Healthcare Business Review

Advertise

with us

  • Europe
    • US
    • EUROPE
    • APAC
    • CANADA
    • LATAM
  • Home
  • Sections
    Business Process Outsourcing
    Compliance & Risk Management
    Consulting Service
    Facility Management Services
    Financial Services
    Healthcare Construction
    Healthcare Digital Marketing
    Healthcare Education
    Healthcare Marketing
    Healthcare Procurement
    Healthcare Staffing
    Medical Transcription and Translation
    Medical Transportation
    Psychological Services
    Radiology
    Therapy Services
    Waste Management
    Business Process Outsourcing
    Compliance & Risk Management
    Consulting Service
    Facility Management Services
    Financial Services
    Healthcare Construction
    Healthcare Digital Marketing
    Healthcare Education
    Healthcare Marketing
    Healthcare Procurement
    Healthcare Staffing
    Medical Transcription and Translation
    Medical Transportation
    Psychological Services
    Radiology
    Therapy Services
    Waste Management
  • Contributors
  • News
  • Vendors
  • Conferences
  • CXO Awards
×
#

Healthcare Business Review Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Healthcare Business Review

Subscribe

loading

Thank you for Subscribing to Healthcare Business Review Weekly Brief

  • Home
  • Contributors

Achieving Information Security in Healthcare

Healthcare Business Review

Dan Costantino, CISO, Penn Medicine
Tweet

Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security programs. It is critical to scrutinize whether you have implemented fundamental security controls and practices, such as patching, apart from identification and security awareness. Consistently networking with CISOs in the industry is one of the best practices to ensure that you are going in the right direction, performing a part of the essentials that you ought to be. It’s also imperative to frequently have an expert assist you in understanding if you are allocating your resources in the right places, investing in the right asset, and focusing on the right risks and threats. Often, it takes an external firm that can give you inputs on better resource utilization on a yearly premise, to help advance your program.


Evolution of the Role of CISO


Lately, the role of a CISO has changed significantly. Who was once viewed as simply the leader of IT security systems, the CISO, is a critical stakeholder in the business now. This is because of the increase in data breach threats and a more profound understanding of data security at a broader level which was earlier restricted to technical systems and IT systems. Likewise, they are required to have a significant comprehension of the business and its mission while also possessing a solid technical acumen.


Key Challenges of a CISO in the Healthcare Industry


In the healthcare industry, CISOs are facing a lot of unique challenges today. The most significant challenge is the need to design a secure environment while not compromising patient care in any way. It’s really important for CISOs and information security teams to be cognizant of all that the clinical personnel and researchers are doing every day. They also need to understand that our patients come to us because of all the innovative work and miracles that they are performing. It’s our responsibility to support that mission while maintaining the safety of our patients’ data. That’s very challenging and unique in the healthcare information security arena.


The healthcare information security landscape is witnessing major technological developments. One of the primary developments is the never-ending list of storage repositories and a record of where data is transmitted to, including IoT, cloud, mobile, and medical devices. The challenge is that we live in an environment where there is no longer a parameter to protect. Hence, there exists the challenge of protecting data and frameworks that are designed that share the data with everyone.


Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security program


Today, systems are not inherently designed to be secure; they’re designed for availability and information sharing.


Application of Behavioral Analytics on Insider Threats within Organizations


The industry, in general, is facing a major challenge due to insider threats. Often, these threats are not really malevolent moves that are being made by employees; it isn’t a workforce with malicious intentions. One of the challenges is when employees work in an environment for a long period of time, they develop a strong sense of ownership in the data, the research and the designs produced by them. When it’s time for those employees to leave, it’s not unusual for them to feel that they deserve to use the data at their will. The behavioral analytics platforms today and the application of it, is truly being the emphasis on the insider threat. It’s necessary to understand the key pointers or behaviors that the workflow is demonstrating. A string of key behaviors combined with each other can most likely give us some proactive insights into a harmful event that could take place later on, whereas we are currently trying to be reactionary after that incident has already taken place.


Advice to an Aspiring CISO


It’s an absolute must to build a team that has the capability of performing not only the everyday security tasks, but also becoming ingrained in the strategy and the development of the overall program.


Something that security industry is good at, but still has room for enhancement, is information sharing— sharing information with all security personnel, not just what we are doing well, but also some of the adverse situations that we are seeing within the industry. Information sharing truly comes from various distinctive sources. One of them is through networking; another source is NH-ISAC. The information sharing happens throughout the industry, not simply with security pioneers, but also with security engineers, analysts, and regular professionals.


The objective should be to build a world-class security program and create next-generation security levels in your program. A CISO need not contemplate implementing cutting-edge security from the very beginning. It is really essential to start from the fundamentals.


Weekly Brief

loading
> <
  • Current Issue
  • Current Issue
  • Ensuring Cost Effective Access to Care

    Paul Murphy, Principal Advisor, Paul Murphy Consulting & Ex-AVP Virtual Network (Telemedicine), HealthOne
  • How is the Future of Healthcare Shaping?

    Cheryl Reinking, Chief Nursing Officer, El Camino Hospital
  • Leveraging Telehealth for Chronic Disease Care and Integrated Digital Solution

    Amanda Reed, Director of Operations for Mednow, Spectrum Health
  • Fulfilling the Promises of Health Information Technology

    Donna Lee Armaignac, Director, Center for Advanced Analytics, Baptist Health South Florida
  • Healthcare Analytics - Advice To Aspiring Leaders

    Christopher J Hutchins, VP, Chief Data and Analytics Officer, Northwell Health
  • In our new Digital reality, Conveying and Driving Empathy will be Critical to the Future of Healthcare

    Ankit Vahia, Executive Strategy Director, Pharma/ Health and Wellness, Grey Group
  • Future of Supply Chain: Trends and Analysis

    Nick Vyas, Executive Director, the USC Marshall Center for Global Supply Chain Management
  • New Study Uncovers Top Supply Chain Digital Transformation Trends

    Chris Cookson, West Region Supply Chain & Operations Leader, Ernst & Young LLP

Read Also

Resilience in Modern Healthcare

Resilience in Modern Healthcare

Imana Mo Minard MSN-ed, RN, CENP, EMT-P, Director of Nursing, Corewell Health East
READ MORE
Leading High-Reliability Healthcare Delivery

Leading High-Reliability Healthcare Delivery

Dr Ana Maria Y. Jimenez, Executive Director of Nursing, Aspen Medical – Fiji
READ MORE
Importance of Safety in Testosterone Therapy

Importance of Safety in Testosterone Therapy

Mayo Clinic, Director of Endocrinology Services, Maria Lopez
READ MORE
Building Sustainable Care Models through APP Leadership

Building Sustainable Care Models through APP Leadership

Truett Smith, Director of Advanced Practice, Primary Care, Atrium Health
READ MORE
A Systematic Approach to Radiology Workforce Stabilization: Recruitment, Retention and Technological Optimization

A Systematic Approach to Radiology Workforce Stabilization: Recruitment, Retention and Technological Optimization

Julie Singewald, Interim System Shared Clinical Services Operations Leader, Essentia Health
READ MORE
Bridging IT and Healthcare for Smarter Care

Bridging IT and Healthcare for Smarter Care

Benedict Sulaiman, Director of IT-CTO, Mandaya Hospital Group
READ MORE

A Systematic Approach to Radiology Workforce Stabilization: Recruitment, Retention and Technological Optimization

Julie Singewald, Interim System Shared Clinical Services Operations Leader, Essentia Health

Bridging IT and Healthcare for Smarter Care

Benedict Sulaiman, Director of IT-CTO, Mandaya Hospital Group

Innovating Pediatric Healthcare with Genomics

Dr. Catherine Brownstein, Manager, Molecular Genomics Core Facility, Boston Children's Hospital

Balancing Technology and Humanity in Healthcare Leadership

Richard Phillips, Chief Medical Officer, Baptist Health System KY & IN
Loading...
Copyright © 2025 Healthcare Business Review. All rights reserved. |  Subscribe |  Sitemap |  About us |  Newsletter |  Feedback Policy |  Editorial Policy follow on linkedin
CLOSE

Specials

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://www.healthcarebusinessrevieweurope.com/cxoinsight/achieving-information-security-in-healthcare-nwid-50.html