Governance & Risk Management , Healthcare , Incident & Breach Response

A CISO's Insights on Breach Detection

Mitch Parker of Indiana University Health System on Essential Steps
A CISO's Insights on Breach Detection

Implementing new technologies and best practices can help healthcare organizations dramatically improve their detection of data breaches, says Mitch Parker, CISO of Indiana University Health System.

To detect breaches, Parker says in an interview with Information Security Media Group, "you have to understand your environment really well. You have to identify what potentially anomalous behavior is, know what you're logging and reporting on, and make sure you have team members who are available to address these anomalies."

Key steps, the CISO says, include using appropriate technologies, such as security incident and event monitoring tools, as well as effectively using security team resources "to conduct root cause analysis to identify what's going on."

Parker will be a featured speaker at ISMG's Healthcare Security Summit in New York on June 25. He will join other CISOs and security experts who will address breach detection and an array of other top security challenges.

In the interview (see audio link below photo), Parker also discusses:

  • Conquering "alarm fatigue," which often slows the process of identifying breaches;
  • Why many insider breaches are more difficult to detect than some incidents involving hackers;
  • The growing breach risks posed by supply chain vendors and other third parties, including incidents potentially involving compromised application programming interfaces.

Parker is CISO at Indiana University Health, based in Indianapolis, which offers a range of specialty services for children and adults, including cancer, cardiovascular, neuroscience, orthopedics, pediatrics and transplant services. He formerly served as CISO at the four-hospital Temple University Health System as well as CISO for Temple's clinical faculty practice plan, Temple University Physicians. Previously, he was an information security consultant to the Defense Logistics Agency and others.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.