Access Management , Governance & Risk Management , Identity & Access Management

A CISO Describes Why 'Identity' Is Central Aspect of Security

Joey Johnson of Premise Health Outlines a 3-Pillar Security Program
Joey Johnson, CISO, Premise Health

Joey Johnson, CISO of Premise Health, a Brentwood, Tennessee-based provider of online healthcare services, outlines a three-pillar security program in which "identity is the central aspect."

See Also: Zero Trust Webinar: Research Insights Exploring the Actionable, Holistic & Integrative Approach to Security

Johnson describes the first pillar as "understanding the data, where it is and how it behaves."

The second pillar involves who has access to that data. "Whether you're talking about customer identities, patient identities, provider identities or those of your workforce, you're dealing with the same dynamic of understanding what the asset is and how to bring some kind of continuity to it and ensure that you're provisioning access in ways that make sense," he says.

"Then the third pillar for us really is about automation and orchestration. … You need to leverage automation mechanisms to help provide visibility coverage."

In a video interview with Information Security Media Group, Johnson discusses:

  • Identity management challenges in the healthcare sector;
  • His three-pillar security program;
  • How "identity" drives business initiatives.

Johnson has been serving as CISO at Premise Health for 10 years. Premise delivers healthcare to large enterprises.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.