Back to all articles

Operational Resilience: Bridging the Gap Between Security Protocols and Clinical Continuity

Recent incidents in healthcare and preparations for major global events demonstrate that digital dependency is a fundamental safety issue. This analysis explores the practical realities of operating in an analog state and the importance of visibility in complex environments.

Triage Security Media Team
4 min read

On February 19, the University of Mississippi Medical Center (UMMC) managed a significant ransomware incident that disrupted its Epic electronic medical records platform and required the temporary closure of 35 clinics. Coincidentally, this event occurred on the same day the HBO series The Pitt aired a fictional storyline depicting a trauma center severing network connections to contain a threat. While the television drama resolved quickly, the UMMC security team faced the complex, extended reality of managing patient safety while critical infrastructure remained offline. This parallel demonstrates that the dependency on digital systems is not merely a technical concern but a fundamental matter of patient safety. The current frontier for defensive strategy lies in managing the gap between disconnecting systems for security and maintaining clinical continuity.

Industry experts analyzing the UMMC event observe that while fiction captures the initial chaos, it rarely depicts the rigorous work of recovery. In a scripted scenario, a decision to shut down a network may seem unilateral, but in practice, incident response requires balancing cyber risk against immediate patient harm. Modern healthcare workflows are deeply integrated with IT; when digital tracking boards and charting systems become unavailable, efficiency declines and operational risk increases. Recovery including a ransomware incident is often measured in weeks or months of "paper downtime." This reality suggests that resilience is defined not only by the speed of system restoration but by an organization’s ability to function safely in an analog state while the digital environment is compromised.

This requirement for operational resilience extends and the security planning for major international events. As professionals prepare for the 2026 FIFA World Cup, attention is turning toward protecting complex radio-frequency (RF) environments and wireless infrastructure. The tournament, spanning 16 stadiums across three nations, presents a vast surface area where threat actors may employ tactics similar to those observed in modern conflict zones. Just as hospital staff must revert to manual workflows, security teams at these venues must prepare for scenarios where the volume of signals from hundreds of thousands of personal devices masks malicious activity, such as jamming command-and-control signals or deploying unauthorized drone surveillance.

From a technical perspective, the threats in these environments stem from similar root causes: credential compromise and gaps in visibility. In the healthcare sector, unauthorized access often begins with compromised credentials, making the consistent application of Multi-Factor Authentication (MFA) a primary defensive control. For large-scale events, the challenge involves "spectrum complexity." Defenders must secure a dense RF environment where autonomous systems, public safety communications, and media infrastructure compete for bandwidth. Threat actors may attempt to exploit this congestion to hijack signals or harvest metadata. In both contexts, the central issue is visibility: security teams cannot defend against unauthorized movement, whether in a hospital network or legitimate stadium traffic—if they cannot detect it.

For defenders, effective protection requires moving from theoretical planning to validated resilience. In healthcare, this involves developing downtime procedures that address the specific friction points of clinical care, such as medication management, lab communications, and manual triage. One operational detail noted by experts is the necessity of stocking ballpoint pens for downtime kits, as felt-tip ink does not transfer through the triplicate carbon copies used for manual orders. These practical limitations often only surface during rigorous tabletop exercises and stress tests.

Similarly, securing major events demands a layered detection strategy. Security teams should integrate RF, radar, and optical systems to minimize blind spots in aerial and digital monitoring. International coordination is also essential; sharing threat intelligence across the US and Mexico requires protocols that are established and tested well before the event begins. The objective in any high-stakes environment is to normalize these security operations, making them a standard part of the daily routine rather than an emergency response.

The security community is also advocating for changes in how the industry processes the aftermath of these events. At the upcoming RSAC conference, researchers will discuss the need for greater transparency regarding security incidents. Unlike the aviation or medical industries, where accidents trigger public investigations to prevent recurrence, cybersecurity incidents are frequently handled as legal liabilities, limiting the release of technical details. This approach prevents the community from understanding the specific mechanics of a compromise. Most incidents result from a chain of minor gaps. Such as unpatched vulnerabilities or configuration drift—rather than a single catastrophic failure.

Without specific feedback loops, organizations may prioritize compliance tasks over evidence-based risk reduction. While the Cyber Safety Review Board (CSRB) was designed to address this need, administrative changes have currently left the board without active personnel, delaying investigations into significant events like the Salt Typhoon compromise of US telecommunications. Consequently, defenders often rely on congressional reports and regulatory filings to identify root causes, information that may take 18 months or more to become public.

The evidence from the current field indicates that for leadership, the technical details of an incident are secondary to the tangible impact on operations. Whether it is a trauma center managing patient throughput on dry-erase boards or a stadium processing automated ticketing, the priority remains the continuity of service. In this context, security functions as the guardian of the organization's ability to operate under pressure.

Sources & References
  • 1
    - University of Mississippi Medical Center ransomware attack: [Healthcare Dive](https://www.healthcaredive.com/news/university-of-mississippi-medical-center-ransomware-attack/812823/)