IAM for Cyber Resilience: Protecting Healthcare Data from Advanced Persistent Threats

Authors

  • Fayazoddin Mulla Syed Company - Novartis Pharmaceuticals, Role – IAM Technical System Owner Author
  • Faiza Kousar E S Researcher at ieee Author
  • Erick Johnson Author

Keywords:

Identity and Access Management (IAM), Advanced Persistent Threats (APTs), Cyber Resilience, Multi-factor Authentication (MFA), Role-based Access Control (RBAC), Privileged Access Management (PAM), Healthcare Data Security.

Abstract

The increasing sophistication of cyberattacks, particularly Advanced Persistent Threats (APTs), poses significant risks to healthcare organizations, jeopardizing sensitive patient data and overall operational integrity. This paper investigates the role of Identity and Access Management (IAM) solutions in strengthening cyber resilience within healthcare organizations. By implementing robust IAM frameworks, healthcare institutions can mitigate the risks posed by APTs while ensuring compliance with regulatory frameworks such as the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR). The study highlights key IAM strategies, including multi-factor authentication (MFA), role-based access control (RBAC), and Privileged Access Management (PAM), which collectively contribute to enhanced security postures and regulatory compliance. In addition to analyzing real-world case studies, the research explores the evolving landscape of IAM technologies and their integration with artificial intelligence (AI) and machine learning (ML) to predict, detect, and respond to APTs in real-time. This paper concludes with recommendations for healthcare organizations to effectively implement IAM solutions for long-term cyber resilience and regulatory adherence.

Downloads

Download data is not yet available.

Downloads

Published

2020-07-10

How to Cite

IAM for Cyber Resilience: Protecting Healthcare Data from Advanced Persistent Threats. (2020). International Journal of Advanced Engineering Technologies and Innovations, 1(2), 153-183. https://ijaeti.com/index.php/Journal/article/view/586

Most read articles by the same author(s)

Similar Articles

1-10 of 507

You may also start an advanced similarity search for this article.