Cloud 101CircleEventsBlog
Register now for CSA’s free Virtual AI Summit taking place January 17-18th

Download Publication

Healthcare Cybersecurity Playbook - An Evolving Landscape
Healthcare Cybersecurity Playbook - An Evolving Landscape

Healthcare Cybersecurity Playbook - An Evolving Landscape

Release Date: 07/14/2021

One aspect of healthcare that has increased significantly during the COVID-19 pandemic is the use of telehealth. Telehealth is used for everything from remote patient monitoring to routine appointments as healthcare delivery transitions toward a patient-centric model. Additionally, with the onset of the COVID-19 virus, HDOs commonly rely on videoconferencing for routine outpatient visits. Telehealth can dramatically bolster efforts to reduce patient exposure to other patients, staff members, and vulnerable populations if utilized effectively. It can also deliver needed care to individuals with mild symptoms in their homes while slowing the spread of a deadly virus. 

These advances in technology coupled with cloud computing have brought us to the point where we now have enormous data sets. These data sets can be used with big data analytics to manage population health, predict health trends, and manage pandemics, as shown with the COVID-19 response. This data analysis can lead to patient outcomes. 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
How to Design a Secure Serverless Architecture
How to Design a Secure Serverless Architecture
Data Loss Prevention in Healthcare
Data Loss Prevention in Healthcare
What is IAM for the Cloud?
What is IAM for the Cloud?
Mastering Data Flow: Enhancing Security and Compliance in the Cloud
Mastering Data Flow: Enhancing Security and Compliance in the Cloud
Published: 12/01/2023
Telehealth and HIPAA Compliance: What You Need to Know Now
Telehealth and HIPAA Compliance: What You Need to Know Now
Published: 11/30/2023
A People-Centric Approach to Patching the Human Firewall
A People-Centric Approach to Patching the Human Firewall
Published: 11/29/2023
5 Tips to Defend Against Access Brokers This Holiday Season
5 Tips to Defend Against Access Brokers This Holiday Season
Published: 11/27/2023

Acknowledgements

Ashish Vashishtha
Ashish Vashishtha
Security Compliance Leader

Ashish Vashishtha

Security Compliance Leader

Analytical, results-oriented IS/IT Audit, Governance, Risk, and Compliance (GRC) leader over 19 years of experience managing enterprise-wide IT/IS security risk approach for large healthcare and IT services organizations. Passionate design thinker with an ability to harness innovation by facilitating collaboration to develop enterprise-wide security risk assessments (onsite as well as remote) for high-risk Third-Parties leveraging NIST 800-...

Read more

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

This person does not have a biography listed with CSA.

John DiMaria
John DiMaria
STAR Program Director, CSA

John DiMaria

STAR Program Director, CSA

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?