
Your IT Director Is Not a CISO (Stop Pretending)
IT directors and CISOs have fundamentally different jobs. When one person tries to do both in a healthcare organization, security loses every time. You don't need a full-time CISO, but you need the function.
GuardsArm Team
Security Experts
I've had this conversation more times than I can count. I'm sitting across from a hospital CEO or a clinic administrator, and I ask who owns cybersecurity for their organization. They point to their IT director.
Same person who manages the help desk. Same person who handles EHR upgrades. Same person who's troubleshooting why the printer on 3 West won't connect. That person is also supposed to be running your security program, managing compliance, assessing risk, and reporting to the board on cyber threats.
This isn't a knock on IT directors. Most of them are smart, hardworking people doing impossible jobs. But IT management and cybersecurity leadership are fundamentally different disciplines, and pretending otherwise is one of the most dangerous decisions a healthcare organization can make.
IT and security have different goals
Your IT director's job is to keep things running. Uptime. Availability. User satisfaction. When a doctor can't log into the EHR, the IT director's phone rings. Their success is measured by how smoothly technology works.
A CISO's job often means making things harder to use. Longer passwords. Restricted access. Blocked USB ports. Segmented networks that add latency. Security and convenience are almost always in tension, and someone needs to own that tension at the leadership level.
When one person holds both roles, convenience wins every time. Not because they don't care about security, but because the operational pressure is immediate and constant. The security risk is theoretical until it isn't. And by then it's too late.
The knowledge gap is real
Cybersecurity has become its own field. A modern CISO needs to understand threat intelligence, incident response frameworks, regulatory compliance across multiple standards, risk quantification methodologies, vendor security assessment, cloud security architecture, and how to communicate all of this to a non-technical board.
That's a full-time discipline. It takes years of focused experience to develop. Your IT director might be brilliant at infrastructure management, but that doesn't make them qualified to design a security architecture or lead an incident response.
I worked with a rural hospital where the IT director had set up their firewall with a default-allow outbound policy because "the doctors need to access everything." When I asked about their incident response plan, he pulled up a one-page document that hadn't been updated in three years. He wasn't negligent. He just didn't know what he didn't know.
That gap gets people fired after a breach. And it gets patients' data exposed.
The board reporting problem
CISOs report to the board. That's not optional anymore -- regulators and cyber insurance carriers expect it. But what does board reporting look like when your IT director is also your security leader?
It looks like a slide deck about patch compliance percentages and firewall uptime. Maybe a chart showing how many phishing simulations were sent. Surface-level metrics that make everyone feel good but don't actually communicate risk.
A real CISO talks to the board about risk in business terms. What's the probability of a ransomware event? What's the financial exposure? Where are we underinvested? What risks are we accepting and why? That requires a fundamentally different skill set and a different relationship with the board.
When the IT director presents to the board, they're reporting to their boss's boss. When a CISO presents to the board, they're a peer advising on strategic risk. That distinction matters enormously in terms of influence and accountability.
The compliance trap
Healthcare organizations are drowning in compliance requirements. HIPAA. HITECH. State privacy laws. PCI if you process payments. SOC 2 if you handle data for partners. Each one requires someone who understands the standard deeply enough to map controls, identify gaps, and drive remediation.
IT directors often get stuck doing compliance by checklist. They buy a GRC tool, fill in the fields, and check the boxes. The audit passes. Everyone celebrates. But passing an audit and being secure are completely different things.
Compliance is a floor, not a ceiling. An IT director focused on keeping the lights on will aim for the floor every time because that's what's measurable and manageable. A CISO builds a program that goes beyond compliance because they understand that the audit standard is always behind the threat landscape.
You don't need to hire a full-time CISO
Here's the thing: I'm not telling every 200-bed hospital to go hire a $300,000 CISO. For many healthcare organizations, that's not realistic. But you still need the function.
A virtual CISO gives you the expertise without the full-time salary. Someone who knows healthcare security, understands the regulatory landscape, can speak to your board, and can build a real security program that your IT team executes.
Your IT director keeps doing what they're good at -- running technology operations. The vCISO handles strategy, risk, compliance, and board reporting. Everyone operates in their lane. Nobody's pretending to be something they're not.
The organizations that figure this out early avoid the painful lesson that comes when a breach exposes the gap. The ones that don't figure it out usually learn it the hard way.
GuardsArm offers virtual CISO services built specifically for healthcare organizations. We've helped hospitals and clinics separate the IT function from the security function without breaking the budget. If your IT director is currently wearing the CISO hat and you know that's not sustainable, we should have a conversation about what a realistic security leadership model looks like for your organization.
Topics
Written by GuardsArm Team
Our team of cybersecurity experts brings decades of combined experience in penetration testing, compliance auditing, and incident response. We're dedicated to helping organizations strengthen their security posture.
Related Articles

MFA Won't Save You: Why Token Theft Is Healthcare's Next Crisis

The $4.5 Million Email: How Phishing Still Owns Healthcare
