Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Enterprise ServicesSecurity Leadership and ManagementHospitals & Medical Centers

Three Reasons Healthcare CISOs Can’t Ignore Vendor Compliance

CISOs must prioritize vendor compliance to protect their company and patients from risk and avoid reputational damage, expensive penalties, and other financial impacts.

By John Schneider
Healthcare Data Compliance: Maintaining Integrity, Privacy and Security
July 18, 2019

The risk of a cyberattack against healthcare organizations is growing rapidly, with some 83 percent of health CISOs reporting an increased number of attacks in the past year.

While most consumers think attackers are after their personal healthcare data—diagnoses, treatments, and other private information—the truth is, most attackers couldn’t care less. Their ultimate goal is to inflict financial harm to the business by destroying or locking up critical data, or exploit financial data using ransomware. A cyberattack on a hospital, doctor’s office, or health plan can bring patient care and revenue inflow to a screeching halt.

Beyond their own IT landscape, healthcare CISOs must contend with the security posture of their vendors—everything from email service providers to customer service widgets to coding services. In fact, vendor compliance is now the biggest concern among healthcare CISOs, surpassing the loss of patient data and growing sophistication of cyberattacks.

This concern is well-founded. Most healthcare organizations rely on a multitude of vendors, and security risk is additive. The more vendors in the mix, the greater the risk of a cyberattack crippling the entire value chain.

For better or worse, plans and providers are ultimately responsible for not only their internal security compliance but that of all their vendors as well. A cybersecurity breach at any point in the ecosystem can directly impact the organization in three potentially devastating ways:

Reputation damage. Healthcare organizations are required to report any breach, which is published by the Health and Human Services’ Office for Civil Rights (OCR)—also known as the “Wall of Shame.” In fact, the number of reported breaches recently reached an all-time high, which gained considerable press coverage. Not only is this information available to the public (including potential patients), but healthcare providers and other entities monitor these reports as well. A breach involving a company’s vendors can severely impact its reputation.

Penalties. Under HIPAA, companies found in breach of the law can face substantial federal fines that range from $100 to $50,000 per violation or record. In some extreme cases, the OCR has even pursued criminal charges against offending organizations. These are serious risks to both a company’s bottom line, and potentially, the offender’s job security if the organization’s security measures (or that of its vendors) are found to be negligent.

Financial impact. In addition to penalties, cybersecurity breaches cost companies $45 billion dollars in 2018 alone. The average cost to recover from a breach is $3.86 million for companies that have been attacked, with the biggest impact in the form of downtime and lost business.

To avoid putting their healthcare organization at risk, healthcare CISOs must:

Establish vendor compliance requirements. While HIPAA is the most common compliance framework in the industry, it only covers patient privacy, not payment security or other protocols. In addition to HIPAA, consider requiring HITRUST certification, PCI-DSS to govern payment integrity, and SOC2 compliance for additional management and process controls, backups, and physical security.

Ensure that technology AND process constraints are included. All the technology in the world won’t help if an organization’s coding vendor allows its employees to work at the local Starbucks on an unsecured public network. Require prudent work practices and processes, including robust permissions and access controls.

Conduct routine audits. Demanding that vendors are compliant is futile if you don’t validate through frequent audits. Yes, this takes time and the right expertise to conduct this process efficiently. However, given the substantial risk to a company’s bottom line in the event of a breach, it may be worthwhile to invest in third-party assistance from an auditing firm. This not only ensures that audits are completed in a thorough, timely, and regular manner, but also provides third-party validation and liability in the event a breach does take place.

Relying on industry vendors to have security measures in place without verifying regularly against your own standards puts healthcare organizations at grave risk of a breach. While it may seem like a big investment of resources to audit and monitor vendor for compliance, the alternative expense of disaster recovery and breach impacts is a far bigger price to pay.

By working with vendors who can demonstrate compliance with third-party audit verification, healthcare organization CISOs can rest a little easier, knowing they’ve done all they can to protect their organization.

KEYWORDS: CISO cybersecurity healthcare security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Johnschneider

John Schneider is CTO of Apixio and has more than 25 years of software technology and product development experience with special skills in cross-functional management across research, product, and engineering. John holds a BSE degree from Columbia University’s School of Engineering and Applied Science.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Ambulance

    What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignore

    See More
  • Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    Why hospitals can’t ignore this cybersecurity awareness month

    See More
  • Why You Can’t Afford to Ignore Video Analytics

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing