Download Publication

Who it's for:
- security officers
- cloud customers
- AI engineers
- IT professionals
Artificial Intelligence in Healthcare
Release Date: 01/06/2022
Working Group: AI Safety Initiative
Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advancements can help improve clinical outcomes, reduce cost, and improve population health. However, there remain some issues with AI that must be addressed. These include ethical and legal issues, a lack of data exchange, regulatory compliance requirements, and patient and provider adoption.
This document from our Health Information Management Working Group provides an overview of the fundamentals and concerns of using AI in healthcare systems at the present, with guidance, challenges, and predictions for the future. It provides examples, use cases, and treatment methods for how AI, machine learning, and data mining can be effectively utilized throughout a healthcare system, in areas such as telehealth, administering diagnoses, and patient care. It also addresses ethical challenges, legal issues, and how to reduce bias in AI.
Key Takeaways:
- How robotics and Robotic Process Automation (RPA) are used for a multitude of different tasks throughout healthcare delivery organizations (HDOs)
- How AI helps healthcare service providers improve the precision of diagnoses
- How HDOs can use predictive analytics to provide better services and reduce cost
- How telehealth uses AI to distribute electronic medical cards, administer personal consultations, and more
- How to reduce bias in your AI algorithm and the ethical and legal challenges related to AI
Download this Resource
Related Resources
Acknowledgements

Ashish Vashishtha
Security Compliance Leader
Ashish Vashishtha
Security Compliance Leader
Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...

Alex Kaluza
Research Analyst, CSA
Alex Kaluza
Research Analyst, CSA

Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Saurabh Saraswat
Saurabh Saraswat
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training

Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more