Cybersecurity Organizational Structure & Governance

by David Stone

Healthcare organizations are under constant threat of unauthorized access to their computing environments. Organizations face everything from monitoring by regulatory agencies to high penalties if unauthorized access and data breaches occur. As healthcare moves quickly to address computing environment threats, it is prudent to leverage the frameworks and models developed by non-healthcare entities to speed the deployment of effective solutions. In this paper, we will examine two popular frameworks, the Three Lines of Defense Model and the National Institute of Standards and Technology (NIST) Cyber Security Framework, and how they can be leveraged to optimize an information security organizational and governance structure.

As healthcare organizations decide how best to address the constantly changing cybersecurity threat landscape, they have many important questions to answer:

  • What gaps and vulnerabilities exist in the current information security program?
  • What are the components of a complete information security program?
  • How should roles and responsibilities be assigned?
  • What is the most effective governance structure?
  • How should an information security team be structured?
  • What technologies should be deployed?

While healthcare information technology and security organizations have been aware of increasing issues and concerns, they have not been provided the attention or, more importantly, the funding needed to fully address security threats. With the recent attention healthcare is receiving from data thieves, regulatory agencies, and the media, healthcare executive management and boards of directors are demanding appropriate steps be taken to protect IT and data assets. Other industries, particularly the financial industry, have dealt these issues and level of scrutiny for many years. Multiple industry groups have examined the issue of cybersecurity and developed different models and frameworks to assist their peers in deploying countermeasures. When combined, the following two frameworks provide an excellent blueprint for establishing an effective information security program and an optimized organization.

About Divurgent

At Divurgent, a healthcare IT solutions firm, we’re focused on what matters most to our client partners. We use data-infused, flexible, and scalable solutions that demonstrate and quantify real value. With a Team committed to IT evolution, we deploy tailored solutions that help our clients achieve operational effectiveness, improved financial performance, and quality experiences.