Intelligent CISO Issue 33 | Page 46

To build a resilient healthcare sector for the country ’ s future success , critical adjustments to the current cybersecurity practices are imperative . organisation ’ s assets . Once the impact has been recognised and understood , practices can be adapted to suit necessary requirements .
industry unlocked
for business-critical applications – including customer-facing applications .
The oversight when it comes to Privileged Access Management is likely due to a limited understanding in the healthcare sector of where privileged accounts , credentials and secrets can exist within an IT environment . Only 24 % of organisations recognised that privileged accounts and credentials exist within containers and only 30 % said they exist within continuous integration / continuous delivery ( CI / CD ) tools . That being said , more than one-quarter ( 28 %) of all planned security spending in the healthcare sector in the next couple of years will go towards preventing privilege escalation and / or lateral movement , according to the study .
Protecting the future of our health
The risk profile of an organisation is influenced by every single employee , application and technology it employs . So , as healthcare organisations such as the NHS look towards a fullyfledged Digital Transformation postpandemic , IT and security teams must look to understand the impact these efforts have on the security of an

To build a resilient healthcare sector for the country ’ s future success , critical adjustments to the current cybersecurity practices are imperative . organisation ’ s assets . Once the impact has been recognised and understood , practices can be adapted to suit necessary requirements .

To build a resilient healthcare sector for the country ’ s future success , critical adjustments to the current cybersecurity practices are imperative . This may require new talent , skillsets and tools , but they are nonetheless vital in protecting assets from advanced threats in the current landscape .
Updating tools and managing access to privileged accounts and credentials reduces a cybercriminal ’ s moves considerably and constricts their path . In a sector with so much at stake , it is key that every piece of the cybersecurity puzzle is in place to completely secure a targeted network . All stops must be pulled out to maintain the critical functions of our most needed establishments . u
46 www . intelligentciso . com