{"id":7500,"date":"2014-11-26T06:00:41","date_gmt":"2014-11-26T14:00:41","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7500"},"modified":"2015-10-07T15:22:48","modified_gmt":"2015-10-07T22:22:48","slug":"2015-predictions-healthcare","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2014\/11\/2015-predictions-healthcare\/","title":{"rendered":"2015 Predictions: Healthcare"},"content":{"rendered":"<p><em>As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 predictions content <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/2015-predictions\/\" target=\"_blank\">here<\/a>.)<\/em><\/p>\n<p><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:59%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-7442 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg\" alt=\"2015 Predictions Image-01\" width=\"500\" height=\"295\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-500x295.jpg 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-230x135.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-510x300.jpg 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/2015-Predictions-Image-01-67x40.jpg 67w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/p>\n<p>2015 will be a year of transition for security in healthcare where providers and organizations in the ecosystem catch up with other industries regarding the state of their cybersecurity.<\/p>\n<p>In many ways, healthcare is in technology and information overload, with no clear standardization on architecture, delivery or design. When evaluating healthcare security, it\u2019s also important to look at the entire ecosystem, small to large hospitals, healthcare insurers, healthcare application providers, medical equipment manufacturers and to some extent pharmaceutical and bio companies. Why? They all carry information related to patient medical data, and intellectual property tied to healthcare innovation.<\/p>\n<p>With that in mind, here are some 2015 trends to track:<!--more--><\/p>\n<p><strong>1. Going Back to Basics<\/strong><\/p>\n<p>You will see healthcare organizations better emphasize visibility<strong> visibility and network segmentation, <\/strong>in terms of:<\/p>\n<ul>\n<li>Knowing what\u2019s on the network at all times<\/li>\n<li>Making informed decision on where to invest in security first<\/li>\n<li>Identifying rapidly the areas that are high risk<\/li>\n<li>Methodically and logically starting to remove traffic that does not belong to the business of healthcare<\/li>\n<li>Implementing a better and more systematic approach to patching<\/li>\n<\/ul>\n<p><strong>2. Driving Better Awareness<\/strong><\/p>\n<p>We\u2019re starting to see an evolution in the employee culture and decision-making power within healthcare organizations. Security\u2019s awareness among key stakeholder groups \u2013 administrative employees, medical staff, patients and visitors and others \u2013 will continue to grow.<\/p>\n<p>Culturally speaking, healthcare organizations will hopefully adopt more of a prevention mindset and foster greater collaboration within the broader ecosystem of healthcare providers, payers, pharmaceutical companies and medical device companies.<\/p>\n<p><strong>3. Security Automation<\/strong><\/p>\n<p>Security automation will become table stakes for security in healthcare because of the high volume of information and the flow of data.<\/p>\n<p>&nbsp;<\/p>\n<p>Speaking of healthcare security, Palo Alto Networks will be at the\u00a0<a href=\"https:\/\/urldefense.proofpoint.com\/v2\/url?u=http-3A__www.sans.org_event_healthcare-2Dsummit-2D2014&amp;d=AwMF-g&amp;c=V9IgWpI5PvzTw83UyHGVSoW3Uc1MFWe5J8PTfkrzVSo&amp;r=4XKtn8ik4y9TyjJVe3FT826XDCmKHBENWKGzOrhHDNI&amp;m=RmDL2wMjyF_SHSA0khj8rexJc2tsvwgWwl1tB1FFXbQ&amp;s=UFISd65-rPMaexdsU6beWLZ4S-71mmFWwuXlAOqEsR0&amp;e=\" rel=\"nofollow,noopener\" >Healthcare Cyber Security Summit<\/a>\u00a0next week, December 3 and 4, in San Francisco, and I will be participating in\u00a0a Breakfast Panel from 8:00-9:00 am PT on December 4, \u201cEven More Future-Proofing: Continuing the Conversation on Healthcare Security Solutions.\u201d <a href=\"https:\/\/www.sans.org\/registration\/register.php?conferenceid=36735\" rel=\"nofollow,noopener\"  target=\"_blank\">Register today<\/a> with the code\u00a0<strong>HCPA20 <\/strong>and get a\u00a020% discount.<\/p>\n<p><em>Security in healthcare\u00a0is among many focus topics at <a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\" target=\"_blank\">Ignite 2015<\/a>, where you will tackle your toughest security challenges, get your hands dirty in one of our workshops, and expand your threat IQ.\u00a0<a href=\"https:\/\/ignite2015.paloaltonetworks.com\/portal\/createAccount.ww\" target=\"_blank\">Register now<\/a> to join us March 30-April 1, 2015 in Las Vegas \u2014 the best security conference you\u2019ll attend all year.<\/em><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/content\/campaigns\/ignite\/2015\/index.html\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:27.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter wp-image-7354 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg\" alt=\"PAN_IC15_web_logo-1\" width=\"500\" height=\"138\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1.jpg 400w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-230x63.jpg 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2014\/11\/PAN_IC15_web_logo-1-145x40.jpg 145w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As 2014 comes to a close, our subject matter experts check in on what they see as major topics and trends for the new year. (You can read all of our 2015 &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,138,229],"tags":[925],"coauthors":[706],"class_list":["post-7500","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-healthcare","category-predictions","tag-2015-predictions"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7500"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7500\/revisions"}],"predecessor-version":[{"id":7507,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7500\/revisions\/7507"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7500"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}