Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
3
4
5
7
8
10
11
12
15
16
17
18
19
21
24
25
26
27
30
31
1
2
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Adva Med 2014 The MedTech Conference
2014-10-06    
All Day
Adva Med 2014 The MedTech Conference October 6-8, 2014 McCormick Place Chicago, IL For more information, visit, advamed2014.com For Registration details, click here  
Public Health Measures Meaningful Use
2014-10-09    
12:00 pm - 12:45 pm
Public Health Measures Meaningful Use: Reporting on Public Health Measures Join Meaningful Use expert Jim Tate for a three part series of webinars addressing MU [...]
2014 Hospital & Healthcare I.T. Conference
2014-10-13    
All Day
Join us at our 2014 Hospital & Healthcare I.T. Conference and experience the following: Up to 125 Hospital & Healthcare I.T. executives from America’s most prestigious [...]
Connected Health Care 2014
Key Trends That will be Discussed at the Conference! Connected Healthcare 2014 is set to explore the crucial topics that are revolutionizing the connected health industry: [...]
HealthTech Conference
2014-10-14    
All Day
HealthTech Capital is a group of private investors dedicated to funding and mentoring new "HealthTech" start ups at the intersection of healthcare with the computer [...]
Health Informatics & Technology Conference (HITC-2014)
2014-10-20    
All Day
Information technology has ability to improve the quality, productivity and safety of health care mangement. However, relatively very few health care providers have adopted IT. [...]
HIMSS Amsterdam 2014
2014-10-20    
12:00 am
About HIMSS Amsterdam 2014 This year, the second annual HIMSS Amsterdam event will be taking place on 6-7 November 2014 at the Hotel Okura. The [...]
Patient Portal Functionality and EMR Integration Demonstration
2014-10-22    
2:00 pm - 3:30 pm
This purpose of this webcast is to present a demonstration to show how the Patient Portal integrates with EMR, as well as discuss how this [...]
Connected Health Symposium 2014
Symposium 2014 - Connected Health in Practice: Engaging Patients and Providers Outside of Traditional Care Settings Collaborating with industry visionaries, clinical experts, patient advocates and [...]
CHIME College of Healthcare Information Management Executives
2014-10-28 - 2014-10-31    
All Day
The Premier Event for Healthcare CIOs Hotel Accomodations JW Marriott San Antonio Hill Country 23808 Resort Parkway San Antonio, Texas 78761 Telephone: 210-276-2500 Guest Fax: [...]
The Myth of the Paperless EMR
2014-10-29    
2:00 pm - 3:00 pm
Is Paper Eluding Your Current Technologies; The Myth of the Paperless EMR Please join Intellect Resources as we present Is Paper Eluding Your Current Technologies; The Myth [...]
Events on 2014-09-30
Events on 2014-10-02
Events on 2014-10-06
Events on 2014-10-09
Events on 2014-10-13
Events on 2014-10-14
Connected Health Care 2014
14 Oct 14
San Diego
HealthTech Conference
14 Oct 14
San Mateo
Events on 2014-10-20
HIMSS Amsterdam 2014
20 Oct 14
Amsterdam
Events on 2014-10-23
Events on 2014-10-28
Events on 2014-10-29
Articles

Securing Healthcare with AI SOCs – Perfcon

How Security, AI, and SOCs Impact Healthcare Organizations

Artificial intelligence is becoming a key asset for security operations centers, streamlining routine tasks, enhancing threat detection, and enabling analysts to stay ahead of AI-powered threats.

Artificial intelligence serves as a force multiplier for security operations centers (SOCs), enabling healthcare organizations to address unique challenges related to patient safety, regulatory compliance, and the complexity of clinical and administrative systems.

AI accelerates the triage of noisy alerts and identifies subtle patterns across electronic health records, cloud logs, endpoints, and medical IoT devices. By linking seemingly harmless events into a unified view of an active threat, it helps detect and stop stealthy, long-running attacks that might otherwise evade human detection.

AI’s Impact on Today’s Security Operations Centers
In sectors like healthcare, where protecting patient data is paramount, AI-powered security operations centers (SOCs) provide a significant edge against increasingly advanced cyber threats.

According to Adam Khan, vice president of global security operations at Barracuda, AI is already transforming security operations by speeding up investigations and easing the burden on security teams.

“AI enables faster, more accurate threat detection and automates responses by analyzing large volumes of alerts across different security tools and environments,” he explains.

For instance, AI can identify suspicious behavior—such as a compromised Microsoft 365 account—and automatically revoke access within seconds, minimizing potential harm.

“This rapid, machine-level response reduces the risk of breaches and allows analysts to concentrate on more complex threats,” Khan adds.

Empowering Healthcare SOCs with Generative and Agentic AI
Generative AI transforms raw telemetry into actionable insights by summarizing incidents in plain language, generating containment scripts, and turning technical findings into executive-level updates that include potential regulatory impact.

Agentic AI takes it a step further by performing predefined, approved actions—executing response playbooks in a secure, least-privilege environment. It can initiate tasks like opening support tickets, isolating endpoints, or pulling identity risk signals, while keeping human oversight in place for critical decisions.

This approach also removes friction during handoffs by automatically escalating incidents to the appropriate teams using integrated asset inventories, on-call schedules, and incident response workflows. For instance, it can send alerts about unusual access to protected health information to the identity team, or route a clinical VLAN issue to the networking team.

“By combining retrieval-augmented generation with runbooks and historical cases, new analysts essentially gain an ‘on-call copilot’—improving speed, consistency, and decision-making while staying compliant,” says Tom Gorup, vice president of SOC operations at Sophos.

He emphasizes that AI agents are not “set it and forget it” tools. As AI models evolve, organizations must adapt and update their systems accordingly.

As healthcare IT environments shift—whether through new cloud infrastructure, applications, or endpoints—security leaders must ensure AI agents remain aligned with those changes. With evolving threats, updated playbooks are essential for effective response.

“This means healthcare SOCs will need to rethink their approach and make more targeted investments in AI than they have in the past,” Gorup adds.

Leveraging AI to Fill Cybersecurity Staffing Gaps
Michael Stempf, vice president of product experience at Commvault, emphasizes that automating high-volume, low-complexity tasks and investing in upskilling existing staff is essential to addressing the significant talent shortages in healthcare.

“AI takes on first-pass alert triage, log parsing, data enrichment, evidence collection, and correlates seemingly normal events to identify real threats,” he explains.

It automatically creates draft investigations and assigns or escalates them to the appropriate team members, eliminating delays caused by uncertainty about ownership. Additionally, AI accelerates onboarding by transforming institutional knowledge into searchable, context-aware guidance, enabling new analysts to navigate complex healthcare IT environments more quickly.

“This approach allows SOCs to function efficiently with fewer Level 1 analysts and enables senior staff to focus on threat hunting and handling complex incidents—so long as data access is well-managed and escalation protocols are clearly defined,” Stempf adds.