State of Security, by Access Point Consulting, brings together seasoned experts in the fields of security consulting, regulatory compliance, and security operations. Whether you’re a business leader, IT professional, or security enthusiast, this podcast offers valuable insights and actionable advice.
Learn more at accesspointconsulting.com.
State of Security, by Access Point Consulting, brings together seasoned experts in the fields of security consulting, regulatory compliance, and security operations. Whether you’re a business leader, IT professional, or security enthusiast, this podcast offers valuable insights and actionable advice.
Learn more at accesspointconsulting.com.

Summary
In this episode, Rick Leib, Field CISO for Access Point Consulting, discusses the challenges and strategies for cybersecurity in healthcare organizations. He emphasizes the need for healthcare organizations to stop relying solely on perimeter security and to hire executives who can effectively sell security to the board and senior executive staff. Rick also highlights the importance of addressing legacy systems, managing medical devices securely, engaging third-party providers, and investing in information security. He recommends conducting risk assessments, practicing tabletop exercises, and involving executives in the security program. Additionally, Rick suggests considering the role of a virtual CISO to provide guidance and expertise.
Takeaways
Chapters
00:00 Introduction
01:20 Challenges in cybersecurity for healthcare organizations
05:58 Managing medical devices in a secure way
07:50 Engaging third-party providers in healthcare
10:39 Importance of employee training in healthcare organizations
12:34 Ransomware and the need for proactive security operations
14:02 Securing medical devices through micro-segmentation
20:16 The importance of risk assessments and incident response plans
23:36 Investing in information security and practicing tabletop exercises
29:15 Reinforcing the basics and involving executives in security
32:06 The role of a virtual CISO in healthcare organizations
33:03 Conclusion and call to action