Enhancing Cybersecurity Response in Healthcare
According to The Third Annual Study on the Cyber Resilient Organization by IBM Security and the Ponemon Institute, less than one-fourth of the 2800 respondents said they had a formal cybersecurity incident response plan (CSIRP). Also, a similar number expressed not having a Chief Information Security Officer (CISO) or security leader. Around half the respondents claimed to have an informal incident response plan or no plan in existence and more than three-fourths of the respondents highlighted the difficulty to recruit and retain IT security professionals.
Many healthcare organizations today also feel that the duration of incident resolution and the severity of attacks have increased. It is due to the rising sophistication of hackers.
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) provides healthcare the framework required to build comprehensive resilience. The diversity within the healthcare industry landscape alongside the education and awareness about cybersecurity required challenges cybersecurity measures and the NIST CSF works at helping organizations of all sizes and types develop an iterative and dynamic cybersecurity risk management plan. NIST CSF Program Manager, Matt Barrett cited the 2017 WannaCry ransomware attack, highlighting the importance of maintaining cyber hygiene with regular patches.
As per recent CynergisTek report findings, almost half the healthcare entities (hospitals, clinics, payers, business associates, and ancillary facilities), exhibited compliance with NIST CSF controls. Most organizations have poor detection of potential cybersecurity threats, but machine learning and behavioral analytics are being perceived as having the potential to improve threat detection.
As per Ted Julian, the IBM Resilient VP of Product Management and Co-Founder, cybersecurity in healthcare requires assimilation of human and machine intelligence combating cybersecurity threats, with security personnel being armed with both technical tools and training.
By Phil Jarvis, VP, IT, Thirty-One Gifts
By Dr.Chris Ewell, CISO, Seattle Children
By Eloise Young, CIO, Philadelphia Gas Works
By Phil Stevens, CIO, The Exchange
By Herman Nell, SVP & CIO, Rent-A-Center
By John Honeycutt, CTO, Discovery Communications
By Mark Wead, Chief Enterprise Architect– North America...
By Federico Flórez, Chief Information & Innovation Officer,...
By David Berry, CIO, Daymon Worldwide
By Douglas Turk, Chief Marketing Officer, JLT Speciality
By Tekin Gulsen, CIO, Global IT & Corporate Planning...
By John Sprague, Deputy CTO, IT and the End User Architect,...
By Craig C Shrader, CIO Engagement Partner, Tatum, a...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By Jeff Katz, CTO, Energy & Utilities, IBM [NYSE:IBM]
By Dr Dirk E Mahling, VP, Technology, Alliant Energy
By Steven John, CIO, AmeriPride Services
By Leon Ravenna, CISO, KAR Auction Services, Inc.