studies: cybersecurity in the medical device industryGo to article: Latest news: cybersecurity in medical devicesGo to article: Q&A with GlobalData thematic analystGo to article: Cybersecurity: building resilience into the medical device marketGo to article: Cybersecurity innovation: leading companies in patient identification and accessGo to article: Deal activity related to cybersecurity in the medical devices industry since 201Go to article: Cybersecurity hiring trends in the medical devices industry since 2020Go to article: Cybersecurity patent applications in the global medical devices industry since 2Go to article: Mentions of cybersecurity in medical device industry company filings since 2020Go to article: GlobalData Thematic IntelligenceGo to article: MiningGo to article: The impact of cybersecurity on the mining industryGo to article: Case studies: cybersecurity in the mining industryGo to article: Q&A with GlobalData thematic analystGo to article: Lessons learned from Rio Tinto’s massive cyber-attackGo to article: Leading mining companies in the cybersecurity themeGo to article: Deal activity related to cybersecurity in the mining industry since 2018Go to article: Cybersecurity hiring trends in the global mining industry since 2020Go to article: Cybersecurity patent applications in the global mining industry since 2020Go to article: Mentions of cybersecurity in mining industry company filings since 2020Go to article: Steuler KCH AustraliaGo to article: Steuler KCH Australia Company InsightGo to article: PowerGo to article: The impact of cybersecurity on the power industryGo to article: Case studies: cybersecurity in the power industryGo to article: Zero-trust cybersecurity – decentralised risk, everyone’s consequenceGo to article: Cybersecurity innovation: Leading companies in power distribution system modellingGo to article: Leading power companies in the cybersecurity themeGo to article: Deal activity related to cybersecurity in the power industry since 2018Go to article: Cybersecurity hiring trends in the power industry since 2020Go to article: Cybersecurity patent applications in the global power industry since 2020Go to article: Mentions of cybersecurity in power industry company filings since 2020Go to article: Oil & GasGo to article: The impact of cybersecurity on the oil and gas industryGo to article: Case studies: cybersecurity in the oil and gas industryGo to article: Latest news: cybersecurity in oil and gasGo to article: Q&A with GlobalData thematic analyst    Go to article: Risks, rackets and ransoms: the dark side of cybersecurity threats Go to article: Cybersecurity innovation: leading companies in VPN tunnelling for the oil and gaGo to article: Leading oil and gas companies in the cybersecurity theme Go to article: Deal activity related to cybersecurity in the oil and gas industry since 2018 Go to article: Cybersecurity hiring trends in the global oil and gas industry since 2020 Go to article: Cybersecurity patent applications in the global oil and gas industry since 2020 Go to article: Mentions of cybersecurity in oil and gas industry company filings since 2020 Go to article: DefenceGo to article: The impact of cybersecurity on the defence industryGo to article: Case studies: cybersecurity in the defence industry Go to article: Military cyber security considerations moving to the foreGo to article: Q&A with GlobalData thematic analystGo to article: Maximising cyber capabilities: US DoD's 2023 cyber strategy takes shape Go to article: Leading defence companies in the cybersecurity theme Go to article: Deal activity related to cybersecurity in the aerospace & defence industry since 2018Go to article: Cybersecurity hiring trends in the aerospace & defence industry since 2020 Go to article: Cybersecurity patent applications in the global aerospace & defence industry since 2020 Go to article: Mentions of cybersecurity in aerospace & defence industry company filings since Go to article: Sponsorship opportunitiesGo to article: PackagingGo to article: The impact of cybersecurity on the packaging industryGo to article: Case studies: cybersecurity in the packaging industryGo to article: Latest news: cybersecurity in packaging Go to article: Q&A with GlobalData thematic analystGo to article: Safeguarding the packaging sector against cyber threatsGo to article: Avery Dennison takes leading role in cybersecurity Go to article: Deal activity related to cybersecurity in the packaging industry since 2018Go to article: Cybersecurity hiring trends in the packaging industry since 2020Go to article: Cybersecurity patent applications in the global packaging industry since 2020 Go to article: Mentions of cybersecurity in packaging industry company filings since 2020 Go to article: AutoGo to article: The impact of cybersecurity on the auto industryGo to article: Case studies: cybersecurity in the auto industryGo to article: Latest news: cybersecurity in the auto industryGo to article: Problematic paywalls, dissatisfied customers and rising cyber-threats Go to article: Cybersecurity innovation: leading companies in vehicle anti-theft systemsGo to article: Deal activity related to cybersecurity in the automotive industry since 2018Go to article: Cybersecurity hiring trends in the automotive industry since 2020Go to article: Cybersecurity patent applications in the global automotive industry since 2020Go to article: Mentions of cybersecurity in automotive industry company filings since 2020Go to article: FoodGo to article: The impact of cybersecurity on the consumer goods industryGo to article: Case studies: cybersecurity in the consumer goods industryGo to article: Latest news: cybersecurity in foodGo to article: Leading consumer goods companies in the cybersecurity themeGo to article: Cybersecurity hiring trends in the food industry since 2020 Go to article: Cybersecurity patent applications in the global food industry since 2020 Go to article: Mentions of cybersecurity in food industry company filings since 2020Go to article: ApparelGo to article: The impact of cybersecurity on the apparel industryGo to article: Case studies: cybersecurity in the apparel industry Go to article: Latest News: cybersecurity in apparel Go to article: Fashion sector digitisation demands greater cybersecurity Go to article: Cybersecurity hiring trends in the apparel industry since 2020 Go to article: Cybersecurity patent applications in the global apparel industry since 2020Go to article: Mentions of cybersecurity in apparel industry company filings since 2020Go to article: Next issue