Intelligent CISO Issue 75 | Page 63

BUSINESS surveillance

ADVANCING HEALTHCARE CYBERSECURITY :

EMBRACING THE FULL SPECTRUM OF ZERO TRUST

Jaye Tilson , Field CTO , HPE Aruba , and Martin Mascarenhas , Customer Engagement Director , Xalient , make the case for ‘ pivotal ’ Zero Trust platforms .

T he healthcare industry , which is entrusted with people ’ s most sensitive data , is no stranger to cyberattacks and breaches .

This is supported by statements made on behalf of the American Hospital Association revealing that healthcare cyberattacks in 2023 affected more than 100 million people .
With the healthcare industry collecting medical records , financial information and even critical patient monitoring data , it is no wonder that the industry is seen as a goldmine of data for cybercriminals , with breaches inflicting unimaginable harm .
On the back of this , the healthcare sector faces formidable challenges in safeguarding sensitive data .
Given the wealth of personal and critical information held by healthcare entities , the imperative for robust cybersecurity measures cannot be overstated .
Zero Trust Network Access ( ZTNA ) platforms are pivotal in this regard as they encompass a comprehensive approach to security .
Moreover , Identity and Access Management ( IAM ), including Identity Governance and Administration ( IGA ), Access Management ( AM ) and Privileged Access Management ( PAM ) play an indispensable role in fortifying the Zero Trust framework .
Conventional cybersecurity paradigms lean heavily on perimeter defences , confining security measures to network boundaries .
However , with the rise of telehealth and the increased adoption of cloud computing , the inadequacies of this static approach to cybersecurity have become evident .
Zero Trust Network Access introduces a paradigm shift of prioritising continuous identity verification and authorisation irrespective of a user ’ s location .
This dynamic approach underscores the essence of Zero Trust , where trust is never assumed and access is meticulously validated at every interaction point .
Zero Trust architecture has rapidly become the foundation of modern cybersecurity , with secure networking and identity security as the cornerstone which establishes secure tunnels between users and applications .
As such , users will have to undergo rigorous authentication and be granted explicit authorisation to be able to access specific applications and data required to perform their job , while broad access to systems and information that aren ’ t part of the job is limited .
This secure access approach also applies to those that are outside the traditional corporate network .
WWW . INTELLIGENTCISO . COM 63