Cybersecurity Experts Map the Critical Moments After a Hospital Data Breach

🎙️ Voice is AI-generated. Inconsistencies may occur.

The first few minutes after a data breach at a health care organization can be chaotic. At a recent Newsweek event, cybersecurity leaders offered advice on how to begin remediation.

The webinar, "Is Your Hospital Cyber-Safe? How to Anticipate Unseen Threats," took place on April 10. An expert panel, including Theresa Lanowitz (chief evangelist at LevelBlue, formerly AT&T Cybersecurity), Michael Adams (chief information security officer at Zoom) and Trent Sanders (vice president for U.S. healthcare and life sciences at Kyndryl) spoke to and took questions from an audience of health care decision-makers.

Attacks on hospitals, health systems and their partners are becoming more sophisticated and more frequent, the panelists agreed. They recommended that hospital leaders formulate a plan for worst case cyber scenarios.

In the first few minutes after a breach is identified, it's important to pull together relevant parties and begin working on next steps, Lanowitz said. This is where a formalized incident response plan really comes in handy—knowing who is responsible for what can ease confusion in stressful situations.

Cyber security - what steps to take
Cyber security - what steps to take Photo-illustration by Newsweek/Getty

Adams agreed that it is vital to walk through a mock plan before disaster strikes. However, he advised hospital leaders to be mindful when selecting their core response team.

He offered two considerations for compiling the roster: "One is, do I have enough of the people who are the subject matter experts, the stakeholders, the doers in the room? And then secondly, am I able to keep in check those people who actually aren't going to add value, but potentially come in the room and can disrupt the flow?"

Sometimes, people who never participated in those "red team" exercises end up on the final response team, Adams said. They may have questions about established protocols—or encourage others to move too fast and skip steps.

"What you want, ideally, is that plan to be real and agile and to have prepared the core group of folks who are going to do the work to be positioned to be successful," he said.

Sanders added that from the IT teams' perspective, the first step of any response plan is to isolate and contain the threat—then begin recovery efforts.

The business itself must go through similar remediations, Sanders said. If electronic health records are down, systems might have to switch to paper. That raises new questions: Does the hospital have enough paper? Enough ink?

"You have to bring together both the business and technology teams for a cohesive effort," Sanders said, "[so] we're in lockstep with how we bring our operation to support our patients."

He also told hospital leaders to familiarize themselves with their "protect surface," or the applications in their enterprise that house protected health information. If you don't know which systems could yield sensitive data if compromised, "that is where I would immediately start as you're prioritizing the next six to nine months," Sanders said.

A video of the full webinar is located at the top of this article.

About the writer

Alexis Kayser is Newsweek's Healthcare Editor based in Chicago. Her focus is reporting on the operations and priorities of U.S. hospitals and health systems. She has extensively covered value-based care models, artificial intelligence, clinician burnout and Americans' trust in the health care industry. Alexis joined Newsweek in 2024 from Becker's Hospital Review. She is a graduate of Saint Louis University. You can get in touch with Alexis by emailing a.kayser@newsweek.com or by connecting with her on LinkedIn. Languages: English


Alexis Kayser is Newsweek's Healthcare Editor based in Chicago. Her focus is reporting on the operations and priorities of U.S. ... Read more