Skip to main content

Cybersecurity in Healthcare in ISO 27799

$349.00
Your guarantee:
30-day money-back guarantee — no questions asked
How you learn:
Self-paced • Lifetime updates
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
When you get access:
Course access is prepared after purchase and delivered via email
Who trusts this:
Trusted by professionals in 160+ countries
Adding to cart… The item has been added

This curriculum spans the equivalent of a multi-workshop program used in healthcare organisations to align cybersecurity governance, risk management, and compliance with ISO 27799, covering the depth and specificity of an internal capability-building initiative for securing clinical systems, managing third-party risks, and integrating security into patient care workflows.

Module 1: Establishing Governance Frameworks Aligned with ISO 27799

  • Selecting an appropriate governance model (e.g., COBIT, NIST CSF) to complement ISO 27799 controls in a healthcare context
  • Defining roles and responsibilities for data stewards, clinical system owners, and IT security leads
  • Integrating medical records governance with enterprise information security governance
  • Establishing a healthcare-specific risk appetite statement approved by clinical and executive leadership
  • Mapping regulatory obligations (HIPAA, GDPR, PIPEDA) to ISO 27799 control objectives
  • Designing escalation paths for security incidents involving patient safety or clinical operations
  • Developing governance documentation requirements for audit readiness across hybrid cloud and on-premise systems
  • Implementing a governance review cadence that aligns with clinical system upgrade cycles

Module 2: Risk Assessment and Management in Clinical Environments

  • Conducting threat modeling for connected medical devices with limited patching capabilities
  • Assessing risks introduced by third-party clinical applications with access to EHRs
  • Quantifying risk exposure for legacy systems supporting critical care pathways
  • Performing risk assessments that include clinical workflow disruption as a key impact factor
  • Documenting residual risks for systems where full remediation would impact patient care delivery
  • Integrating risk treatment plans with change management for clinical IT deployments
  • Using risk scoring models that account for both data confidentiality and system availability in emergency care
  • Reviewing risk register updates with clinical safety committees quarterly

Module 3: Access Control for Clinical and Administrative Roles

  • Designing role-based access control (RBAC) structures that reflect dynamic clinical team compositions
  • Implementing just-in-time access for temporary staff and locum physicians
  • Enforcing separation of duties between clinical documentation and billing functions
  • Managing access reviews for hybrid roles (e.g., physician-researchers with dual data access needs)
  • Configuring emergency override access with automated logging and audit trails
  • Integrating smart card authentication with single sign-on across clinical workstations
  • Handling access revocation for offboarded staff with active patient follow-up responsibilities
  • Applying context-aware access policies based on location, device, and time for remote access

Module 4: Securing Electronic Health Record (EHR) Systems

  • Configuring audit logging to capture all access and modifications to patient records
  • Implementing data masking for non-clinical staff viewing EHR interfaces
  • Enforcing encryption of EHR data at rest and in transit across distributed data centers
  • Validating vendor security controls during EHR module upgrades and patches
  • Establishing secure interfaces between EHR and laboratory or radiology information systems
  • Monitoring for anomalous query patterns indicating potential data exfiltration
  • Coordinating EHR downtime procedures with clinical continuity plans
  • Applying segmentation to isolate EHR application, database, and interface servers

Module 5: Third-Party and Vendor Risk Management

  • Conducting security assessments of cloud-based telehealth platform providers
  • Negotiating BAAs (Business Associate Agreements) with enforceable security clauses
  • Validating penetration test results from medical device manufacturers
  • Monitoring compliance of SaaS providers with ISO 27799 control objectives
  • Managing access provisioning for vendor support personnel using jump servers
  • Requiring evidence of secure software development lifecycle (SDLC) for clinical applications
  • Establishing incident notification timelines for third-party data breaches
  • Performing on-site assessments of data center providers hosting patient data

Module 6: Incident Response and Breach Management in Healthcare

  • Activating incident response protocols that include clinical leadership for care-impacting events
  • Preserving forensic evidence from medical devices without disrupting patient monitoring
  • Coordinating breach notifications with legal, compliance, and public relations teams
  • Classifying incidents based on patient harm potential, not just data exposure
  • Conducting tabletop exercises involving clinical, IT, and executive staff
  • Integrating SIEM alerts with clinical operations centers during ransomware events
  • Documenting root cause analysis for security events affecting medication administration systems
  • Reporting breaches to regulators within mandated timeframes across multiple jurisdictions

Module 7: Data Protection and Privacy Engineering

  • Implementing de-identification techniques for research datasets compliant with HIPAA Safe Harbor
  • Designing data retention policies that align with clinical, legal, and research requirements
  • Encrypting portable media used for patient data transfer between facilities
  • Applying data loss prevention (DLP) rules to outbound email containing clinical information
  • Validating anonymization methods for AI/ML training datasets
  • Managing patient data subject access requests (DSARs) through automated workflows
  • Enforcing data residency requirements for cross-border health information exchange
  • Implementing secure print release for sensitive patient reports in shared environments

Module 8: Security in Medical Device and IoT Environments

  • Creating network segmentation strategies for infusion pumps, MRI machines, and monitoring systems
  • Establishing patch management processes for devices with FDA-cleared configurations
  • Conducting vulnerability assessments without disrupting device functionality
  • Integrating device inventory with asset management systems for security tracking
  • Enforcing secure configuration baselines for new device procurement
  • Monitoring network traffic for unauthorized communication from medical IoT devices
  • Coordinating security updates with clinical engineering and vendor service agreements
  • Implementing zero trust principles for devices with static IP and legacy protocols

Module 9: Audit, Compliance, and Continuous Monitoring

  • Preparing for unannounced regulatory audits by maintaining real-time compliance dashboards
  • Mapping internal audit findings to ISO 27799 control objectives and sub-clauses
  • Configuring continuous controls monitoring for access review deadlines and policy exceptions
  • Generating automated reports for board-level cybersecurity governance committees
  • Validating control effectiveness through independent penetration testing annually
  • Integrating compliance data from cloud environments into centralized audit repositories
  • Responding to auditor requests for evidence without disrupting clinical operations
  • Updating control documentation following changes in clinical IT infrastructure

Module 10: Strategic Alignment and Executive Oversight

  • Translating cybersecurity risks into financial and operational impact for executive briefings
  • Aligning cybersecurity investments with clinical digital transformation roadmaps
  • Establishing key performance indicators (KPIs) for security programs tied to patient safety
  • Reporting cyber risk exposure to the board using heat maps and scenario analysis
  • Integrating cybersecurity into enterprise risk management (ERM) frameworks
  • Securing budget approval for security initiatives by demonstrating risk reduction per control dollar
  • Coordinating cybersecurity strategy with mergers, acquisitions, and hospital affiliations
  • Ensuring succession planning for chief information security officer (CISO) roles in healthcare settings