What Can a SIEM Tool Do for Healthcare Organizations?
The National Institute of Standards and Technology defines SIEM as an “application that provides the ability to gather security data from information system components and present that data as actionable information via a single interface.”
The primary value proposition for SIEM is its ability to bring a lot of security telemetry together, says Michelle Abraham, research director for security and trust at IDC.
“Rather than have that information in separate tools and have a security team look at identity, endpoint, network and email security solutions separately, SIEM brings it all together,” she says.
The advantage is correlation: Teams see a login attempt for a specific user ID on a specific device at a specific endpoint as a single incident, not three isolated events.
Kaufmann agrees. Endpoint security tools provide good insight for a single device but don’t paint the overall security picture. “Without a SIEM system, you miss the forest for the trees.”
READ MORE: vCISOs collaborate to defend against ransomware.
How Does SIEM Work as a First Line of Defense?
Most healthcare organizations couple the implementation of a SIEM tool with managed services from their chosen vendor.
These services can take many forms, says Michael Gregory, CISO and executive healthcare strategist at CDW Healthcare. Some organizations — particularly those based in geographic areas where skilled cybersecurity professionals are in short supply — may opt for a fully managed SIEM. Others might use managed services to augment in-house staff, especially for threat detection and response.
“You can have excellent people. You may even have a cybersecurity guru. But you need a collective,” Gregory says. “You can’t build your entire enterprise around one person. You need to be able to provide business continuity.”