One Healthcare CISO’s View: CISOs Need to be True Business Partners | Healthcare Informatics Magazine | Health IT | Information Technology Skip to content Skip to navigation

One Healthcare CISO’s View: CISOs Need to be True Business Partners

January 9, 2018
by Heather Landi
| Reprints
Click To View Gallery

Healthcare organizations are facing an evolving cybersecurity threat landscape, with accelerating threats in the wake of recent, massive attacks on organizations worldwide. The need for stronger cybersecurity is now on most healthcare organizations’ radars, more so than even just a few years ago.

Chief information security officers (CISOs) at patient care organizations face complex and challenging issues with respect to information security, including rapidly evolving mal­ware threats, insider data breaches and the increasing use of medical Internet of Things (IoT) devices across their organizations.

At the same time, while the CISO position requires technical expertise in security, the role continues to evolve as healthcare CISOs have now become a part of the broader senior leadership team. Top healthcare security leaders from across the country will explore many of these topics at Healthcare Informatics’ San Diego Health IT Summit on Feb. 1-2. Brian Kreitzer, CISO, information services and solutions at UCLA Health, leads cybersecurity strategy at the four-hospital, 2,000-physician integrated health system in Los Angeles. Kreitzer recently spoke with Healthcare Informatics’ Associate Editor Heather Landi about the evolving role of the CISO, the challenge of strengthening legacy systems and the security threats he is most concerned about. Below are excerpts from that interview.

Legacy systems, from electronic health records to billing platforms, can pose a security risk. What is your perspective on strengthening legacy systems?

My thoughts are to get rid of them. I say that jokingly, but there is some truth to that as well. It’s not necessarily getting rid of them, but getting rid of them in their current state. If they are old enough to where they have security vulnerabilities, an organization needs to ensure that they have proper planning to be able to upgrade those systems, so that they can still make use of those feature and functionalities in a more secure way. So, typically that means upgrading both the infrastructure and application, because the application may rely on older versions of other third-party software, like JAVA as an example of one that is always vulnerable. The way that access management is handled is another possible security vulnerability in legacy applications and whether they can integrate well with some of the latest and greatest security best practices in that space, such as multi-factor authentication.


How to Assess IT Risk in a Healthcare Environment

In this webinar, Community Health System’s CISO Scott Breece and Lockpath's Sam Abadir will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk...

How would you describe the state of healthcare cybersecurity right now?

We are making progress as an industry from what I’m seeing, but there is still a long way to go and we’re still not where we need to be from a straight security perspective. But if you’re taking a risk-based approach then there are certainly some arguments that could be made that perhaps we are where we need to be because the more security controls you put in place then the less likely it is that you do get breached. And, it’s about trying to figure out what is that percentage and what is that real estimated value there, which nobody can do, and that’s the problem. Nobody knows what that expected value is so we keep addressing what we consider high and critical and hopefully some medium vulnerabilities and threats. I think we’re making progress, and we’re much more secure as an industry than we were probably 12 months ago.

Within the healthcare industry, are you seeing more engagement and support for cybersecurity strategies from senior executive and board-level leaders?

It seems like that is very company-dependent on the level of exposure and influence or engagement of boards and/or senior leadership. I’ve seen some organizations take a more check-the-box, compliance approach. But, others may have the CISO reporting directly to the CEO. And so, to me, the reporting structure definitely goes a long way and says a lot about how seriously a company is taking security.

How do you see the reporting structure impacting an organization’s security strategy?

It really depends, partly, on the level of engagement and the knowledge of those people in those reporting relationships. What I mean by that is I, personally, think it’s okay for the CISO to report into the CIO, but only if the CIO has a good understanding of risk and finances and the rest of the business to be able to measure that and make those risk-based decisions. If the CIO is strictly technical, then that might not the best place for a CISO and maybe they should be more on the risk side of the house, or even under the CFO. Obviously, if you are trying to drive change, then the higher in the organization you put that person, the more influence they can have around driving that change. If you’re organization is in a spot where you need a change agent to come in and shake things up a little bit, then reporting to the CEO, or maybe even directly to the board, might be the way to go.

How is the role of the CISO evolving?

What I’ve seen in the past, and what I hear from my colleagues, is that many times, the CISO has been much more technical in nature, so they will go in there and solve technical problems. Obviously, the entire landscape and architecture of our IT solutions that we put in place has completely changed over the past 10, 20, 30 years. It used to be good enough to where you used the M&M approach and protect the outer shell, throw up some firewalls, put some anti-virus on and it’s done. But now, in the technical space, the whole landscape has changed. Our users are everywhere; they want to bring in every device, they are using cloud, they are on the network, using the same devices going back and forth on and off your network, and they want a seamless user experience. The CISO needs to have enough of a technical understanding to be able to work all that out, and measure the pros and cons to be able to make those risk-based decisions based on how much a new solution is going to cost versus the expected value—i.e. how much it is really going to move the needle on your security posture.

But, more importantly, I feel that the CISO needs to be engaged at that higher level. The CISO needs to have that business acumen and understanding so that they can make those risk-based decisions based not only on the new technological widget that might barely move the needle, but they need to be considering business impact, user impact, operational impact on our IT groups, the financial impact with cost versus savings, all of that to be able to work with the rest of the business and really be true business partners.

AT UCLA Health, what is your approach to utilizing technology as part of the security strategy?

There’s absolutely a huge technical piece to the role, and in my mind, that’s a must. The CISO must have that level of knowledge because there are certainly different ways that you can approach security and you can approach it through administrative controls, but those only go so far and they are only as effective as the sanctions that are around those controls. If you want a truly effective approach to security then you enforce it through technical means, so you’re not just relying on your users to say that they’ll do things in the right way, but you’re enforcing it and ensuring that they cannot do it the wrong way. There is of course a risk that users will find their own workarounds, so it is also critically important to offer secure options that enable the business.

Specifically, how are we using technology? We’re basically looking at every different type of security technical control out there and measuring it in a risk-based approach on how much do we think it’s really going to move the needle versus what’s the cost of the solution. So, yes, we’re looking at SIEMS, we’re looking at user behavior analytics and DLP, you name it.

Breaches due to insiders, including phishing attacks, are also a risk. What is your perspective on addressing insider breaches and building a culture of cybersecurity?

I probably have a unique perspective on phishing, as I’m not sure how much phishing training actually helps, because no matter how much you train, there are still people who are going to click on bad links and get phished. To me, it really should boil back down to the finances on those phishing training solutions and how much that really saves you on the back end with your incident response teams. To me, it’s a straight finance and productivity type equation. With that said, the importance of ensuring that we have a security culture in the organization is absolutely, critically important. We should continue with at least annual cybersecurity training to makes sure that’s on the forefront of everybody’s minds for at least some period of time. When you go live with a new security tool, you should absolutely ensure that you’re doing everything you can to work with your users and ensure that you have deep communication plans in place and walk them through it. And partner with them as well so they can be part of the solution and you can find workable solutions together, instead of having your users feel like security is being jammed down their throat and causing disruptions. That engaged and partner security culture is important because you don’t want people going around your controls and breaking policy. Policy, when enforced correctly and with the appropriate sanctions, can also help your security culture.

It’s also critically important to have those C-level folks, executive leadership, on board with your program. Again, it goes back to why the reporting structure is so important because culture is not something that any one group of people can change. It has to come from everywhere. You can have change agents coming in from a security team but if you don’t have executive leadership on board and if you’re not doing grassroots type of things like annual training, then a culture change never really takes effect. You have to approach it from all angles.

What do you see as the biggest cyber threat? What approach is your organization taking to address it?

Medical devices are definitely the biggest vulnerability that we have. It’s really about working with vendors, at the end of the day, and coming up with partnerships that you can move forward with that support a secure environment. Historically, medical devices don’t typically come with a lot of security built into them so your only remedy is to quarantine them off in some corner and not let them talk to the rest of your network, or just the minimum. So that’s one approach, but that doesn’t solve the problem of physical harm for that one patient that is hooked up to that medical device. You need to work with your vendors. We as an industry need to do a better job of saying no to contracts that don’t have the ability to have security worked in in a meaningful way.

Are you seeing improvements in that area, with vendors more focused on security?

I have seen some improvement, but it’s a relative term. It feels like we’ve moved from 0 percent to 1 percent, so we’re still a long way from where we need to be.

2018 Raleigh Health IT Summit

Renowned leaders in U.S. and North American healthcare gather throughout the year to present important information and share insights at the Healthcare Informatics Health IT Summits.

September 27 - 28, 2018 | Raleigh


Healthcare’s “RegTech” Opportunity: Avoiding a 2008-Style Crisis

September 21, 2018
by Robert Lord, Industry Voice, Co-Founder and President of Protenus
| Reprints

In the financial crisis of 2007 to 2009, the financial industry suffered a crisis of trust. A decade later, banks and other financial institutions are still working to regain the confidence of consumers and regulators alike. In 2008 and 2009, while working at one of the world’s top hedge funds, I had a front-row seat to the damage that occurred to our economy, watching as storied corporate institutions fell or were gravely damaged. Today, as co-founder of a health technology company, I see healthcare is approaching a similarly dangerous situation. We must get ahead of the curve to avoid disaster.

Like finance, healthcare is a highly-regulated industry where non-compliance can result in severe financial and reputational consequences for healthcare companies, and severe impact on people’s lives. We deal with HIPAA, MACRA, HITECH, and hundreds of other foreboding acronyms on a daily basis. A lot of attention goes to the terrific and important work of clinical decision support, wellness apps, and other patient care technologies, but problems in the back office of hospitals must be addressed as well. One of these problems is the amount and complexity of healthcare regulation, and our healthcare system’s inability to keep up.

In finance, where I spent the early part of my career, the adoption of what is termed “RegTech” (regulatory technology) was driven by the increasing complexity of financial technology and infrastructure sophistication.  As trades moved faster, and as algorithms, processes and organizations became more complex, the technologies needed to ensure regulatory compliance had to move in tandem.  The crisis we experienced in 2008 was partially the result of the inability of the industry’s regulatory capabilities to keep up with the pace of technological change.  In many ways, the industry is still playing a catch-up game.

As healthcare professionals, looking to the lessons learned by our colleagues in finance can help us predict patterns and stay ahead of the curve. Right now, I’m seeing alarming parallels to challenges faced in finance a decade ago.


How to Assess IT Risk in a Healthcare Environment

In this webinar, Community Health System’s CISO Scott Breece and Lockpath's Sam Abadir will discuss the unique IT landscape of the healthcare industry and the challenges this presents for IT risk...

Robert Lord

The burden of regulation across our industry is simply staggering.  Thirty-nine billion dollars of regulatory burden is associated with healthcare annually, which is about $1,200 per patient, per year. Despite this high cost, we still have $1 trillion of fraud, waste and abuse in our healthcare system. With so much regulation, why are we seeing so little yield from that burden? In many cases, it’s because we’re merely checking boxes and not addressing core risks؅. Like finance, there was a great deal of effort on compliance with regulations, but not enough attention on addressing important systemic risks.

This is not to say I am against good regulation; in fact, many regulations serve to protect patients and improve care. The problem is that there are so many demands on healthcare systems, that compliance and regulation is often reduced to checking boxes to ensure that minimum defensible processes are built, and occasionally spot-checking that things look reasonable. We currently have nowhere near 100 percent review of activities and transactions that are occurring in our health systems every day, though our patients deserve nothing less. However, unless overburdened and under-resourced healthcare providers and compliance professionals can achieve leverage and true risk reduction, we’ll never be able to sustainably bend our compliance cost curve.

Systemic problems are often not discovered until something goes horribly wrong (e.g., Wall Street every decade or so, the Anthem data breach, etc.). Today In the financial industry, RegTech provides continual, dynamic views of compliance or non-compliance and allows management, compliance professionals and regulators to check compliance in real-time. They can view every record, understand every detail, and automate investigations and processes that would otherwise go undetected or involve lengthy and labor-intensive reviews.

The real promise of these new capabilities is to allow compliance professionals and regulators to perform the truest form of their jobs, which is to keep patient data secure, ensuring the best treatment for patients, and creating sustainable financial models for healthcare delivery. RegTech will open up lines of communication and help create conversations that could never have been had before—conversations about what’s not just feasible for a person to do, but what’s right to do for the people whom regulation seeks to protect.

No longer bound by limited resources that lead to “box-checking,” compliance officers can use new and powerful tools to ensure that the data entrusted to them is protected. At the same time, healthcare management executives can be confident that the enterprises they manage will be well served by risk reducing technological innovation.  Patients, the ultimate beneficiaries of healthcare RegTech, deserve as much.

Robert Lord is the co-founder and president of Protenus, a compliance analytics platform that detects anomalous behavior in health systems.  He also serves as a Cybersecurity Policy Fellow at New America.


More From Healthcare Informatics


HIPAA Settlements: Three Boston Hospitals Pay $1M in Fines for “Boston Trauma” Filming

September 20, 2018
by Heather Landi, Associate Editor
| Reprints

Three Boston hospitals that allowed film crews to film an ABC documentary on premises have settled with the U.S. Department of Health and Human Services, Office for Civil Rights (OCR) over potential violations of the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule.

According to OCR, the three hospitals—Boston Medical Center (BMC), Brigham and Women’s Hospital (BWH) and Massachusetts General Hospital (MGH)—compromised the privacy of patients’ protected health information (PHI) by inviting film crews on premises to film "Save My Life: Boston Trauma," an ABC television network documentary series, without first obtaining authorization from patients.

OCR reached separate settlements with the three hospitals, and, collectively, the three entities paid OCR $999,000 to settle potential HIPAA violations due to the unauthorized disclosure of patients’ PHI.

“Patients in hospitals expect to encounter doctors and nurses when getting treatment, not film crews recording them at their most private and vulnerable moments,” Roger Severino, OCR director, said in a statement. “Hospitals must get authorization from patients before allowing strangers to have access to patients and their medical information.”

Of the total fines, BMC paid OCR $100,000, BWH paid $384,000, and MGH paid $515,000. Each entity will provide workforce training as part of a corrective action plan that will include OCR’s guidance on disclosures to film and media, according to OCR. Boston Medical Center's resolution agreement can be accessed here; Brigham and Women’s Hospital's resolution agreement can be found here; and Massachusetts General Hospital's agreement can be found here.

This is actually the second time a hospital has been fined by OCR as the result of allowing a film crew on premise to film a TV series, with the first HIPAA fine also involving the filming of an ABC medical documentary television series. As reported by Healthcare Informatics, In April 2016, New York Presbyterian Hospital (NYP) agreed to pay $2.2 million to settle potential HIPAA violations in association with the filming of “NY Med.”

According to OCR announcement about the settlement with NYP, the hospital, based in Manhattan, violated HIPAA rules for the “egregious disclosure of two patients’ PHI to film crews and staff during the filming of 'NY Med,' an ABC television series.” OCR also stated the NYP did not first obtain authorization from the patients. “In particular, OCR found that NYP allowed the ABC crew to film someone who was dying and another person in significant distress, even after a medical professional urged the crew to stop.”

The OCR director at the time, Jocelyn Samuels, said in a statement, “This case sends an important message that OCR will not permit covered entities to compromise their patients’ privacy by allowing news or television crews to film the patients without their authorization. We take seriously all complaints filed by individuals, and will seek the necessary remedies to ensure that patients’ privacy is fully protected.” 

OCR’s guidance on disclosures to film and media can be found here.

Related Insights For: Cybersecurity


Independence Blue Cross Notifies 17K Patients of Breach

September 19, 2018
by Rajiv Leventhal, Managing Editor
| Reprints

The Philadelphia-based health insurer Independence Blue Cross is notifying about 17,000 of its members that some of their protected health information (PHI) has been exposed online and has potentially been accessed by unauthorized individuals.

According to an article in HIPAA Journal, Independence Blue Cross said that its privacy office was informed about the exposed information on July 19 and then immediately launched an investigation.

The insurer said that an employee had uploaded a file containing plan members’ protected health information to a public-facing website on April 23. The file remained accessible until July 20 when it was removed from the website.

According to the report, the information contained in the file was limited, and no financial information or Social Security numbers were exposed. Affected plan members only had their name, diagnosis codes, provider information, date of birth, and information used for processing claims exposed, HIPAA Journal reported.

The investigators were not able to determine whether any unauthorized individuals accessed the file during the time it was on the website, and no reports have been received to date to suggest any protected health information has been misused.

A statement from the health insurer noted that the breach affects certain Independence Blue Cross members and members of its subsidiaries AmeriHealth HMO and AmeriHealth Insurance Co. of New Jersey. Fewer than 1 percent of total plan members were affected by the breach.

See more on Cybersecurity