Case Study: How a Healthcare Platform Won $3.8M in Contracts Using a Fractional CISO Instead of a $300K Full-Time Hire
Company: NexHealth Systems | Stage: Series B, $20M raised | Industry: Healthcare IT (EHR integration middleware) | Employees: 95 | HQ: Austin, TX | Security staff at engagement start: Zero
Certifications achieved: HIPAA compliance attestation, SOC 2 Type II (clean unqualified opinion), HITRUST i1 certification
Timeline: 12 weeks
Contracts won post-certification: $3.8M across three hospital system deals
Annual savings vs. full-time CISO: $200K+
The Situation
NexHealth Systems was solving one of the most persistent problems in healthcare IT: electronic health record systems do not talk to each other. Hospitals run Epic. Clinics run Allscripts. Specialty practices run Cerner. Health app developers need data from all of them. The result is a fragmented landscape where patient data lives in silos, interoperability is a constant struggle, and health systems spend millions on point-to-point integrations that break every time a vendor updates their API.
NexHealth built a unified API layer — middleware that connected Epic, Cerner, Allscripts, and 15 other EHR platforms through a single integration point. A hospital could plug into NexHealth once and immediately exchange data with every EHR system in NexHealth's network. A health app developer could use one API to pull patient records from any connected system. The product was technically elegant, well-engineered, and genuinely useful. Hospitals loved it. Health app developers loved it. The sales pipeline was growing.
But NexHealth had grown to 95 employees without ever hiring a security professional. Not a CISO. Not a security engineer. Not even a compliance analyst. The company had raised $20M in Series B funding, built a product that processed Protected Health Information across dozens of hospital systems, and had exactly zero people whose job it was to secure that data.
The CTO, Dr. Yuki Tanaka, was a brilliant engineer who had architected the EHR integration layer from scratch. She understood distributed systems, API design, and the technical complexities of healthcare data exchange at a level few people in the industry could match. But security was the thing she did "when she had time," which was almost never. Between managing a 40-person engineering team, overseeing product roadmap, and handling technical escalations from hospital IT departments, Dr. Tanaka could dedicate roughly 2 hours per week to security-related work. That meant security reviews did not happen. Risk assessments did not happen. Policy documentation did not happen. Incident response planning did not happen.
The cracks appeared not in a breach — NexHealth was fortunate on that front — but in the RFP process. Three health systems rejected NexHealth's proposals within a 6-month period. Each rejection followed the same pattern: the hospital's security team evaluated NexHealth as a vendor, asked standard questions about security governance, and found nothing.
Lakewood Medical Center — a $1.4M annual contract for EHR integration across their 6-hospital network — rejected NexHealth with this feedback: "Vendor does not employ a qualified CISO or equivalent security leader. Section 4.2 of our vendor security requirements mandates identified security leadership with healthcare compliance experience."
Pinnacle Health Network — a $1.2M deal for their multi-state clinic network — was more blunt: "Unable to verify compliance posture. No SOC 2 report, no HIPAA documentation, no HITRUST certification. Recommend re-evaluation once vendor achieves baseline compliance."
Columbia Regional Medical — another $1.2M opportunity — did not mince words: "No security program documentation provided. Risk rating: High. Recommend: Do Not Proceed until vendor demonstrates security governance."
Dr. Tanaka attended the Pinnacle rejection meeting in person. She sat across from Pinnacle's CISO, who walked through the vendor security assessment line by line. When he asked Dr. Tanaka to describe NexHealth's access control policy, she realized she could not — because they did not have one. When he asked about their incident response plan, she said, "We would handle it." When he asked about their last risk assessment, the answer was never. The meeting lasted 12 minutes.
The board meeting that followed was uncomfortable. One board member — herself a former hospital CIO who had spent 20 years in health system IT — was direct: "You are processing PHI for 95 employees with zero security governance. This is not a sales problem. This is an existential risk problem. Fix it."
CEO Erik Johansson faced two options. Option one: hire a full-time CISO. In healthcare, a qualified CISO with the credentials and experience that hospital systems expect — someone with HITRUST assessor experience, HIPAA expertise, and the ability to interface with hospital security teams — commands $280K to $350K per year in base salary, plus benefits, equity, and the 4-6 months of ramp time before they are productive. At $20M raised with a 24-month runway, that was a significant allocation for a role where 60% of the ongoing work could be outsourced.
Option two: QuickTrust's vCISO model. A fractional CISO embedded at 10 hours per week — $8K to $12K per month — who would serve as NexHealth's named security leader, build the compliance program, and drive the certifications NexHealth needed to win hospital contracts.
Johansson chose QuickTrust. The engagement: a vCISO at 10 hours per week on an ongoing basis, plus a Continuous Compliance Program sprint to achieve HIPAA compliance, SOC 2 Type II, and HITRUST i1 certification in 12 weeks.
"A full-time CISO at $300K would have spent the first 6 months learning our systems and building from scratch. QuickTrust gave us a CISO on day one who had already done this 50 times. The math wasn't even close." — Erik Johansson, CEO, NexHealth Systems
The Challenge
The scope of the problem extended well beyond missing certifications. NexHealth had no security program at all — no policies, no controls, no governance, no accountability. Building one from zero while simultaneously pursuing three compliance certifications in 12 weeks required confronting six distinct challenges.
Zero security leadership. NexHealth had no CISO, no security engineer, and no compliance analyst. Dr. Tanaka was the de facto "security person" by virtue of being CTO, but she could dedicate at most 2 hours per week. There was no one in the organization whose primary responsibility was security. No one owned risk management. No one owned compliance. No one owned incident response. The security function did not exist.
Three frameworks needed simultaneously. Hospital systems each required different compliance evidence. Some wanted SOC 2 reports. Some wanted HIPAA documentation. One specifically required HITRUST i1 certification. NexHealth could not cherry-pick one framework and hope it would satisfy every prospect. They needed all three — HIPAA compliance attestation, SOC 2 Type II with a clean opinion, and HITRUST i1 certification — to eliminate compliance as a deal blocker across their entire sales pipeline.
PHI exposure was significant. NexHealth's middleware processed Protected Health Information across its entire API layer. ePHI flowed through every service, every database, every log. This was not a SaaS platform with a small PHI footprint where patient data touched one isolated microservice. PHI was the product. Every API call, every data transformation, every log entry potentially contained patient identifiers, diagnoses, medication lists, lab results, and insurance information. The attack surface was the entire application.
95 employees with no security awareness. No security training had ever been conducted at NexHealth. There was no acceptable use policy. No data handling guidelines. No rules about PHI in non-production environments. Engineers were copying PHI into development environments for debugging — a direct HIPAA violation. Customer support was sharing patient data via Slack messages to resolve tickets. These were not malicious acts; they were the natural result of a company that had never told its employees how to handle sensitive healthcare data.
34 vendors processing healthcare data. NexHealth's EHR integration business model meant extensive vendor relationships. Thirty-four technology vendors had some level of access to or processing of healthcare data — cloud infrastructure providers, monitoring tools, analytics platforms, EHR API partners, and third-party libraries. Of those 34 vendors, only 8 had signed Business Associate Agreements. The remaining 26 represented unmitigated HIPAA liability. None of the 34 had been formally assessed for security posture.
Board-level accountability gap. The board had no visibility into security risk. No metrics, no reporting, no dashboard, no regular briefing. They learned about the compliance problem not through a governance process but through lost deals. The board could not evaluate risk because no one was measuring it. They could not hold leadership accountable for security because no one owned it.
Why QuickTrust's vCISO + Continuous Compliance
QuickTrust proposed a combined engagement that addressed both the immediate certification gap and the ongoing security leadership vacuum.
First: immediate vCISO placement. QuickTrust would embed a fractional CISO at 10 hours per week to serve as NexHealth's security leader. This was not a consultant who drops in quarterly to review documents. The vCISO would attend weekly leadership meetings, own the security strategy, respond to security questionnaires from hospital prospects, present to the board, and serve as the named CISO on NexHealth's organizational chart. When a hospital asked "Who is your CISO?", NexHealth would have a name, a title, and 25 years of healthcare cybersecurity credentials behind that answer.
Second: a certification sprint. HIPAA compliance attestation, SOC 2 Type II, and HITRUST i1 certification — all three in 12 weeks. QuickTrust's Continuous Compliance Program would build the security program, implement the controls, draft the policies, manage the audits, and deliver the certifications.
Third: ongoing Continuous Compliance. After the certifications were achieved, the vCISO would continue at 10 hours per week to maintain compliance, manage renewals, handle new vendor assessments, respond to security questionnaires, and evolve the security program as NexHealth grew.
The vCISO assigned to NexHealth was Dr. Amara Osei. Her credentials matched exactly what hospital security teams expected to see: 25 years of healthcare cybersecurity experience, former CISO at two health systems (one a 12-hospital network, one a regional medical center), HITRUST Certified CSF Assessor, CISSP, CISM, and HCISPP certifications, and a track record of building compliance programs for healthcare technology companies.
Dr. Osei started on Day 1. Her first week at NexHealth: she attended the Monday leadership team meeting (introduced as NexHealth's vCISO), reviewed the Lakewood, Pinnacle, and Columbia rejection letters in detail, and conducted a rapid security posture assessment — a 3-day sprint to understand what NexHealth had, what they did not have, and what the gap looked like.
Her assessment was sobering but actionable. She told Erik Johansson directly: "You have good engineers who built a good product. What you do not have is a security program. There is no policy framework, no risk register, no access governance, no incident response capability, and no vendor management. We are going to build all of it in 12 weeks, and I am going to run it for you on an ongoing basis."
Implementation
Weeks 1-2: Security Program Foundation
Dr. Osei's first action was establishing the security program charter — a governance document defining the purpose, scope, authority, and reporting cadence of NexHealth's security program. The charter established the vCISO as the accountable security leader, defined quarterly board reporting, and set the scope of the program to cover all systems, employees, and vendors that process or access PHI.
Next came the risk register. This was the first formal risk assessment in NexHealth's history. Dr. Osei conducted interviews with engineering leads, reviewed architecture documentation, examined cloud infrastructure configurations, and assessed vendor relationships. The result: 38 identified risks, 12 rated as high or critical.
The top 5 risks required immediate attention:
- PHI in development environments. Engineers had been copying production patient data into development and staging environments for debugging and testing. This was a direct HIPAA violation and one of the most common compliance failures in healthcare technology companies.
- 26 vendors without Business Associate Agreements. Of 34 vendors processing healthcare data, only 8 had executed BAAs. The remaining 26 represented unmitigated regulatory liability.
- No access reviews. No process existed for reviewing who had access to what. Former employees still had active accounts. Engineers had broad access to production PHI databases that exceeded their job requirements.
- No encryption key management. Encryption was inconsistent. Some databases were encrypted at rest, others were not. Key rotation was not configured. No formal key management policy existed.
- No incident response plan. If a breach occurred, NexHealth had no documented process for detection, containment, notification, or remediation. HIPAA requires breach notification within 60 days of discovery, and individual states impose shorter timelines — NexHealth had no awareness of these requirements.
Dr. Osei implemented quick wins immediately, before the formal policy framework was complete:
- PHI scrubbed from all development environments. A 3-day emergency sprint with the engineering team identified every non-production environment containing real patient data. Production PHI was replaced with synthetic test data generated using a HIPAA-compliant data masking tool. A technical control was implemented to prevent production database snapshots from being restored in non-production environments.
- Slack PHI sharing shut down. The customer support team had been sharing patient information in Slack channels to resolve support tickets. Dr. Osei shut down this practice on Day 3, replacing it with a compliant ticketing system with appropriate access controls and audit logging.
- Emergency BAA outreach initiated. Dr. Osei's team sent BAA requests to all 34 vendors, prioritizing the 26 without agreements. This was tracked in the risk register with weekly status updates.
Weeks 2-4: Policy Framework and Vendor Management
With the immediate risks addressed, Dr. Osei built the policy framework. Fifteen policies were drafted covering the requirements of all three target frameworks — HIPAA Security Rule, SOC 2 Trust Services Criteria, and HITRUST CSF.
HIPAA-specific policies included:
- PHI Handling Policy: Defined how PHI could be accessed, stored, transmitted, and disposed of across all NexHealth systems. Specified minimum necessary standards — employees could only access the minimum PHI required to perform their job function.
- Breach Notification Procedure: Mapped breach notification requirements across all 50 states (each state has different notification timelines — some as short as 30 days) plus the federal HIPAA requirement of 60 days from discovery per 45 CFR Section 164.408. Defined roles and responsibilities for breach response, including legal counsel notification, HHS reporting, and individual notification.
- Workforce Sanctions Policy: Defined consequences for policy violations, from additional training for inadvertent violations to termination for willful misuse of PHI.
General security policies covered access control, change management, incident response, business continuity, data classification, acceptable use, encryption, logging and monitoring, vulnerability management, and third-party risk management.
Vendor assessment was a parallel workstream. All 34 vendors were assessed for security posture using a standardized questionnaire based on HITRUST third-party assurance requirements. Results:
- BAAs executed with all 26 previously uncovered vendors, bringing the total to 34 of 34 — complete coverage.
- 3 vendors flagged as high-risk based on their assessment results: no SOC 2 report, inadequate encryption practices, and insufficient access controls.
- 2 of the 3 high-risk vendors were replaced with compliant alternatives. The third — a niche EHR integration partner with no viable replacement — received a risk acceptance with documented mitigation controls (network segmentation, enhanced monitoring, and a 90-day remediation deadline).
Security awareness training launched in Week 3. Dr. Osei deployed KnowBe4 across all 95 employees with a custom healthcare module covering PHI handling requirements, phishing recognition, device security, and incident reporting procedures. The training was mandatory. One hundred percent of employees completed it within 10 business days. Monthly phishing simulations were established as an ongoing program — the first simulation in Week 4 had a 23% click rate, providing a baseline for improvement.
Weeks 4-8: Technical Control Implementation
With policies in place, the team implemented the technical controls required across all three frameworks.
Identity and Access Management. Okta SSO was deployed as the central identity provider, integrated with AWS IAM Identity Center for cloud infrastructure access. Role-based access control was implemented with four primary roles — clinical data engineers (full PHI access within their assigned integrations), API engineers (limited PHI access for debugging, read-only), customer support (access to patient identifiers only, no clinical data), and management (dashboard and aggregate reporting only). Quarterly access reviews were automated through Okta workflows — every 90 days, managers received access review requests for their direct reports and were required to confirm or revoke access within 5 business days. Privileged access management was implemented for production PHI database access using a break-glass procedure: production database access required approval from the vCISO or CTO, was logged with full audit trail, and automatically expired after 4 hours.
Encryption. AWS Key Management Service was configured for all PHI at rest across RDS databases, S3 storage, and EBS volumes. TLS 1.3 was enforced for all API endpoints handling PHI in transit. Field-level encryption was implemented for high-sensitivity PHI fields — Social Security numbers, diagnoses, and medication lists received an additional layer of encryption beyond the database-level encryption, ensuring that even database administrators with broad access could not read these fields without explicit key access.
PHI access logging and monitoring. Every API call that touched PHI was logged with: user identity, timestamp, data accessed (scoped to patient ID), stated purpose, and source IP address. These logs were fed into Datadog SIEM for centralized monitoring. Anomaly detection rules were configured for unusual PHI access patterns — bulk data exports exceeding normal thresholds, access outside business hours, access to patients outside a user's assigned facility scope, and rapid sequential access to multiple patient records. Alerts routed to the vCISO and on-call engineering lead.
Static Application Security Testing. GitHub Advanced Security was deployed across all repositories with CodeQL for static analysis, secret scanning to detect credentials committed to code, and dependency review for vulnerable third-party libraries. Blocking merge gates were configured: any pull request with critical or high severity findings could not be merged until the findings were resolved or explicitly accepted with documented justification.
Patch management. AWS Systems Manager was configured for automated patching across all EC2 instances and containerized workloads. Patch SLAs were defined: critical vulnerabilities patched within 14 days, high severity within 30 days, medium within 90 days. Compliance reporting was automated and fed into the security dashboard.
Backup and disaster recovery. Cross-region RDS backup was configured with encryption for all backup snapshots. Automated DR testing was scheduled quarterly — a full restoration test in the DR region to verify backup integrity and measure recovery metrics. Recovery targets: RTO of 4 hours (time to restore service) and RPO of 1 hour (maximum data loss window).
Incident response. The incident response plan was drafted with HIPAA-specific requirements baked in: breach notification within 60 days of discovery per 45 CFR Section 164.408, state-specific timelines where shorter, HHS notification procedures, individual notification letter templates, and media notification requirements for breaches affecting 500 or more individuals. A tabletop exercise was conducted in Week 7 — the scenario involved unauthorized PHI access by a former employee whose access had not been revoked (a realistic scenario given NexHealth's pre-engagement state). The exercise tested detection, containment, investigation, notification, and remediation. Time from detection to containment in the practice run: 45 minutes.
Weeks 8-10: HITRUST i1 Specific Preparation
HITRUST i1 certification requires implementation of 219 controls from the HITRUST Common Security Framework across 19 domains. Many of these controls overlap with SOC 2 and HIPAA requirements, but HITRUST has specific implementation expectations and evidence requirements that go beyond what the other two frameworks demand.
Dr. Osei mapped the controls already implemented for SOC 2 and HIPAA to the HITRUST CSF requirement set. The result: 74% of HITRUST i1 requirements were already satisfied by the work completed in Weeks 1-8.
The remaining 26% fell into four categories:
- Physical security documentation. HITRUST requires documented physical security controls even for cloud-native companies. NexHealth documented their office physical security (badge access, visitor logs, clean desk policy) and mapped AWS physical security controls via AWS's SOC 2 report and shared responsibility model documentation.
- Asset management controls. A formal asset inventory was created covering all hardware (employee laptops, mobile devices) and software (SaaS applications, cloud services, open-source libraries). Asset classification was applied based on PHI exposure.
- Privacy controls. HITRUST includes privacy-specific requirements beyond HIPAA's Privacy Rule. NexHealth documented data subject rights procedures, data retention schedules, and privacy impact assessment processes.
- Security governance documentation. HITRUST requires specific governance artifacts — security program charter (already completed in Week 1), security committee meeting minutes, risk management methodology documentation, and metrics reporting.
All control responses and supporting evidence were populated in the HITRUST MyCSF portal. Dr. Osei, leveraging her HITRUST Certified CSF Assessor experience, ensured that evidence packages met assessor expectations — a common failure point for organizations attempting HITRUST certification for the first time.
Weeks 10-12: Audits and Certification
The final two weeks were dedicated to audit execution and certification delivery.
HIPAA compliance attestation. There is no formal "HIPAA certification" — no certifying body issues a HIPAA certificate. Instead, NexHealth underwent a third-party HIPAA risk assessment conducted by an independent assessor. The assessment covered all requirements of the HIPAA Security Rule (administrative, physical, and technical safeguards), the HIPAA Privacy Rule (as applicable to a business associate), and the HIPAA Breach Notification Rule. The result was a clean assessment with no critical findings and a comprehensive compliance documentation package — risk assessment report, policy library, control evidence, and training records — that could be provided to any hospital prospect requesting HIPAA compliance verification.
SOC 2 Type II. The SOC 2 observation period had started in Week 4, running concurrently with control implementation. The 8-week observation window provided sufficient evidence of control operating effectiveness. The audit was conducted by an independent CPA firm. Result: clean unqualified opinion across all five Trust Services Criteria (Security, Availability, Processing Integrity, Confidentiality, and Privacy). Zero exceptions noted.
HITRUST i1 certification. The validated assessment was submitted through the MyCSF portal. The external assessor reviewed control implementations, tested evidence, and validated NexHealth's self-assessment scores. HITRUST i1 certification was issued — a significant milestone that immediately differentiated NexHealth from competitors in hospital procurement processes, where HITRUST is increasingly treated as a prerequisite rather than a preference.
Dr. Osei presented all three certifications at the next board meeting, alongside the security program dashboard. The dashboard displayed real-time metrics: overall risk posture score, number of open risk items by severity, compliance status across all three frameworks, employee training completion rates, phishing simulation results (click rate trending from 23% in Month 1 to 8% by Month 3), vendor assessment status, and mean time to respond to security questionnaires.
Ongoing: Continuous Compliance
With certifications achieved, the engagement transitioned to ongoing Continuous Compliance management. Dr. Osei continues as NexHealth's vCISO at 10 hours per week. Her ongoing responsibilities include:
- Weekly leadership meeting attendance — security is a standing agenda item, not an afterthought
- Monthly board security briefing — dashboard review, risk posture update, and strategic recommendations
- Quarterly access reviews — automated through Okta, reviewed and approved by Dr. Osei
- Monthly phishing simulations — results tracked, repeat clickers receive additional targeted training
- Quarterly risk register updates — new risks identified, existing risks re-evaluated, mitigation progress tracked
- Annual policy reviews — all 15 policies reviewed and updated to reflect changes in regulations, technology, and business operations
- SOC 2 renewal and HITRUST annual validation — managed end-to-end by the vCISO
- New vendor assessments — every new vendor is assessed for security posture and BAA compliance before onboarding
- Security questionnaire response management — Dr. Osei handles hospital security questionnaires directly, eliminating the 3-week delay that previously plagued NexHealth's sales process
The Results
| Metric | Before QuickTrust | After QuickTrust |
|---|---|---|
| Security leadership | None | Named vCISO (Dr. Amara Osei, 25 years healthcare cybersecurity) |
| HIPAA compliance | No documentation | Full compliance attestation with third-party risk assessment |
| SOC 2 | None | Type II, clean unqualified opinion |
| HITRUST | None | i1 certification issued |
| Time to achieve all three | N/A | 12 weeks |
| Internal engineering hours required | N/A | 18 hours total |
| PHI in development environments | Yes (active HIPAA violation) | Scrubbed and technically prevented |
| PHI sharing via Slack | Yes (active HIPAA violation) | Eliminated, replaced with compliant ticketing |
| Vendors with BAAs | 8 of 34 (24%) | 34 of 34 (100%) |
| Security awareness training | Never conducted | 100% completion, monthly phishing simulations |
| Phishing simulation click rate | Not measured | 23% (Month 1) trending to 8% (Month 3) |
| Security questionnaire response time | ~3 weeks ("we'll get back to you") | 2-day turnaround (vCISO handles directly) |
| Annual cost of security leadership | $0 (no security leader) | $120K/year (vCISO) vs. $300K+/year (full-time CISO) |
| Annual savings vs. full-time CISO | N/A | $200K+ |
| RFPs won post-certification | 0 of 3 | 3 of 3 |
| Revenue from won contracts | $0 (3 rejected RFPs) | $3.8M ($1.4M Lakewood + $1.2M Pinnacle + $1.2M new prospect) |
| Board security visibility | None | Monthly dashboard with risk scores, metrics, and strategic reporting |
What They Said
"I was pretending to be a CISO with 2 hours a week. Dr. Osei is an actual CISO with 25 years of healthcare security experience. The difference is night and day. My engineers no longer come to me with compliance questions — they go to her. I can finally focus on what I was hired to do: build the product." — Dr. Yuki Tanaka, CTO, NexHealth Systems
"The board used to ask me about security risk, and I would improvise an answer. Now Dr. Osei presents a security dashboard with real metrics: risk scores, open items, training completion, vendor assessments. The board stopped asking me about security — they get the answers from our vCISO directly. That is what a security program looks like." — Erik Johansson, CEO, NexHealth Systems
"We went from 'we'll get back to you on security' to 'here's our trust center with SOC 2, HIPAA documentation, and HITRUST certification.' The two hospitals that rejected us? Both came back. Both signed. The compliance problem was the only thing standing between us and $3.8M in revenue." — Diana Reeves, VP Sales, NexHealth Systems
"NexHealth didn't have bad security — they had no security program. The engineers had good instincts but no framework, no policies, no accountability. Building the program took 12 weeks. Maintaining it takes 10 hours a week. That's the vCISO model: build it fast, run it efficiently, scale it as the company grows." — Dr. Amara Osei, vCISO (QuickTrust), NexHealth Systems
Key Lessons
Not every company needs a full-time CISO. The fractional vCISO model provides enterprise-grade security leadership at a fraction of the cost. NexHealth saves more than $200K per year compared to a full-time CISO hire — and gets a security leader with 25 years of healthcare-specific experience who has built this exact program dozens of times before. A full-time hire at $300K would have spent 4-6 months ramping up. The vCISO was productive on Day 1.
The "who is your CISO?" question kills deals. Health systems and large enterprises expect identified security leadership. It is not enough to say "our CTO handles security." Hospital procurement teams want a named, credentialed CISO with a title, a reporting structure, and demonstrable healthcare compliance experience. Having a vCISO who can attend vendor security review meetings, answer technical questions in real time, and present credentials that hospital CISOs respect — that satisfies the requirement completely.
PHI in development environments is the most common healthcare compliance violation. It is also the fastest to fix once identified. NexHealth's engineers were not acting maliciously — they were copying production data to debug issues because no one had told them not to and no technical control prevented it. A 3-day sprint to scrub development environments and implement preventive controls eliminated the risk entirely.
BAA coverage is table stakes. Twenty-six vendors without Business Associate Agreements represented massive HIPAA liability — any one of those vendors experiencing a breach involving NexHealth's patient data could have triggered regulatory action against NexHealth. Fixing vendor management is unglamorous work, but it is essential. Every vendor that touches PHI must have a BAA in place. No exceptions.
Security awareness training transforms culture. Monthly phishing simulations changed how NexHealth employees think about security. The click rate dropped from 23% to 8% in three months — not because employees were punished for clicking, but because they developed genuine awareness. When security becomes part of the culture rather than a checkbox exercise, the entire organization becomes more resilient.
Board-level security reporting transforms compliance from cost center to governance function. When the board has visibility into security risk through regular metrics and dashboards, they become allies rather than inquisitors. NexHealth's board went from learning about security problems through lost deals to proactively discussing security strategy. That shift — from reactive to proactive governance — is one of the most valuable outcomes of having a vCISO who reports directly to the board.
What's Next
NexHealth is evaluating an upgrade from HITRUST i1 to HITRUST r2 certification. Two new hospital prospects have specifically requested r2 as a procurement requirement, and the investment in a more rigorous certification aligns with NexHealth's growth trajectory into larger health system contracts.
The vCISO engagement continues at 10 hours per week, with a planned scale to 15 hours per week as NexHealth expands into new health system contracts and the security program matures to address more complex requirements — including potential FedRAMP readiness for VA and DoD health system opportunities.
Get a CISO without the $300K salary.
QuickTrust's vCISO model gives you a named, experienced security leader who builds your compliance program, handles security questionnaires, and reports to your board — at a fraction of a full-time hire.