Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Securing Navy Hospital Ships: Zero Trust and Healthcare IT at Sea

Varonis
05/19/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Navy hospital ships USNS Mercy and USNS Comfort operate as fully functional floating hospitals with five-day activation requirements, combining healthcare IT complexity with maritime operational technology security needs.
  • The ships face unique threat vectors including foreign nationals accessing the vessels as patients or tour visitors, potential insider threats from temporary personnel, and physical security risks like unauthorized USB device insertion.
  • Zero trust architecture implementation is underway at an accelerated pace, with Varonis deployed to monitor file shares, detect anomalous behavior, and identify improperly placed data in email attachments and shared drives.
  • Operational technology protection—covering SCADA devices, industrial controls, medical modalities, and ship navigation systems—represents the biggest security concern, as any disruption could impact both patient safety and vessel operations.

Unique Security Challenges of Floating Healthcare Facilities

Mike Taylor oversees IT operations for the USNS Mercy and USNS Comfort, two hospital ships that function as fully operational medical facilities capable of deploying within five days of activation. These vessels present distinctive security challenges that combine healthcare IT requirements with maritime operational technology concerns. The ships regularly host foreign nationals—both as patients receiving care and as visitors on tours—creating exposure to potential insider threats and physical security risks like unauthorized USB device insertion. Taylor emphasizes that disruptions to IT systems carry life-or-death consequences, as compromised systems in surgical suites or modified patient records could directly impact patient safety. Beyond healthcare, the ships' navigation systems, engineering controls, and bridge operations all depend on secure digital infrastructure.

Zero Trust Implementation and Operational Technology Protection

The hospital ships are aggressively implementing zero trust architecture during the current fiscal year, with Varonis playing a significant role in the data security component. Taylor identifies operational technology threats—including SCADA devices, industrial controls, and medical modalities—as the biggest risk on the horizon. The ships have historically practiced comply-to-connect principles, but the zero trust initiative aims to create granular, tightly controlled environments that prevent insider threats and malicious device proliferation. Taylor notes that once deployed, the ships operate with only the security measures they've implemented beforehand, making thorough preparation essential. The teams have documented multiple instances where Varonis helped identify anomalous behavior and improperly placed files in email attachments or shared drives, enabling proactive threat mitigation.

Chapters

0:00 - Introduction and Background
2:12 - Deployment Cycles and Activation
3:47 - Humanitarian Mission Impact
4:28 - Daily IT Operations and Zero Trust
6:25 - Driving Technology Solutions
7:14 - Data Breach Threats and Insider Risks
9:45 - OT Threats and Zero Trust Ambitions
11:06 - Security Leadership Principles
12:23 - Advice for Future Security Professionals

Key Quotes

4:54 "Varonis is a big part of that because we have to make sure that we stay ahead of any threat actors in any parts of the game."
6:05 "Not all those people have good intentions. A lot of them just see a U.S. flag and they think that it's an opportunity to take advantage."
8:01 "We have lots of documented occasions where anomalous behavior and things being placed in spaces where they shouldn't be placed, like email attachments or shared drives. It's helped us to stay ahead of some of those threats."
10:57 "When we take it away from the pier, all we have is ourselves and whatever security we've implemented along with us."

Categories:
  • » Webinar Library » Varonis
  • » Data Protection » Backup & Recovery
  • » Cybersecurity » Zero Trust
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Zero Trust
  • Data Protection
  • OT
  • IoT Security
  • Security Operations
  • Interview
  • Technical Deep Dive
  • Zero Trust Architecture
  • Healthcare IT Security
  • Operational Technology Protection
  • Insider Threat Prevention
  • Military Cybersecurity
  • Maritime IT Operations
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Securing Navy Hospital Ships: Zero Trust and Healthcare IT at Sea

              Upcoming Webinar Calendar

              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Stages
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-stages/
              • 05/21/2026
                11:00 AM
                05/21/2026
                Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/risk-in-real-time-demo-series-the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Which Issues to Address First?
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-which-issues-to-address-first/

              Upcoming Events

              • May
                20

                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Stages

                05/20/202610:00 PM ET
                • May
                  21

                  Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise

                  05/21/202611:00 AM ET
                  • May
                    27

                    Adopting AI: From Illusion to Intentional Control

                    05/27/202610:00 AM ET
                    • May
                      28

                      Harnessing AI for Smaller Teams: Strategies for Secure Implementation

                      05/28/202601:00 PM ET
                      • Jun
                        02

                        Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape

                        06/02/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version