Download our Comprehensive AI Playbook for the Mid-Market:
Playbook: Eliminating Breach Risks — 2025 Edition for midmarket organizations. Download to learn more

Bridging the Compliance-Data Breach Gap in Healthcare
The healthcare industry is one of the most highly regulated in the United States. To help ensure patient safety and well-being, improve access to care, and protect patient privacy, healthcare organizations must comply with numerous rules and requirements.
When it comes to protecting patient health information, HIPAA is the gold standard. Its Privacy, Security, and Breach Notification Rules provide a strong compliance framework for the safety and confidentiality of protected health information (PHI), enforced by the HHS Office for Civil Rights.
Despite extensive guidance and rigorous oversight, healthcare remains one of the most breached industries. Recent research by Xtelligent Healthcare and commissioned by Pondurance revealed that 60% of healthcare providers experienced four or more system failures, cyberattacks, or breaches over the past year. This, even though 71% of providers surveyed prioritize maintaining HIPAA compliance over other considerations.
Which leads to a critical question: Why do compliance-focused healthcare organizations suffer from so many data breaches?
We’ll explore possible answers and provide actionable strategies in this latest series of articles, that focuses on breach risks especially facing smaller and midsized healthcare organizations. This first article covers organizational and governance challenges contributing to data breaches and how to mitigate these risk factors.
Organizational Risk Factors
In healthcare organizations, privacy, security, risk, and compliance teams often live in their own silos, each with its own priorities and leadership. Even security and IT teams may have competing priorities, creating misconceptions about the value of core security practices. These misconceptions occur because security activities may be viewed as impacting access required for patient care.
One such practice is vulnerability and patch management, which includes regular scanning, timely remediation, and verification through exploit testing. Through this process, security may identify vulnerabilities that need addressing. However, IT operations—tasked with keeping a robust and always-available set of critical systems running—may deprioritize or overlook patches that may risk disrupting services. Any unresolved vulnerabilities create an access point for attackers to exploit.
Because of their unique priorities and focus, IT and security may be considered separate functions within the organization. While this distinction has its benefits, it also creates a natural tension between competing objectives—especially when it comes to financial and other resources. An organization’s top leaders and board should consider both IT and security as equally important to the organization and to patients, and fund each team accordingly.
The Evolving Role of the CISO
Progressive healthcare organizations are removing departmental barriers that put patient data privacy and security at risk. In particular, many healthcare CISOs are absorbing privacy functions. They’re also taking on more of a business role, with greater exposure to the C-Suite and the organization’s board of directors.
IANS research reveals that CISO ownership of privacy increased from 35% to 47% over the past five years. “With the rise in data breaches, regulations, and regulatory scrutiny outside your legal, risk, or compliance functions, CISOs are becoming a natural fit to oversee privacy controls,” says Yunique Demann, senior director and data protection officer at NTT Data Americas.
And a Trellix survey found that 84% of CISOs believe their role should have both a business and technical focus. These findings emphasize the importance of a defensible security posture, where CISOs understand business outcomes, instead of focusing only technical details.
However, the global shortage of cybersecurity talent can make it difficult to attract and retain qualified employees, particularly experienced CISOs. And while many CISOs are learning to appreciate importance of data privacy, a trusted external partner can help bridge any gaps between an organization’s security and privacy teams.
Governance Risk Factors
Cybersecurity often has limited visibility at the board level, despite the board’s awareness of the frequency and security of healthcare data breaches. In 2024 alone, there were 703 data breaches of PHI impacting over 500 patients reported to HHS through their Office for Civil Rights (OCR).
Yet only 28% of CISOs are considered “strategic,” in that they hold significant influence within the organization and with top leadership. Despite the well-known prevalence of healthcare breaches, there’s a clear gap between board governance of security and privacy and the teams responsible for such crucial activities.
Several obstacles to better governance of healthcare organizations include:
Lack of cybersecurity background. Board members typically lack the knowledge and experience required to address today’s cyber threats. In addition, there is no roadmap for setting up a board committee to focus on these types of risks.
Over-focus on enforcement actions. An organization’s legal counsel will highlight “hotspot” issues that trigger enforcement actions, such as encryption. Other cybersecurity priorities are likely to be overlooked.
Communication gaps. While security leaders may understand risk and cyber threats from a technical perspective, they may be unable to translate this risk into business language

.png)