Cybersecurity Organizational Structure & Governance

by David Stone

Healthcare organizations are under constant threat of unauthorized access to their computing environments. Organizations face everything from monitoring by regulatory agencies to high penalties if unauthorized access and data breaches occur. As healthcare moves quickly to address computing environment threats, it is prudent to leverage the frameworks and models developed by non-healthcare entities to speed the deployment of effective solutions. In this paper, we will examine two popular frameworks, the Three Lines of Defense Model and the National Institute of Standards and Technology (NIST) Cyber Security Framework, and how they can be leveraged to optimize an information security organizational and governance structure.

As healthcare organizations decide how best to address the constantly changing cybersecurity threat landscape, they have many important questions to answer:

  • What gaps and vulnerabilities exist in the current information security program?
  • What are the components of a complete information security program?
  • How should roles and responsibilities be assigned?
  • What is the most effective governance structure?
  • How should an information security team be structured?
  • What technologies should be deployed?

While healthcare information technology and security organizations have been aware of increasing issues and concerns, they have not been provided the attention or, more importantly, the funding needed to fully address security threats. With the recent attention healthcare is receiving from data thieves, regulatory agencies, and the media, healthcare executive management and boards of directors are demanding appropriate steps be taken to protect IT and data assets. Other industries, particularly the financial industry, have dealt these issues and level of scrutiny for many years. Multiple industry groups have examined the issue of cybersecurity and developed different models and frameworks to assist their peers in deploying countermeasures. When combined, the following two frameworks provide an excellent blueprint for establishing an effective information security program and an optimized organization.

About Divurgent

Divurgent is a leading healthcare IT consulting firm and EHR specialist. Since 2007, we’ve led more than 700 projects across the US and Canada, drawing from a team of over 22,000 experienced subject matter experts. As a 100% privately-owned company, we’re accountable only to our clients, ensuring they achieve measurable improvements in patient care and organizational performance.

At Divurgent, we’re dedicated to helping organizations achieve their vision through innovative solutions and exceptional service. We collaborate closely with our clients to deliver tailored solutions that drive success in an ever-evolving healthcare landscape, from EHR implementation and go-lives to managed services, analytics, talent augmentation, and digital strategy. With decades of combined healthcare experience on both sides of the table, our team has overcome the challenges faced by our clients and helped them get the most out of their investments in healthcare technology.