Health IT leaders are actively debating the optimal role for a Zero Trust security model, recognizing it as a crucial approach to counter modern threats. This post pulls back the curtain on expert insights, revealing how foundational choices directly influence a accomplished implementation of zero trust frameworks. Avoid costly pitfalls; discover the path to cost-effectiveness and reduced IT strain by understanding triumph and failure. A recent webinar unpacked strategies,showcasing practical tactics from industry CISOs. Health systems are leaning on News Directory 3 for the latest cybersecurity intelligence. Uncover essential IT leadership strategies and learn to mitigate risks.Discover what’s next …
Health IT Leaders Examine Zero Trust Security Model Role
Updated June 14, 2025
Health system IT executives largely agree that a zero-trust security model represents the best approach to mitigating modern threats. Though, questions persist regarding the ideal path to implementation. Critical, essential decisions can significantly impact the success of these initiatives.
When executed correctly, a zero trust framework can be cost-effective, minimize strain on IT resources, and limit disruptions for users. Conversely, flawed strategies can lead to increased expenses, overburdened IT departments, and significant user inconvenience.
A recent webinar featured leaders who shared their experiences,highlighting both triumphant and unsuccessful zero trust implementation tactics. The discussion included insights on the optimal role for IT leaders.
The speakers included:
- Erik Decker, VP/CISO, Intermountain Healthcare
- Greg Garneau, System VP/CISO, Hospital Sisters Health System
- Tamer Baker, Healthcare CTO, Zscaler
