Identity for the CISO Not Yet Paying Attention to Identity

Details why healthcare CISOs need to embrace an identity-centric approach to cybersecurity – including where and how to get started.
Identity is the leading cause of breaches today – but many health care organizations don’t understand why securing identity is so important, or where to get started.
This paper is the first of a new H-ISAC series designed to provide CISOs – and the broader health care community – a holistic guide on how to best approach Identity and Access Management (IAM) and its role in managing cybersecurity risk.
- Provide an explanation of key concepts
- Outline a framework and best practices
- Investigate the various identity solutions
- Highlight the aspects of effective implementation
- Related Resources & News
- Healthcare Heartbeat 2024 Q4
- Health-ISAC Hacking Healthcare 2-19-2025
- Podcast: Reflecting on the Change Healthcare cyberattack
- Senate Confirms Trump Pick RFK Jr. to Lead HHS
- The Alarming Backdoor Hiding in 2 Chinese Patient Monitors
- Health-ISAC 2025 Health Sector Cyber Threat Landscape
- How Health Systems Manage Security in the Cloud
- Change Healthcare Attack a Wake-up Call for the Industry
- Five High-Impact Cyberattacks Healthcare Industry Should Avoid in 2025
- Health-ISAC Hacking Healthcare 2-11-2025