Home
Categories
EXPLORE
Society & Culture
Technology
History
True Crime
Music
Comedy
News
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/ee/ba/68/eeba6875-d7fb-5df4-8298-b86764f44329/mza_7644882093918301965.jpg/600x600bb.jpg
healthsystemCIO.com
Anthony Guerra
972 episodes
3 days ago
healthsystemCIO.com Podcasts feature interviews and panel discussions with health system IT leaders.
Show more...
Technology
News,
Business News,
Tech News
RSS
All content for healthsystemCIO.com is the property of Anthony Guerra and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
healthsystemCIO.com Podcasts feature interviews and panel discussions with health system IT leaders.
Show more...
Technology
News,
Business News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/ee/ba/68/eeba6875-d7fb-5df4-8298-b86764f44329/mza_7644882093918301965.jpg/600x600bb.jpg
Baptist’s Case Says CISO Role is About Balancing Security Controls & Clinical Workflow Needs
healthsystemCIO.com
28 minutes 54 seconds
3 weeks ago
Baptist’s Case Says CISO Role is About Balancing Security Controls & Clinical Workflow Needs
James Case, VP/CISO, Baptist Health, frames his program around a single theme: balance. Case seeks to harden the enterprise against modern threats while protecting the speed and reliability clinicians require to deliver care. He argues that the test of any control is whether it reduces material risk without creating unnecessary friction at the bedside, in the OR, or across back-office operations.
Identity sits at the center of that balancing act, as credentials have become the preferred path for attackers. He emphasizes automation across the joiner-mover-leaver lifecycle to prevent permission creep and to react instantly when HR records change. “The bad actors are not breaking in as much as they are logging in,” he said.
Case explained that standards are tuned to clinical context rather than imposed uniformly. He pointed to operating suites and other critical areas where default lockouts and session timeouts can undermine safety. He said those settings are adjusted with clinical leaders so authentication never interrupts patient care, yet still records accountability and deters misuse. Case likewise supports risk-based step-ups for higher-sensitivity actions, reserving the strongest checks for activities that create the greatest exposure.
Calibrating MFA, Sessions, and Clinical Context
Multi-factor authentication is treated as a precision instrument. He partners with the CMIO and nursing leadership to map where frequent re-prompts would slow throughput and where stronger verification is warranted. Case measures both attack interception and caregiver experience, using alert volume, prompt frequency, and help-desk trends to recalibrate policies. He summarized the principle: “Security that blocks care is not security.”

Case also ties identity analytics to real-world shifts in duty. He links role changes to automated removals as well as additions so legacy access does not accumulate. He said the organization validates these flows routinely to close gaps created by one-off exceptions, temporary assignments, or vendor on-site work. Case’s team builds dashboards that highlight outliers—accounts with unused elevated rights or unusual access patterns—so remediation becomes a steady operational rhythm.
Consolidation, Costs, and Measured Risk
Platform overlap has become an opportunity to simplify and save. He reviews vendor portfolios regularly to eliminate duplicative features and retire aging tools, freeing funds for higher-value controls such as identity threat detection or improved email defenses. “When we add something, we have to take something away,” he said, noting that every security dollar is ultimately a patient-care dollar.
Case expects vendors to meet that responsibility with transparent pricing and credible roadmaps; in return, he consolidates capabilities where doing so decreases integration burden and sharpens visibility. He evaluates investments through a risk lens that includes patient impact, operational disruption, and measurable reduction in attack paths. Case also experiments in targeted ways—such as considering internal-only mailboxes for specific job codes that have no external correspondence needs—to remove entire categories of phishing risk without touching roles that depend on outside communication.
Governance Built on Shared Accountability
Effective controls stick when business leaders share ownership of risk. He uses formal committees to record decisions and informal conversations to preview impacts, so operational and clinical leaders can surface workflow nuances before a change hits production. Case brings recommendations, not just options, and pairs each with resource and risk implications to make tradeoffs explicit. He views that clarity as essential to keeping both security and service reliable.
Case’s governance model blends documentation with relationships. He ensures privacy, legal, audit,
healthsystemCIO.com
healthsystemCIO.com Podcasts feature interviews and panel discussions with health system IT leaders.