Identity for the CISO Not Yet Paying Attention to Identity

Details why healthcare CISOs need to embrace an identity-centric approach to cybersecurity – including where and how to get started.
Identity is the leading cause of breaches today – but many health care organizations don’t understand why securing identity is so important, or where to get started.
This paper is the first of a new H-ISAC series designed to provide CISOs – and the broader health care community – a holistic guide on how to best approach Identity and Access Management (IAM) and its role in managing cybersecurity risk.
- Provide an explanation of key concepts
- Outline a framework and best practices
- Investigate the various identity solutions
- Highlight the aspects of effective implementation
- Related Resources & News
- Potential Terror Threat Targeted at Health Sector – AHA & Health-ISAC Joint Threat Bulletin
- New Cybersecurity Policies Could Protect Patient Health Data
- CyberWire Podcast: PHP flaw sparks global attack wave
- Health-ISAC Hacking Healthcare 3-14-2025
- HSCC Aiming to Identify Healthcare Workflow Chokepoints
- New Healthcare Security Benchmark Highlights Key Investment Priorities and Risks
- Are Efforts to Help Secure Rural Hospitals Doing Any Good?
- CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts
- 2024 Health-ISAC Discussion Based Exercise Series After-Action Report
- Cobalt Strike takedown effort cuts cracked versions by 80%