← Back to Case Studies
350
Licensed Beds
1,820
FTE Employees
4
Sites / Clinics
1,240+
IoMT Devices
$342M
Annual Revenue
28,400
Admissions / Year
0
Dedicated CISO
3
Cybersecurity FTE

🏢 Organization Profile

1964
Year Founded
350
Licensed Beds
218 mi²
Primary Service Area
$342M
FY2024 Net Revenue

Background

Valley Regional Medical Center (VRMC) is a nonprofit, community-based acute care hospital serving Fairview County and surrounding areas of central Pennsylvania. Founded in 1964 as Fairview Memorial Hospital and reorganized under its current name in 2002 following a merger with Millcreek Community Health, VRMC operates a 350-bed main campus plus three outpatient and urgent care satellite sites.

VRMC is governed by a 12-member Board of Trustees drawn from community leaders, physicians, and regional business executives. The President and CEO reports to the board. VRMC is the only acute care hospital within a 40-mile radius and serves as the regional Level III Trauma Center for Fairview County. The health system employs approximately 1,820 FTEs across clinical, administrative, and support functions.

VRMC participates in the Pennsylvania eHealth Partnership (statewide HIE), maintains Joint Commission accreditation, and accepts Medicare/Medicaid reimbursement — all of which impose regulatory and contractual cybersecurity obligations. The health system does not have a dedicated Chief Information Security Officer; cybersecurity responsibilities are distributed across the CIO, the Privacy Officer, and a small IT security team.

Regulatory & Compliance Obligations

VRMC operates under multiple overlapping frameworks. The HIPAA Security Rule (45 CFR §164.300–318) requires administrative, physical, and technical safeguards for electronic Protected Health Information (ePHI). The HITECH Act strengthens HIPAA enforcement and mandates breach notification. The CMS Conditions of Participation require emergency preparedness plans covering information systems. FDA guidance on pre- and post-market medical device cybersecurity (2023) applies to networked clinical devices. Pennsylvania's Act 62 of 2018 requires breach reporting to the Pennsylvania Department of Health.

AttributeDetail
Legal NameValley Regional Medical Center (VRMC)
Headquarters2400 Fairview Blvd, Fairview, PA 17836
Organization TypeNonprofit Community Hospital (501(c)(3))
AccreditationThe Joint Commission (TJC) — Full Accreditation (renewed 2023)
Trauma DesignationLevel III Trauma Center — PA DOH certified
NPI1528374659
Medicare Provider39-1042 (CMS Certification Number)
HIPAA Covered EntityYes — Business Associate Agreements required with 120+ vendors
Health Information ExchangePennsylvania eHealth Partnership (PA HIP) — active participant
H-ISAC MemberYes — joined 2022, Health-ISAC subscriber
Cybersecurity Staff3 IT Security staff (no dedicated CISO)
Annual IT Budget$8.4M (~2.5% of revenue) — cybersecurity sub-line: $620K

🏭 Facilities & Locations

IDNameAddressTypeBeds / CapacityPhysical Security
FAC-01Main Hospital Campus2400 Fairview Blvd, Fairview, PAAcute Care / Trauma / Surgery350 licensed bedsCard access, CCTV (82 cameras), security desk 24/7
FAC-02Fairview North Outpatient Center850 Commerce Pkwy, Fairview, PAOutpatient / Imaging / Lab30 exam roomsCard access, CCTV, no 24/7 security — alarm only after hours
FAC-03Millcreek Medical Arts Building112 Millcreek Rd, Millcreek, PAMulti-specialty Physician Offices24 exam roomsShared building — standard door lock + alarm; limited CCTV (lobby only)
FAC-04Westside Urgent Care3300 Route 15, Fairview, PAUrgent Care (extended hours)12 treatment baysStandard commercial lock + alarm; no CCTV at clinical workstations
FAC-05Data Center / Server RoomMain Campus (Basement, Bldg A)Primary IT / Server InfrastructureBiometric + badge access, UPS, CCTV, raised floor, fire suppression
FAC-06Disaster Recovery Co-locationDataVault Corp, Harrisburg, PADR / Secondary Data CenterSOC 2 Type II facility — contracted DR site
Satellite Site Risk: FAC-03 (Millcreek Medical Arts) and FAC-04 (Westside Urgent Care) connect to the main EHR via site-to-site VPN. Neither site has a dedicated network closet — network equipment is in shared utility rooms accessible to all building tenants at FAC-03.
Critical Gap: Biomedical equipment at satellite sites (portable ultrasound units, infusion pumps) connects to the hospital wireless network over standard staff Wi-Fi with no VLAN isolation. A compromised satellite workstation could directly reach medical devices on the same segment.

👥 Organizational Structure & Staffing

Critical Finding: VRMC has no dedicated CISO and only three IT security staff supporting 1,820 employees, 1,240+ networked medical devices, and ePHI spanning four facilities. The CIO (Daniel Reyes) serves as the de facto security lead while simultaneously managing all IT operations, Epic EHR administration, and vendor relationships.
Dr. Margaret Holloway
President & CEO
Daniel Reyes
CIO / Acting CISO
Dr. Priya Nair
CMO
Karen Walsh
CFO
Rachel Ng
Privacy Officer
Sandra Wu
IT Director
Marcus Grant
IT Security Lead
Thomas Beaumont
Compliance Officer
Biomed Dept (4 techs)
Clinical Engineering

Name / RoleTitleDepartmentCybersecurity Assignment
Dr. Margaret HollowayPresident & CEOExecutiveNone formal — approves IT budget, receives annual risk summary
Daniel ReyesCIO / Acting CISOIT / SecurityAll IT strategy + de facto security oversight — overextended
Sandra WuIT DirectorIT OperationsManages IT staff; no formal security role
Marcus GrantIT Security LeadIT SecurityFirewall, endpoint, SIEM alerts — no formal CISSP/certifications
Kevin AlvarezIT Security AnalystIT SecurityLog review, vulnerability scanning — part-time security (50%)
Lisa TownsendIT Security AnalystIT SecurityEndpoint management, patch coordination — no OT/IoMT expertise
Rachel NgPrivacy OfficerComplianceHIPAA compliance, BAA management, breach response coordination
Thomas BeaumontCompliance OfficerComplianceRegulatory compliance (Joint Commission, CMS) — limited cyber focus
Biomed Team (4)Biomedical Engineers / TechsClinical EngineeringDevice maintenance only — no cybersecurity training, no device network visibility
45 Physicians (employed)Attending / Staff PhysiciansMedical StaffNone
640 Nursing StaffRN / LPN / CNAPatient CareAnnual HIPAA awareness only

Board Cybersecurity Oversight

The Board of Trustees has a Finance & Audit Committee but no dedicated Technology or Cybersecurity subcommittee. The CIO presents a brief IT update at the quarterly board meeting. A formal cybersecurity risk report has never been presented to the full board. Following a 2023 ransomware incident at a neighboring regional hospital, the CEO requested a "cybersecurity briefing" — a one-page summary was prepared but no formal governance action was taken.

🖥️ IT Asset Inventory

Servers & Core Infrastructure

Asset IDHostnameOS / PlatformFunctionLocationPatch StatusCriticality
SRV-01VRMC-EPIC-APP01Windows Server 2019Epic EHR Application Server (Primary)FAC-05 Data Center4 months behindCRITICAL
SRV-02VRMC-EPIC-APP02Windows Server 2019Epic EHR Application Server (Failover)FAC-05 Data Center4 months behindCRITICAL
SRV-03VRMC-EPIC-DB01Windows Server 2019 / SQL Server 2019Epic Database (Primary) — ePHIFAC-05 Data Center6 months behindCRITICAL
SRV-04VRMC-PACS01Windows Server 2016Radiology PACS / Imaging ArchiveFAC-05 Data Center8 months behindCRITICAL
SRV-05VRMC-DC01Windows Server 2022Active Directory Domain Controller (Primary)FAC-05 Data CenterCurrentCRITICAL
SRV-06VRMC-DC02Windows Server 2022Active Directory Domain Controller (Secondary)FAC-06 DR SiteCurrentCRITICAL
SRV-07VRMC-PHARM01Windows Server 2016Pyxis MedStation Integration ServerFAC-05 Data CenterVendor-managed — patches require vendor approval, avg 9 months lagHIGH
SRV-08VRMC-LAB01Windows Server 2012 R2Laboratory Information System (LIS)FAC-05 Data CenterEOL OS — no patches availableHIGH
SRV-09VRMC-VDI01VMware Horizon 8.x / Windows 10 VMsVirtual Desktop Infrastructure (clinical thin clients)FAC-05 Data Center3 months behind on guest OSHIGH
SRV-10VRMC-BACKUP01Linux (CentOS 7)Backup Server — Veeam B&RFAC-05 Data CenterEOL — CentOS 7 support ended June 2024CRITICAL

Workstations & End-User Devices

TypeCountOSLocationEndpoint ProtectionNotes
Clinical Workstations (COW)218Windows 10 (various patch levels)Main campus — nursing units, ED, ICUCrowdStrike Falcon — deployed, some stale agentsShared login in many nursing areas — no per-session MFA
Physician / Provider Workstations112Windows 10 / 11Offices, clinics, on-call roomsCrowdStrike Falcon — currentPhysicians use both domain and personal devices for Epic access
Administrative Workstations95Windows 10 / 11Admin offices, finance, HRCrowdStrike Falcon — currentMS365 deployed; MFA enforced for this group only
Satellite Site Workstations48Windows 10FAC-02, FAC-03, FAC-04CrowdStrike — 11 agents offline >60 daysConnect to Epic via site-to-site VPN — patching managed remotely
Nursing Station iPads64iPadOS 17.xAll nursing unitsMDM (Jamf) — enrolled; 9 devices non-compliantUsed for Epic Haiku, patient education apps
Biomedical Laptops8Windows 10Clinical Engineering deptNo EDR — excluded from domain, vendor requirementUsed for device firmware updates; direct device USB access

Business & Clinical Applications

ApplicationVendorFunctionHostingAuthenticationePHI
Epic EHR (Hyperspace)Epic SystemsPrimary Electronic Health RecordOn-premises (VRMC-owned)Username + password only (no MFA)YES — primary ePHI system
Epic MyChartEpic SystemsPatient portalEpic-hosted cloudMFA optional for patientsYES
Cerner RadNet PACSOracle HealthRadiology image archive & distributionOn-premisesUsername + password onlyYES
Pyxis MedStation ESBD (Becton Dickinson)Medication dispensing automationOn-premises (SRV-07)Username + PIN only — shared credentials on floor stationsYES (medication records)
Sunquest LISClinisysLaboratory Information SystemOn-premises (SRV-08, EOL)Legacy auth — no SSOYES
Microsoft 365 / ExchangeMicrosoftEmail, collaboration, TeamsMicrosoft CloudMFA enforced for admin only; clinical staff excludedYES — PHI routinely sent via unencrypted email
Workday HCMWorkdayHR, payroll, timekeepingSaaS (Workday cloud)SSO + MFA enforcedNo PHI — PII only
HealthStream LMSHealthStreamStaff training / compliance educationSaaSUsername + password; SSO partialNo PHI
Critical Gap: Epic EHR — the primary system for all patient care — does not require MFA for any clinical users. All 640 nursing staff and 45 employed physicians access ePHI on approximately 218 clinical workstations using shared login credentials. A single compromised account grants full ePHI access.

⚕️ Clinical Technology & IoMT Assets

Healthcare-Specific Risk: VRMC has 1,240+ networked medical devices (Internet of Medical Things — IoMT) connected across the hospital network. These devices include life-sustaining equipment such as infusion pumps, ventilators, and cardiac monitors. Many run legacy operating systems that cannot be patched, creating persistent, unmitigable vulnerabilities. VRMC's Clinical Engineering team manages device function but has no visibility into device network behavior.

High-Risk IoMT Devices

Asset IDDevice TypeManufacturerCountOS / FirmwareNetwork AccessCybersecurity Risk
IOT-01IV Infusion PumpsBaxter (Spectrum IQ)240Proprietary — firmware v4.1.1 (2 versions behind)Medical Device VLAN (10.20.0.0/16)CRITICAL — known CVE for unauth drug library override
IOT-02Patient Monitors (ICU)Philips IntelliVue MX80048VxWorks — vendor-managed patchingMedical Device VLAN — clinical VLAN bridging notedHIGH — limited network isolation
IOT-03Vital Signs MonitorsMindray VS-900120Linux embedded — firmware 2023.Q3 (current)Medical Device VLANMEDIUM — firmware current, network placement adequate
IOT-04VentilatorsMedtronic PB98022Proprietary embedded OS — no remote updatesAir-gapped (no network) — serial data logging onlyLOW — physically isolated
IOT-05CT ScannersGE Revolution CT3Windows 10 Enterprise LTSC (vendor-locked)Imaging VLAN (10.25.0.0/16) → PACSHIGH — Windows 10, vendor patch lag avg 12 months
IOT-06MRI SystemsSiemens MAGNETOM Altea2Windows 10 (vendor-managed)Imaging VLAN — physical access restrictedMEDIUM — vendor patch lag, physical controls adequate
IOT-07Cardiac Telemetry SystemGE MUSE / Centralstation1 (+ 68 transmitters)Windows 7 Embedded (EOL)Clinical VLAN — no segmentation from workstationsCRITICAL — EOL OS, flat network with clinical systems
IOT-08Medication Dispensing CabinetsBD Pyxis MedStation ES32Windows 10 (Pyxis-managed)Clinical VLAN → Pharmacy serverMEDIUM — shared credential concern; network access adequate
IOT-09Nurse Call / Intercom SystemsRauland Responder 51 (central) + 380 endpointsProprietary embeddedSeparate VLAN — physical networkLOW-MEDIUM — vendor-supported, VLAN isolated
IOT-10Portable Ultrasound UnitsPhilips Lumify (tablet-based)18Android (tablet) — enrolled in JamfStaff Wi-Fi — not on medical device VLANHIGH — on general staff Wi-Fi, MDM compliance inconsistent

Biomedical Device Management Program

VRMC's Clinical Engineering department (4 biomedical technicians) is responsible for preventive maintenance and repair of all clinical devices. Their mandate is device function and safety — they have no documented responsibility for cybersecurity, no access to network logs or traffic data, and no liaison relationship with IT Security. A medical device inventory exists in the computerized maintenance management system (CMMS — eMaint) but it does not capture IP addresses, MAC addresses, network segment assignments, or firmware versions.

Inventory Gap: VRMC's IT Security team estimates 1,240+ networked devices but cannot produce a current, accurate IoMT inventory with network attributes. During a voluntary H-ISAC threat hunt exercise in Q3 2024, security analysts discovered 47 devices communicating on network segments where they were not expected — including 9 devices whose presence could not be explained.

🌐 Network Architecture & Communications

Network Segments

SegmentVLANSubnetSystemsNotes
Clinical / EHR NetworkVLAN 1010.10.0.0/16Workstations, EHR servers, VDI, PACSPrimary care delivery network — high ePHI density
Medical Device (IoMT)VLAN 2010.20.0.0/16Infusion pumps, patient monitors, Mindray devicesPartial segmentation — ACLs in place, not micro-segmented
Imaging NetworkVLAN 2510.25.0.0/16CT, MRI, X-ray, PACS integrationConnects to PACS server; limited egress filtering
Administrative NetworkVLAN 3010.30.0.0/16Admin workstations, HR, finance, WorkdayMFA enforced for this segment; separate from clinical
Server / DMZVLAN 4010.40.0.0/24Web proxy, Epic MyChart relay, remote access gatewayDMZ exists but firewall rules not reviewed in 18 months
Guest / Patient Wi-FiVLAN 50192.168.50.0/22Patient and visitor wireless devicesIsolated — no route to clinical segments (verified)
Staff WirelessVLAN 6010.60.0.0/16Nursing iPads, Philips Lumify, some COWsIoMT devices incorrectly placed on this VLAN
Satellite VPN TunnelsVLAN 70172.16.10.0/24 – 172.16.40.0/24FAC-02, FAC-03, FAC-04 (site-to-site VPN)Cisco ASA site-to-site; FAC-03 tunnel uses pre-shared key only

Internet & WAN Connectivity

  • Primary Internet: 1 Gbps fiber (Comcast Business) — main campus; BGP failover not configured
  • Secondary Internet: 100 Mbps fiber (Windstream) — failover ISP; activated manually
  • Remote Access VPN: Cisco AnyConnect (main campus ASA) — used by ~200 remote physicians and vendor support staff; MFA via Duo enforced
  • Epic Remote Access: Epic Hyperspace via Citrix Published Desktop — requires VPN; MFA applies at VPN layer, not Epic application layer
  • Satellite Sites: Cisco ASA site-to-site VPN (IKEv2); FAC-03 uses legacy IKEv1 with weak PSK
  • DR / Cloud: AWS Direct Connect (dedicated 200 Mbps) to DataVault DR co-location; Epic cloud migration in progress (estimated completion Q3 2026)

Network Diagram

VRMC Network Architecture — Simplified Logical Diagram ┌─────────────────────────────────────────────────────────────┐ │ INTERNET / WAN │ └────────────────────────┬────────────────────────────────────┘┌────────────────────┴────────────────────┐ │ Palo Alto PA-3260 Firewall Cluster │ │ (Active/Passive HA — FAC-05) │ └────────────┬───────────┬─────────────────┘ │ │ ┌────────────┴──┐ ┌─────┴──────────────────┐ │ DMZ (VLAN 40) │ │ Core Network │ │ Web Proxy │ │ Cisco Catalyst 9500 │ │ MyChart Relay │ │ (Core Switch Pair) │ └───────────────┘ └──┬──────┬──────┬───────┘ │ │ │ ┌────────────────────┘ │ │ └─────────────────────┐ │ Clinical/EHR │ │ Admin Network (VLAN 30) │ │ VLAN 10 │ │ Admin Workstations │ │ 10.10.0.0/16 │ │ MFA Enforced │ │ Epic / PACS / VDI │ └──────────────────────────┘ └───────────────────────┘┌──────────────────────┴───────────────────────────────────────┐ │ Medical Device VLAN 20 (10.20.0.0/16) │ │ Infusion Pumps │ Patient Monitors │ Mindray VS │ │ ⚠ ACL-based isolation — NOT micro-segmented │ └───────────────────────────────────────────────────────────────┘ ┌─────────────────────────────────────────────────────────────┐ │ Staff Wireless VLAN 60 (10.60.0.0/16) — GAP │ │ Nursing iPads │ COW Carts │ Philips Lumify Ultrasound │ │ ⚠ CRITICAL: IoMT devices incorrectly on staff VLAN │ └─────────────────────────────────────────────────────────────┘ ┌─────────────────────────────────────────────────────────────┐ │ Imaging VLAN 25 (10.25.0.0/16) │ │ GE CT (x3) │ Siemens MRI (x2) │ → PACS Server │ └─────────────────────────────────────────────────────────────┘ ┌─────────────────────────────────────────────────────────────┐ │ Satellite Site VPNs (VLAN 70 / 172.16.x.0/24) │ │ FAC-02 North Clinic │ FAC-03 Millcreek │ FAC-04 Westside │ │ Cisco ASA site-to-site │ FAC-03 = IKEv1 weak PSK (⚠ Gap) │ └─────────────────────────────────────────────────────────────┘ [AWS Direct Connect — DR / Epic Cloud Migration in Progress]
Critical Gap: The GE cardiac telemetry system (IOT-07), running Windows 7 Embedded (EOL since 2020), is on VLAN 10 with clinical workstations. No compensating controls exist. A vulnerability in this device provides a direct path to all EHR workstations on the same segment.

🔐 Security Controls & Cybersecurity Posture

Control DomainTool / CapabilityCoverageStatus & Assessment
Perimeter FirewallPalo Alto PA-3260 (HA pair)Internet edge, DMZ segmentationDeployed — ruleset not reviewed in 18 months; 34 overly permissive rules identified
Intrusion Detection / PreventionPalo Alto Threat Prevention (IPS)Internet edge onlyIPS signatures outdated by 6 months; no east-west traffic inspection
Endpoint Detection & Response (EDR)CrowdStrike Falcon (Prevent)Admin + physician workstations (207 agents current)NOT deployed on: servers SRV-04, SRV-07, SRV-08, SRV-10; biomedical laptops excluded
SIEM / Log ManagementSplunk Enterprise (on-prem)AD, firewall, VPN, email — partialDeployed but under-resourced — 3,200+ unacknowledged alerts backlogged; no 24/7 monitoring
Multi-Factor AuthenticationCisco DuoVPN, admin accounts, Workday onlyNOT enforced for: Epic EHR clinical access, Microsoft 365 clinical users, satellite VPN (FAC-03)
Vulnerability ManagementTenable NessusIT systems — quarterly scans onlyIoMT devices excluded from scanning (vendor prohibition). 114 HIGH+ findings open >90 days
Email SecurityMicrosoft Defender for Office 365 (P1)Exchange Online / M365Anti-phishing deployed; PHI sent in unencrypted email identified as ongoing issue
Privileged Access ManagementNone deployedGAP — local admin accounts widely shared; no PAM solution
Data Loss PreventionNone deployedGAP — ePHI can be copied to USB drives or personal cloud storage without restriction
Medical Device SecurityMedigate (limited pilot)VLAN 20 only (partial)Pilot covers ~30% of IoMT devices; Staff VLAN 60 devices not visible to Medigate
Backup & RecoveryVeeam B&R 11 (SRV-10, EOL OS)Epic DB, AD, PACSBackup server on EOL CentOS 7; backup integrity not tested in 14 months; offsite copy to DR site, RTO unknown
Identity & Access GovernanceManual AD process + quarterly reviewsIT-managed accounts onlyTerminated employee accounts: 12 active accounts found not disabled post-departure in Q4 2024 review
Summary Gap Assessment: VRMC's cybersecurity control environment has significant gaps across all 10 C2M2 domains. The most critical patient safety risks are: (1) ransomware susceptibility due to no 24/7 monitoring and inconsistent patching; (2) IoMT device compromise potential due to flat network architecture; (3) wide ePHI exposure due to no MFA on Epic. The health system is not meeting the HIPAA Security Rule requirement for ongoing access review (§164.308(a)(1)).

🤝 Third-Party Relationships & Vendor Risk

VRMC has executed Business Associate Agreements (BAAs) with 123 vendors that access, process, or store ePHI. However, BAA execution is treated as a one-time compliance checkbox — no vendor is subject to ongoing cybersecurity assessment, SOC 2 review, or annual questionnaire. Vendor remote access is managed through a shared Cisco AnyConnect VPN account pool with no per-vendor isolation.

Epic Systems Corporation

EHR Vendor — Primary BAA Partner
  • Epic Hyperspace EHR (on-prem + cloud transition)
  • Epic MyChart patient portal
  • Epic Care Everywhere (HIE)
MEDIUM risk — Epic support requires periodic remote access for upgrades
BAA: Active (2019, auto-renewing)

BD (Becton Dickinson)

Medication Dispensing / Pharmacy Automation
  • Pyxis MedStation ES (32 cabinets)
  • Remote monitoring + patch management
  • Integration with Epic pharmacy module
HIGH risk — Pyxis server patch lag averages 9 months; vendor has persistent remote access
BAA: Active — no security questionnaire ever completed

GE HealthCare

Radiology & Cardiac Monitoring
  • Revolution CT scanners (x3)
  • MUSE Cardiac telemetry (Windows 7 EOL)
  • Remote servicing via dedicated VPN
CRITICAL risk — EOL cardiac system; GE remote access via unmonitored VPN channel
BAA: Active — no documented access review

Baxter International

IV Infusion Pump Manufacturer
  • Spectrum IQ infusion pumps (240 units)
  • DOSE Error Reduction Software (DERS) updates
  • Drug library management
CRITICAL risk — known CVE for unauthorized drug library modification; firmware update pending 8 months
BAA: Active — device security bulletin not acted upon

MedHelp IT Solutions (MSP)

Managed IT Services — Tier 1/2 Help Desk
  • 24/7 Tier 1 help desk (NOC monitoring)
  • Workstation imaging & deployment
  • Satellite site IT support (FAC-02–04)
HIGH risk — MSP has broad admin access; last security review 2021; SOC 2 Type I only
BAA: Active — MSP's subcontractors not tracked by VRMC

DataVault Corp

Disaster Recovery Co-location
  • DR server hosting (Harrisburg, PA)
  • AWS Direct Connect termination
  • Physical media destruction
LOW-MEDIUM risk — SOC 2 Type II facility; annual audit reports reviewed by VRMC
BAA: Active — most mature vendor relationship
Critical Gap: VRMC has never conducted a formal Third-Party Risk Management (TPRM) assessment for any of its 123 BAA partners. The Privacy Officer maintains a BAA tracker spreadsheet, but no vendor has been assessed for cybersecurity controls, incident response capability, or subcontractor risk. HIPAA §164.308(b)(1) requires covered entities to obtain satisfactory assurances from business associates — the current BAA-only approach does not meet this intent.

📋 Policies, Governance & Compliance

Existing Policy Documents

Policy NameStatusLast ReviewedNotes
Information Security PolicyExists — OutdatedMarch 2021Does not address cloud services, IoMT, or remote work scenarios added post-COVID
HIPAA Privacy & Security PolicyExists — CurrentNovember 2024Updated annually by Privacy Officer; strong privacy section, weak technical safeguards section
Acceptable Use Policy (AUP)Exists — Outdated2020Does not address mobile devices, BYOD, or clinical app downloads
Incident Response PlanExists — CurrentSeptember 2024Updated after neighboring hospital ransomware incident; tabletop exercise held Q4 2024
Disaster Recovery PlanExists — PartialJanuary 2023Covers infrastructure; does not address ransomware-specific recovery or EHR downtime procedures
Business Continuity PlanExists — PartialJanuary 2023Clinical downtime procedures exist; IT-specific BCP section not integrated with clinical plan
Vendor / Third-Party Risk PolicyNoneBAA execution process exists but no formal TPRM policy or vendor risk tiering
Medical Device Cybersecurity PolicyNoneNo formal policy governing IoMT network placement, patching, or decommissioning
Privileged Access Management PolicyNoneLocal admin account use is ad hoc; no formal PAM policy exists
Data Classification PolicyExists — Outdated2019Classifies ePHI but no enforcement controls; cloud data not addressed
Cybersecurity Awareness Training PolicyExists — Minimal2022Annual HIPAA awareness training required; no phishing simulation program
Patch Management PolicyExists — Weak2021Policy exists but exempts vendor-managed devices and clinical systems; no SLA for critical patches

Regulatory Framework Summary

Framework / RegulationApplicabilityCurrent Compliance Status
HIPAA Security Rule (45 CFR §164.300–318)Fully applicable — HIPAA Covered EntityAt risk — multiple Required Implementation Specification gaps
HITECH Act (45 CFR §164.400–414)Applicable — breach notification obligationsBreach notification SOP exists; response time SLA not tested
CMS Conditions of Participation (42 CFR §482)Applicable — Medicare/Medicaid certificationEmergency preparedness plan current; cybersecurity not separately assessed by CMS
FDA Post-Market Medical Device Cybersecurity (2023 Guidance)Applicable — networked clinical devicesNot formally implemented — no medical device cybersecurity program
PA Act 62 of 2018 (PA DOH Breach Notification)Applicable — Pennsylvania operationsPrivacy Officer tracks reportable incidents; no 2024 breaches reported
NIST Cybersecurity Framework 2.0Voluntary — recommended by HHS/OCRNot formally adopted; informal reference only by IT Security Lead
C2M2 v2.1Voluntary — assessment purposeNo prior formal evaluation — this exercise is the first
Joint Commission Information Management StandardsApplicable — TJC accreditationBasic IT governance documented; cybersecurity not a direct TJC survey focus

🎯 C2M2 Domain Assessment Preparation

The following summarizes pre-assessment findings for each of the 10 C2M2 v2.1 domains based on discovery interviews and documentation review. These ratings are indicative and serve as starting points for the assessment exercise. Participants should evaluate and challenge these preliminary findings during the exercise.

Indicative: MIL 1

🗂️ ASSET — Asset, Change & Configuration Mgmt

  • IT asset inventory maintained in ServiceNow (partially current)
  • IoMT inventory in CMMS (eMaint) — lacks network attributes (IP, MAC, VLAN)
  • No formal configuration baseline for clinical servers or network devices
  • Change management process exists for Epic; informal for infrastructure
  • 47 unexpected IoMT devices found during Q3 2024 threat hunt
Indicative: MIL 1

🛡️ THREAT — Threat & Vulnerability Mgmt

  • H-ISAC membership (2022) — threat bulletins received but response not tracked
  • Nessus quarterly scans — IT systems only; IoMT excluded
  • 114 HIGH+ vulnerabilities open >90 days
  • No formal vulnerability prioritization process
  • Vendor security bulletins (e.g., Baxter infusion pump CVE) not systematically tracked
Indicative: MIL 1

⚖️ RISK — Risk Management

  • Annual HIPAA Security Risk Assessment (SRA) conducted by Privacy Officer
  • Risk register exists in spreadsheet — 28 open items, limited remediation tracking
  • No formal risk acceptance process; IoMT risks not included in SRA
  • Board has not reviewed cybersecurity risk posture
  • Cyber insurance in place ($5M limit); last reviewed 2022
Indicative: MIL 1

🔑 ACCESS — Identity & Access Mgmt

  • Active Directory for user auth — 1,800+ accounts managed
  • MFA deployed only for VPN, admin accounts, Workday
  • Epic accessed via username + password only — no MFA for 640+ clinical users
  • 12 terminated employee accounts found active in Q4 2024
  • No PAM solution; shared local admin accounts on clinical systems
  • Shared login credentials used at nursing stations (workflow workaround)
Indicative: MIL 1

👁️ SITUATE — Situational Awareness

  • Splunk SIEM deployed — 3,200+ unacknowledged alerts backlogged
  • No 24/7 Security Operations Center (SOC) monitoring
  • Medigate IoMT visibility pilot covers ~30% of devices
  • No network traffic analysis (NTA) for east-west clinical traffic
  • H-ISAC threat intel received but not correlated with internal telemetry
Indicative: MIL 2

🚨 RESPONSE — Event & Incident Response

  • Incident Response Plan updated Sept 2024; covers ransomware scenario
  • Tabletop exercise completed Q4 2024 (ransomware/EHR outage scenario)
  • Incident response retainer with Mandiant (IR firm)
  • Clinical downtime procedures documented for EHR outage
  • Gap: No defined metrics for detection/response time; RTO for Epic not formally tested
Indicative: MIL 0

🤝 THIRD-PARTIES — Third-Party Risk Mgmt

  • 123 BAAs executed — no cybersecurity assessment for any
  • Vendor remote access via shared VPN pool — no per-vendor isolation
  • MSP (MedHelp IT) has broad admin access; last review 2021
  • GE and BD have unmonitored persistent remote access
  • No vendor incident notification SLA in any BAA
Indicative: MIL 1

👷 WORKFORCE — Workforce Management

  • Annual HIPAA awareness training required and tracked (90%+ completion)
  • No phishing simulation program
  • No cybersecurity-specific training beyond HIPAA basics
  • Background checks conducted at hire; no ongoing monitoring
  • IT Security Lead (Marcus Grant) has no formal cybersecurity certification
  • No defined cybersecurity roles for clinical or biomedical staff
Indicative: MIL 1

🏗️ ARCH — Cybersecurity Architecture

  • Perimeter firewall (Palo Alto) deployed — ruleset stale (18 months unreviewed)
  • Network segmentation exists but incomplete — IoMT on Staff Wi-Fi VLAN
  • No micro-segmentation; lateral movement possible across clinical VLAN
  • Cardiac telemetry (Windows 7 EOL) on clinical VLAN — no compensating control
  • Encryption: TLS for web apps; data at rest encryption not verified for PACS/LIS
Indicative: MIL 1

📋 PROGRAM — Cybersecurity Program Mgmt

  • No dedicated CISO; CIO serves as de facto security lead
  • Cybersecurity sub-budget of $620K (~0.18% of revenue)
  • Annual HIPAA SRA performed but not linked to C2M2 or NIST CSF
  • No formal cybersecurity strategic plan or roadmap
  • Board has not approved a cybersecurity program charter or risk appetite
  • Cyber insurance policy not reviewed post-2022

✏️ Exercise Discussion Questions & Scenario Injects

Assessment Questions

Q1 — Asset Management (ASSET domain):

VRMC's CMMS tracks 1,240+ medical devices by serial number and maintenance schedule but captures no network attributes. During a threat hunt, 47 unexpected devices were found on the network. What specific data elements should a healthcare-grade medical device inventory include, and which C2M2 ASSET practices apply? What is the business case for investing in a dedicated IoMT discovery and inventory platform (e.g., Medigate, Claroty, Armis)?

Q2 — Identity & Access (ACCESS domain):

Epic EHR — the primary ePHI repository — requires only a username and password for access by 640+ clinical staff. Nursing stations use shared credentials as a workflow accommodation. How do you balance clinical workflow efficiency with HIPAA's technical safeguard requirements for unique user identification (§164.312(a)(2)(i))? What compensating controls or alternative authentication approaches exist for high-turnover clinical environments?

Q3 — Threat & Vulnerability (THREAT domain):

Baxter issued a security bulletin 8 months ago regarding a known CVE in the Spectrum IQ infusion pump drug library that could allow unauthorized dose modification. VRMC has not acted on it. The device cannot be patched without Baxter on-site service. What immediate compensating controls should be implemented? How should VRMC develop a medical device vulnerability management program that accommodates vendor patch constraints under FDA post-market guidance?

Q4 — Situational Awareness (SITUATE domain):

VRMC's Splunk SIEM has 3,200+ unacknowledged alerts and no 24/7 monitoring. The Medigate IoMT visibility pilot covers only 30% of devices. Construct a prioritized monitoring strategy for VRMC given its three-person security team. What is the minimum viable SIEM use case set for a critical access healthcare environment? Should VRMC consider a managed SOC service, and what should they require in a healthcare SOC contract?

Q5 — Third-Party Risk (THIRD-PARTIES domain):

VRMC has 123 active BAAs with no cybersecurity assessments. GE HealthCare has unmonitored persistent VPN access to the cardiac telemetry system running Windows 7 EOL. BD (Baxter) has remote access to the Pyxis server with a known unpatched vulnerability. Using C2M2's THIRD-PARTIES domain and HIPAA §164.308(b), design a pragmatic vendor risk tiering program. Which three vendors should VRMC assess first and why?

Q6 — Architecture (ARCH domain):

The GE cardiac telemetry system runs Windows 7 Embedded (EOL) on the same VLAN as EHR clinical workstations. Network micro-segmentation and a firewall rule review have been on the IT backlog for 18 months. What compensating controls can be implemented immediately without disrupting clinical operations? Develop a network segmentation roadmap for VRMC prioritizing IoMT isolation, considering clinical workflow constraints and implementation cost.

Q7 — Program Management (PROGRAM domain):

VRMC's CIO serves as the de facto CISO while managing all IT operations. The Board of Trustees has never received a formal cybersecurity risk report. Using C2M2's PROGRAM domain practices, what organizational changes would establish a minimum viable healthcare cybersecurity governance structure? Draft the key elements of a Board-level cybersecurity risk briefing appropriate for hospital trustees with no technical background.


Scenario Injects (Optional Tabletop Extensions)

🚨 Inject A — Ransomware During Surgical Cases

Scenario: At 6:42 AM on a Tuesday, clinical staff begin reporting that Epic workstations are displaying a ransom note. The EMR is inaccessible. Two patients are currently in surgery. The OR team is working from paper downtime records. Three ICU patients on Baxter infusion pumps cannot confirm current infusion rates because the pharmacy integration is down. The ED has 14 patients in treatment bays.

  • What are your immediate clinical safety priorities in the first 15 minutes?
  • Who activates the IRP? Who notifies law enforcement and HHS OCR?
  • How does the clinical downtime procedure work if the printed downtime packets are stored on a network share that is also encrypted?
  • How do you communicate with physicians who rely on their personal smartphones for Epic access?
  • What are the HIPAA breach notification obligations and timeline?
💉 Inject B — Infusion Pump Anomaly Alert

Scenario: Medigate generates an alert at 2:15 AM indicating that 12 Baxter Spectrum IQ infusion pumps are communicating with an unexpected external IP address (185.220.x.x, flagged as Tor exit node). The IT Security Lead is not on-call — the overnight help desk escalates to the on-call IT Director who has no security training. Two of the affected pumps are in the Medical ICU administering vasopressors to critical patients.

  • Who is authorized to take clinical network segments offline? What is the clinical risk of isolating the medical device VLAN?
  • What is the escalation path at 2:15 AM when the Security Lead is unreachable?
  • How do you engage Baxter's emergency device security team?
  • What evidence collection must occur before systems are remediated?
  • How does this event trigger (or not trigger) mandatory HHS OCR breach notification?
🔗 Inject C — MSP Compromise (Supply Chain)

Scenario: MedHelp IT Solutions (VRMC's MSP) notifies VRMC on a Friday afternoon that they have detected a breach of their RMM (Remote Monitoring & Management) platform. MedHelp has broad admin access to VRMC's workstations, satellite site networks, and the VDI infrastructure. The breach is attributed to a nation-state actor targeting healthcare MSPs. MedHelp cannot confirm when access was first compromised — their logs only go back 30 days.

  • What are your immediate containment actions for MedHelp's access? How long will it take and what clinical disruption will result?
  • What HIPAA obligations does VRMC have if the MSP is a Business Associate?
  • How do you assess whether ePHI was accessed given MedHelp's limited log retention?
  • What C2M2 THIRD-PARTIES practices would have reduced this risk?
  • What contractual terms should VRMC require in future MSP agreements?

Remediation Planning Exercise

Constraints: VRMC's Board has approved a one-time cybersecurity improvement budget of $250,000 (FY2025 supplemental). The CIO must present a prioritized remediation roadmap at next month's board meeting. The roadmap must identify Quick Wins (0–90 days), Short-Term actions (90 days – 1 year), and Strategic investments (1–3 years). Staff capacity is limited — the security team cannot absorb more than 20 hours/week of new project work above BAU.

  • Which three security gaps represent the highest patient safety risk and should be addressed first?
  • Assign rough cost estimates and effort levels to the top 10 remediation items.
  • What is the business case for hiring a dedicated CISO, and what qualifications should VRMC prioritize for a healthcare CISO role?
  • Which controls, if implemented, would have the greatest impact on VRMC's HIPAA Security Rule compliance posture?
  • How would you communicate the risk/impact trade-offs to non-technical board members?