Skip to main content

Information Technology in ISO 27799

$349.00
How you learn:
Self-paced • Lifetime updates
Toolkit Included:
Includes a practical, ready-to-use toolkit containing implementation templates, worksheets, checklists, and decision-support materials used to accelerate real-world application and reduce setup time.
Your guarantee:
30-day money-back guarantee — no questions asked
When you get access:
Course access is prepared after purchase and delivered via email
Who trusts this:
Trusted by professionals in 160+ countries
Adding to cart… The item has been added

This curriculum spans the design and operationalization of information security governance in healthcare organizations, comparable in scope to a multi-phase advisory engagement addressing strategic alignment, risk management, and board-level reporting across clinical and IT domains.

Module 1: Strategic Alignment of ISO 27799 with Organizational Objectives

  • Decide whether to adopt ISO 27799 as a standalone framework or integrate it with existing ISO 27001 ISMS controls based on healthcare regulatory overlap.
  • Map clinical data protection requirements from HIPAA, GDPR, or PIPEDA to ISO 27799 control objectives to justify executive sponsorship.
  • Assess the maturity of current health information governance practices to identify gaps before initiating alignment initiatives.
  • Balance investment in technical controls versus policy development when resource constraints limit full-scale implementation.
  • Engage clinical leadership in defining acceptable risk thresholds for patient data access during after-hours emergencies.
  • Develop a prioritization matrix for implementing controls based on patient safety impact, legal exposure, and audit readiness.
  • Negotiate scope boundaries with legal and compliance teams to exclude legacy systems from initial rollout while documenting risk exceptions.
  • Establish KPIs for measuring alignment success, such as reduced incident response time or audit finding closure rates.

Module 2: Governance Framework Design for Healthcare Information Assets

  • Define ownership roles for electronic health record (EHR) data across departments, resolving conflicts between IT, clinical, and administrative stakeholders.
  • Implement a data classification schema tailored to healthcare data types (e.g., diagnosis, billing, genomic) with corresponding handling rules.
  • Select metadata tagging standards (e.g., HL7 FHIR, DICOM tags) to support automated policy enforcement across imaging and clinical systems.
  • Determine retention periods for different health record types based on jurisdictional requirements and clinical utility.
  • Design escalation paths for unauthorized access attempts involving senior clinicians or executives.
  • Integrate data governance workflows with existing change management processes for EHR upgrades and integrations.
  • Configure role-based access control (RBAC) models that reflect clinical workflows while minimizing privilege creep.
  • Establish thresholds for data access anomaly reporting that balance privacy protection with operational disruption.

Module 3: Risk Assessment and Management Specific to Health Data

  • Conduct threat modeling for telehealth platforms considering risks from home network vulnerabilities and unsecured patient devices.
  • Quantify residual risk for data sharing agreements with research institutions using ISO 27799 Annex C guidance.
  • Adjust risk appetite statements to reflect organizational exposure from third-party health information exchanges (HIEs).
  • Perform penetration testing on patient portal interfaces while ensuring no disruption to clinical operations.
  • Document risk treatment plans for systems with end-of-life status but ongoing clinical use (e.g., anesthesia machines with embedded OS).
  • Validate risk register accuracy through cross-referencing with audit logs and incident reports from the past 24 months.
  • Implement compensating controls for high-risk areas where technical solutions are not feasible due to medical device constraints.
  • Update risk assessments quarterly to reflect changes in threat landscape, such as ransomware targeting healthcare providers.

Module 4: Policy Development and Enforcement in Clinical Environments

  • Draft mobile device usage policies that permit secure access to EHRs while restricting camera and cloud storage functions.
  • Enforce password policies on clinical workstations without impeding emergency access through appropriate override mechanisms.
  • Implement just-in-time access provisioning for locum physicians with automated deprovisioning after shift completion.
  • Address policy non-compliance by nursing staff due to workflow inefficiencies by redesigning authentication processes.
  • Standardize encryption requirements for removable media used in radiology and home health settings.
  • Develop breach notification procedures that meet regulatory timelines while preserving forensic integrity.
  • Coordinate policy exceptions for research data collection with IRB-approved protocols and data use agreements.
  • Conduct policy effectiveness reviews using audit trails and helpdesk ticket analysis for access-related issues.

Module 5: Third-Party and Vendor Risk Management

  • Assess cloud EHR provider compliance with ISO 27799 controls through on-site audits or SOC 2 Type II reports.
  • Negotiate data processing agreements that enforce encryption, logging, and breach notification requirements.
  • Monitor subcontractor access to patient data in multi-tiered vendor arrangements (e.g., billing services using offshore support).
  • Implement vendor scorecards that include security incident frequency and patch management performance.
  • Manage risks from medical device manufacturers that retain remote access for maintenance and updates.
  • Require third parties to participate in joint incident response drills for data breach scenarios.
  • Enforce right-to-audit clauses in contracts with imaging centers and laboratory partners.
  • Track expiration dates of business associate agreements (BAAs) and initiate renewal processes 90 days in advance.

Module 6: Incident Response and Breach Management in Healthcare

  • Define criteria for classifying incidents involving patient data based on sensitivity, volume, and potential harm.
  • Activate incident response teams during clinical hours without disrupting patient care delivery.
  • Preserve logs from EHR, PACS, and nurse call systems for forensic analysis while maintaining system availability.
  • Coordinate communication with legal, PR, and clinical leadership during breach investigations to ensure message consistency.
  • Implement containment measures for ransomware attacks without shutting down life-critical monitoring systems.
  • Report breaches to regulatory bodies within mandated timeframes using standardized documentation templates.
  • Conduct root cause analysis for insider threats involving credentialed staff with legitimate data access.
  • Update incident response playbooks annually based on lessons learned from tabletop exercises and real events.

Module 7: Audit, Monitoring, and Continuous Control Validation

  • Configure SIEM rules to detect anomalous access patterns, such as after-hours record reviews by non-treating staff.
  • Balance monitoring coverage across EHR, pharmacy systems, and medical devices without overwhelming security operations.
  • Perform surprise audits of privileged user activity, including system administrators and clinical super-users.
  • Validate log integrity by implementing write-once storage and cryptographic hashing for audit trails.
  • Address alert fatigue by tuning correlation rules to reduce false positives from routine clinical workflows.
  • Integrate automated control testing into CI/CD pipelines for healthcare application deployments.
  • Conduct unannounced access reviews for departments with high staff turnover, such as emergency services.
  • Report control effectiveness metrics to the board using dashboards that highlight trends over time.

Module 8: Privacy by Design and Data Lifecycle Management

  • Embed data minimization principles into EHR customization projects to limit default field visibility.
  • Implement automated data anonymization for datasets used in training and research while preserving clinical utility.
  • Design data subject request workflows that fulfill patient right-to-access and right-to-erasure within legal deadlines.
  • Enforce retention policies through automated archiving and deletion processes with manual override controls.
  • Integrate privacy impact assessments (PIAs) into procurement processes for new health IT systems.
  • Manage de-identification risks in genomic and imaging data where re-identification techniques are evolving.
  • Coordinate data destruction methods (e.g., shredding, degaussing) with environmental and equipment safety policies.
  • Track data lineage across interfaces and integrations to support accountability during audits.

Module 9: Change Management and Security in Health IT Projects

  • Enforce security gate reviews at each phase of EHR upgrade projects, including pre-go-live vulnerability scanning.
  • Assess security implications of new clinical workflows enabled by telemedicine platform integrations.
  • Coordinate change advisory board (CAB) approvals for emergency patches affecting medication administration systems.
  • Validate backup and rollback procedures for database schema changes in patient registry systems.
  • Integrate security testing into agile sprints for mobile health application development.
  • Manage configuration drift in virtualized clinical desktop environments through automated compliance checks.
  • Document security decisions in change records to support audit trail completeness.
  • Train clinical super-users on secure configuration practices before deploying new modules.

Module 10: Executive Reporting and Board-Level Governance

  • Translate technical security metrics into clinical risk indicators for board presentations (e.g., % of critical systems patched).
  • Present cyber risk exposure in financial terms using cyber risk quantification models aligned with healthcare loss data.
  • Report on compliance status with ISO 27799 controls using heat maps that highlight high-risk domains.
  • Justify security budget requests by linking control investments to reduction in patient data breach likelihood.
  • Facilitate board discussions on risk acceptance decisions for systems with known vulnerabilities and no remediation path.
  • Update governance committees on emerging threats targeting healthcare, such as AI-driven phishing campaigns.
  • Align information security objectives with organizational strategic plans, such as hospital expansion or merger activities.
  • Document board decisions on risk treatment plans and ensure follow-up actions are tracked to completion.