Skip to main content

Better Together: HealthEdge + UST HealthProof Merge Under Bain Capital

Explore Our Unified Capabilities

About us

We are trusted allies of health plans and organizations, simplifying their complex operational and quality challenges across all lines of business

Who we are

Market leaders with a commitment to excellence in healthcare technology and outcomes

right-arrow
Our Leadership

Our team of dynamic thought leaders and innovators, driving transformative change in healthcare technology

right-arrow

Join our team

Work with us to unburden healthcare and improve people’s health and wellbeing

JOIN US

menu_join our team.svg

What we offer

PRODUCT AND SOLUTIONS

BPaaS Ecosystem

Integrated ecosystem of best-in-class, scalable, turnkey solutions for health plans across all lines of business

Explore

HIGHLIGHTS

Our BPaaS advantage

Move from the burden of fragmented legacy systems to scalability, efficiency, and predictable outcomes

right-arrow

Our approach

How we consistently deliver value and earn the trust of our clients

right-arrow

Solution finder

Discover what works best for you. Use our intuitive solution finder tool to navigate through our suite of offerings and uncover tailored solutions designed just for you

GET STARTED NOW
menu_solutions-finder.svg

Core Administration

Suite of leading-edge core admin solutions designed to deliver outcomes with reduced costs across multiple lines of business

explore

SOLUTION GROUPS

Enrollment Plus™

Streamline enrollment processes and increase member satisfaction

right-arrow

Engagement Plus®

Next best actions for data-driven personalized care

right-arrow

Integration Plus®

Seamlessly integrate all your systems and data​

right-arrow

Workflow Plus®

Automate and optimize operations

right-arrow

Insitz Plus

Operational insights, better and faster​

right-arrow

Solution finder

Discover what works best for you. Use our intuitive solution finder tool to navigate through our suite of offerings and uncover tailored solutions designed just for you

GET STARTED NOW
menu_solutions finder.svg

Risk Adjustment

Proven technology and services solutions for health care plans and organizations, including Medicare Advantage

Explore

SOLUTION GROUPS

Retrospective Risk Adjustment Solutions

Improve reimbursement accuracy, optimize gap and chase, and streamline submissions

right-arrow

Prospective Risk Adjustment Solutions

Proactively close gaps at the point of care and maintain compliance

right-arrow

Solution finder

Discover what works best for you. Use our intuitive solution finder tool to navigate through our suite of offerings and uncover tailored solutions designed just for you

GET STARTED NOW
menu_solutions finder.svg

Quality Improvement and Stars

Proven, tailored programs combined with strong industry expertise to help plans measure, analyze, and implement quality and Stars strategies with impact

Explore

SOLUTION GROUPS

Stars Consulting Services

Pinpoint areas for improvement to maximize your Star potential

right-arrow

Quality360™ HEDIS® Engine i-button

Manage Quality performance with an end-to-end solution

HEDIS® is a registered trademark of the National Committee for Quality Assurance (NCQA)

right-arrow

Solution finder

Discover what works best for you. Use our intuitive solution finder tool to navigate through our suite of offerings and uncover tailored solutions designed just for you

GET STARTED NOW
menu_solutions finder.svg

Advisory Services

Expert advisory services help optimize core health plan operations, reduce costs, enhance compliance, and drive improved member satisfaction and scalability.

Explore

HIGHLIGHTS

Core Administration

Expert guidance that helps streamline core operations, lower costs, improve compliance, and enhance member satisfaction with scalable solutions.

right-arrow

Risk Adjustment

Strategic services that optimize risk adjustment accuracy, ensure data integrity, and support revenue integrity and regulatory compliance.

right-arrow

Solution finder

Discover what works best for you. Use our intuitive solution finder tool to navigate through our suite of offerings and uncover tailored solutions designed just for you

GET STARTED NOW
menu_solutions finder.svg

Who we help

As market leaders with decades of domain experience, we engage with a diverse range of sector, from commercial, to private to government, across all lines of business

LEARN MORE
Government-sponsored plans

Lower operating costs and improve outcomes with specialized solutions that meet regulatory requirements and member needs

right-arrow
Commercial/Private plans

Improved efficiency and lower costs delivered through Core Administration, Risk Adjustment, Quality and Care Management Solutions

right-arrow

Featured insights

BPaaS New Era Efficiency

Whitepaper

Next-generation BPaaS: A New Era of Efficiency for Health Plans

BPaaS
Doctor holding clipboard looking at screen

Whitepaper

Turning Gaps into Solutions: Advancing Provider Tools for Quality Care

Quality & Stars

Resources

Insights

Perspectives, best practices, and innovation for health plans from our team of experts and around the industry

EXPLORE

Case studies

Real-world success stories and solutions

right-arrow

Blogs & articles

Industry analyses, opinions, and trends

right-arrow

Webinars

Online seminars for industry education

right-arrow

Brochures

Detailed information on products and services

right-arrow

Videos

Insights from leadership, solution info, promotional clips and product demos

right-arrow

E-books

Digital guidebooks for payers

right-arrow

Whitepapers

In-depth reports and informative research

right-arrow

Knowledge hub

Simplifying complex information into easy-to-understand terms

right-arrow

Featured insights

Supplemental Data woman and man conversing

Knowledge hub

Using Supplemental Data Effectively for Stars and Quality Optimization

HEDIS
Why Mid-Size Payers are Uniquely Affected by Operational Inefficiency

E-book

Why Mid-Size Payers are Uniquely Affected by Operational Inefficiency

BPaaS
Healthcare worker writing on a clipboard

Case study

Fixing the Foundation Case Study

Core Administration

Podcast

Integrated ecosystem of best-in-class, scalable, turnkey solutions for health plans across all lines of business

EXPLORE

LATEST SEASON

podcasts small thumbnail

Season 4

Move from the burden of fragmented legacy systems to scalability

right-arrow

PAST SEASONS

Season 3

right-arrow

Season 2

right-arrow

Season 1

right-arrow

Latest episodes

podcasts thumbnail

Podcast

S4

Upcoming on Season 4

General
podcasts medium thumbnail

Podcast

S3 E10

No Analysts Needed

Core Administration
podcasts medium thumbnail

Podcast

S3

RADV Acceleration: What It Means for Medicare Advantage Plans

Risk Adjustment

Newsroom

News and updates about UST HealthProof, the healthcare industry, events, and more

EXPLORE

News

UST HealthProof in the news and 
industry updates

right-arrow

Events

Upcoming conferences and industry events

right-arrow

Press releases

Official UST HealthProof announcements 
and updates

right-arrow

Featured insights

UST HealthProof Operational Team

News

UST HealthProof Strengthens Healthcare Operations with Two New Leaders

General
Anniversary text

News

UST HealthProof Marks 9th Anniversary

General
Careers right-arrow

EXPLORE CAPABILITIES

BPaaS Ecosystem Core Administration Risk Adjustment Quality and Stars

POPULAR SEARCHES

search Care Management search Core Administration search BPaaS search Risk Adjustment search Industry Insights search Client Success Stories search Quality & Stars
Let's talk

EXPLORE CAPABILITIES

BPaaS Ecosystem Core Administration Risk Adjustment Quality and Stars

POPULAR SEARCHES

search Care Management search Core Administration search BPaaS search Risk Adjustment search Industry Insights search Client Success Stories search Quality & Stars
Listen on
Spotify logo
Spotify
Apple podcasts logo
Apple podcasts


Share

Copied to clipboard
Podcast
S3
E1
Last updated: Jan 10, 2024

Cyber Security Trends: Third-Party Security Assurances

Listen on
Spotify logo
Spotify
Apple podcasts logo
Apple podcasts

Introduction

Transcript

Preparation and a vigilant organizational mindset are critical to reducing the financial and reputational risk of cybersecurity incidents.  Join CISO, Hans Guilbeaux for an in-depth discussion on ways health plans can ensure their vendors have implemented industry best practices and are prepared for incident response with detailed disaster recovery and business continuity processes.

Guest Speaker

Hans Guilbeaux

UST HealthProof CISO

Hans Guilbeaux is the UST HealthProof CISO and has over 25 years of experience in network and infrastructure engineering, security systems administration, network penetration, vulnerability assessment, IT auditing, incident response, and forensics investigation. Hans is a Certified Information Systems Security Professional (CISSP), and a Certified CSF Professional (CCSFP).

References

HITRUST (n.d.). 5 Reasons Why You Should Trust HITRUST. Hitrustalliance.net. Retrieved April 16, 2024, from https://hitrustalliance.net/blog/5-reasons-why-you-should-trust-hitrust

IBM (n.d.). Cost of a Data Breach Report 2023. Www.ibm.com. Retrieved June 10, 2024, from https://www.ibm.com/reports/data-breach

Host: Today we’re talking about Cyber Security Trends & Third-Party Assurances with Chief Information and Security Officer, Hans Guilbeau. Hans has over 25 years of experience in network and infrastructure engineering, security systems administration, network penetration, vulnerability assessment, IT auditing, incident response, and forensics investigation. Hans is a Certified Information Systems Security Professional (CISSP), and a Certified CSF Professional (CCSFP). Welcome Hans.

Hans: Hey. I’m excited about our topic today and, really, this whole month, as you know, it’s Cybersecurity Awareness month.

Host: 100%. It’s an important topic that has far-reaching implications from industries all the way down to individual consumers. According to IBM’s Cost of a Data Breach report, the healthcare industry is one of the top five most impacted industries by cyber incidents.  

Hans: Yes, the healthcare industry is extremely lucrative for cybercriminals. It has the highest payouts. If cybercriminals were a nation-state, they would be the third largest nation in the world from a gross domestic product standpoint. Third, after the United States and China.  

Host: Wow. That’s a scary figure.  

Hans: Yes, the bad actors are ahead right now. And, every company needs to have the mindset that it’s not a matter of if, it’s a matter of when you’re going to get hit with a cybersecurity incident. Not necessarily ransomware, but some kind of cyber incident.  

Host: That sounds like it could be a controversial statement.  

Hans: Most definitely. But let me explain why it’s an important view to adopt. It means not only having defense systems in place, but also it means having a comprehensive response plan ready to go.  

Host: This makes sense. It’s preparing for the worst and hoping for the best.  

Hans: Exactly. If a company ends up in a cybersecurity incident, there’s financial risk that comes from different directions. Beyond, let’s say, the traditional idea of paying a ransom, you have to consider the trickle-down effect on a company’s reputation and potential loss of business, either in the form of new business or current business. The concept of preparing for ‘when’ it happens means that the company has thought through all of the different possible scenarios and ways to respond—from a cyber perspective all the way down to public relations and communication plans.

Host: Is there a way for health plans to verify that their vendors have these security processes in place and are prepared for cybersecurity incidents?

Hans: Yes, so there are industry certifications like HITRUST. HITRUST is an external cybersecurity audit for healthcare companies. It evaluates security frameworks for systems that house and manage PHI, and it incorporates compliance regulations from a variety of sources like HIPPA, GDPR, and others. So, going back to what I was saying earlier about being ready with a plan of action for how your company is going to handle a cyber incident, HITRUST helps to protect against an incident, detect, respond, and recover from an event. It’s comprehensive and takes about 9-10 months to complete the certification. It’s no small task. There are also external auditor-completed assessments by the AICPA, called SOC I Type II and SOC 2 Type II. SOC stands for System and Organization Controls. SOC I, Type II focuses on the controls around the financial systems and both the business and technical processes. And then, SOC 2, Type II focuses on the privacy security availability and some business processes.  

Host: Is it possible for a company to have all these certifications and still encounter a cybersecurity incident?  

Hans: Yes, so the certifications are great. The HITRUST 2024 Report states that less than 1% of organizations with their certification have reported a cybersecurity breach in the past two years. That’s a great number and an indication of proper controls and processes. But still, it’s not fool-proof. Cyber incidents can happen to any organization, sans certification.  

In addition to certifications, there has to be continual verification to support it. For example, we do tabletop ransomware exercises regularly just to ensure our controls, processes, and documentation are up to speed so if, or more likely, when it happens, A. We know what process and documentation to go for, and B. We know the steps we have to take to mitigate the risk. We also do incident response tabletops. One of the things I’ve had teams do in the past. Don’t try to make up some crazy incident that no one has experience with. Instead, go grab a past incident that we’ve dealt with, either internally or with a client, and make that the tabletop and run that exercise internally so we can make sure our processes and documentation are sound. It’s one thing to talk to an auditor and show them all the right evidence, but it’s another thing to test it. You don’t want to be testing it in a real-life situation.  

From a risk mitigation perspective, organizations have to look at people, processes, and technology. The process, if it doesn’t work, can introduce a vulnerability. From a technology breakdown perspective, incidents typically occur because a new entry point has been discovered and the vendor wasn’t fast enough to fix it. Cybercriminals can exploit the hole very quickly. We call this a zero-day vulnerability. It’s a vulnerability that is known to exist, it’s known that it can be exploited, but there’s no patch or technical fix for it. There are mitigating processes or things you can do, but that hole exists in your environment, and bad actors are actively going after it.  

Then you have people. The human factor is probably your biggest risk in any organization. Here’s the thing: you can patch systems, applications and software all day, but you can’t patch people. If someone is going to click on something, I can’t stop them. But, what I can do is have controls in place to mitigate that activity. If an employee holds the door open for someone instead of making them swipe their badge, or leaves their laptop open at a coffee shop. There are a thousand scenarios where people are the weak link. So, we put processes and technology in place to set boundaries for people. Ongoing education for employees is critical, so security is always top-of-mind, and as the cyber landscape evolves, employees are kept up to date. Some of the phishing emails have become quite sophisticated. It used to be fairly easy to identify a nefarious email, but now, with AI, honestly, it’s hard to tell. They’re getting pretty slick.  

If you remember the MGM/Caeser's hack that happened not too long ago. So here’s what happened: a member of the tech team that was being used to support their servers had a LinkedIn account that had information about where they worked, and what level they were, and then they had Facebook and social media accounts with personal information. The threat actors identified this individual as having highly privileged access to the MGM environment. They leveraged the information they gathered on the social media accounts to call the help desk and impersonate this tech team member. They got the help desk to reset the authentication credentials. So, the help desk was socially engineered based on too much information provided by the employee online.

Host: This brings me to a subject I’m pretty passionate about—online privacy. I’ve read all the Kevin Mitnick books and it’s really scary that as a society we’re providing all of this personal information to the world. We’re just putting it out there—pictures in front of our house with our street address, the name of our kids and pets, schools we attend. We post on our birthdays and our kid’s birthdays, and memorialize every special event online. We connect ourselves to people who tag us. It’s just not that hard to be a hacker in 2024 when we’re just giving the information away. As a company, we want our employees to support the company’s digital growth by proudly identifying themselves as part of the company, participating in employee of the month campaigns on LinkedIn, and reposting important company events. But, we also want to protect the company. What advice would you give to companies and employees about posting on LinkedIn?

Hans: That’s a good question. How much is too much? From a professional social media standpoint on LinkedIn, don’t list all the things you do. For example, my LinkedIn profile identifies me as the CISO, but it doesn’t list all of my duties. Your summary should be just that. I know some people use LinkedIn as their resume, but I advise against it. It’s okay to list your title and a high-level summary, but you don’t want to list everything you’ve ever worked on and are currently working on.

Host: Okay, that sounds like a sensical approach. Let’s jump back to the health plan vendor relationship. If you are a health plan vetting vendors, what would be a good line of questioning to ensure they have good security practices?  

Hans: Yeah, this is important. If I were a health plan in discussion with a vendor. I would ask: What type of incident exercises can you perform? What type of threat modeling do you utilize, and how do you come up with these exercises? Some will follow current industry trends or current notifications from the Center for Information Security Administration from the federal government.

How often do you run these exercises? What’s the basis for the exercises? Are they pie in the sky made up, or are they founded on real-life examples you’ve experienced in the past?  

What is your media plan for an incident? Are you ready? Have you identified who the spokespeople in the company are? Who can talk to the media? Probably, this is going to be a team composed of public relations, legal, and a security subject matter expert.  

What does the disaster recovery and business continuity process look like? If a vendor encounters an incident and has to temporarily shut down, who is the backup vendor? For the same process, there needs to be an A, B, and C alternative. It seems redundant, but it’s a failsafe. That’s the business continuity piece. Then there’s the IT piece for disaster recovery. You know, people think business continuity and disaster recovery are the same, it’s not.  

Host: In the health plan environment, what would that look like?  

Hans: Let’s say the claim’s processing vendor A goes down and we need to switch the vendor B. That’s change management. From an IT perspective, we would change the systems, the servers and applications to stop communicating and transmitting data from Vendor A and point them to Vendor B.  

Years ago, I worked in security for a motor company. Twice a year, they would conduct a drill where they would literally shut the entire operation down from the primary location, and shift it to a totally different location. They moved their people to different offices, and brought up a totally different data center, and ran on it for 36 hours. Dealerships were still selling cars, financing vehicles, and plants were still receiving orders to build vehicles—and none of them knew we had completely changed locations. Everything was business as usual. We called it Switch Over, Switch Back. Whether it’s healthcare, a motor company, or Amazon, every business should have those processes and testing in place. Move the people, processes, and technology with minimal downtime and disruption to the business. That’s the holistic view, protect people, process, and technology.  

Host: Hans, it’s been great having you on the podcast today. This conversation is a great contribution to the industry for Cybersecurity Awareness Month.  

Hans: You bet. I’ve enjoyed it. And again being part of cybersecurity awareness month, there’s multiple places you can go for that.  

Host: Thanks to our listeners. If you liked this episode, share it with your colleagues on LinkedIn, and follow on Apple and Spotify to be the first to know when new episodes drop.


Share

Copied to clipboard

Browse all Podcasts

VIEW ALL

Stars in Flux: CMS 2027 Changes

Podcast S4 E7
Stars in Flux: CMS 2027 Changes
Quality Improvement & Stars

Lessons From 2026 Enrollment

Podcast S4 E5
Lessons From 2026 Enrollment
Core Administration BPaaS

The Problem with Managing Multiple Vendors

Podcast S4 E5
The Problem with Managing Multiple Vendors
BPaaS

Let us help unburden your plan

Helping you to focus on what matters the most – your members' care

GET IN TOUCH

Footer

  • CAPABILITIES
    • BPaaS Ecosystem
    • Core Administration
    • Risk Adjustment
    • Quality Improvement and Stars
    • Advisory Services
  • ABOUT US
    • Who we are
    • Our leadership
    • Careers
  • WHO WE HELP
    • Government-Sponsored plans
    • Commercial/Private plans
  • RESOURCES
    • Insights
    • Newsroom
    • Podcasts
© UST HealthProof 2026 Privacy policy Terms Site map