BLOG

Unpacking the Healthcare Cybersecurity and Resilience Act: What to Know 

by Jonathan Elmer, CISSP 

Healthcare has long been one of the most targeted sectors in the cybersecurity landscape, and recent legislative action from Capitol Hill reflects a meaningful policy response. On February 27, 2026, the Health Care Cybersecurity and Resiliency Act of 2025 (S. 3315) passed the Senate Health, Education, Labor, and Pensions (HELP) Committee with a 22-1 vote, advancing the most substantive healthcare cybersecurity legislation in years toward a full Senate floor vote [1]. For healthcare leaders, compliance professionals, and security practitioners, the provisions warrant close attention. 

The Threat Landscape Driving Legislative Action 

The urgency behind this bill is grounded in recent incident data. In 2024 alone, the healthcare sector experienced more than 730 cyber breaches affecting over 270 million Americans[2]. The Change Healthcare ransomware attack exposed the data of 190 million individuals and caused significant disruption to electronic prescribing, claims processing, and patient care delivery across the country[1]. As ASPR Director Charlee Hess noted at a recent industry event, "It wasn't a hospital — it was a company most people have never heard of — and had major impacts on our sector and threatened the liquidity of our entire health care system"[1]. 

The average cost of a healthcare data breach now stands at $10 million per incident, reflecting not only remediation costs, but prolonged care disruptions that can affect patient safety[2]. This context makes the legislative response timely and appropriate. 

Key Provisions of the Bill 

The Health Care Cybersecurity and Resiliency Act was sponsored by HELP Committee Chair Sen. Bill Cassidy (R-LA) alongside Senators Mark Warner (D-VA), John Cornyn (R-TX), and Maggie Hassan (D-NH). It is a bipartisan product of a working group that has been developing recommendations since 2023[2]. Its primary provisions include: 

  • HHS Incident Response Plan: Requires the Secretary of Health and Human Services to develop a formal cybersecurity incident response plan and submit it to Congress for review[1] 
  • CISA Partnership: Directs HHS to formally partner with the Cybersecurity and Infrastructure Security Agency (CISA) on cybersecurity oversight across the healthcare and public health sectors[1] 
  • Sector Risk Management Designation: Designates the Administration for Strategic Preparedness and Response (ASPR) at HHS as the official Sector Risk Management Agency (SRMA) for the Healthcare and Public Health sector[1] 
  • Rural Healthcare Guidance: Directs development of tailored cybersecurity guidance for rural healthcare providers, who often face resource constraints in building security programs[1] 
  • Workforce Cybersecurity Literacy: Establishes a plan to build cybersecurity awareness and capability across the healthcare workforce[2] 
  • HIPAA Modernization: Updates HIPAA to align regulated entities with current cybersecurity practices[1] 
  • Federal Grant Program: Creates a federal grant program to help hospitals, cancer centers, rural health clinics, the Indian Health Service, academic health centers, and partnering nonprofit organizations adopt cybersecurity best practices[1] 

Funding and Resource Impacts 

The introduction of a dedicated federal grant program is one of the most operationally significant elements of the bill for under-resourced healthcare organizations[1]. Rural providers, Federally Qualified Health Centers (FQHCs), and safety-net hospitals have consistently struggled to build and sustain mature cybersecurity programs given thin margins and limited IT staffing. By directing federal funding toward these organizations specifically, Congress is acknowledging a longstanding gap: compliance mandates without corresponding resources tend to produce incomplete security programs that expose both patients and organizations to unnecessary risk[2]. 

For larger health systems, the ASPR SRMA designation provides a clearly defined federal counterpart for threat intelligence sharing, incident coordination, and sector-wide resilience planning. That type of structural clarity was notably absent during the response to the Change Healthcare crisis[1]. 

Implications for Providers, Payers, and the Industry 

Covered Entities and Hospitals 

Hospitals and covered entities should expect increased federal attention to their cybersecurity postures as the bill's HIPAA modernization provisions develop. Organizations that have deferred investment in areas such as network segmentation, incident response planning, and third-party risk management will face mounting pressure from both a regulatory and operational standpoint[1]. 

Payers and Health Plans 

For payers, the third-party risk dimensions of this legislation deserve particular attention. The Change Healthcare incident illustrated how deeply a single business associate can be embedded across an entire sector's payment infrastructure[1]. Payers should treat this legislative development as a prompt to revisit vendor risk management programs, review business associate agreements, and map dependencies on concentrated service providers. 

Rural and Safety-Net Providers 

The targeted provisions for rural healthcare reflect a practical recognition of resource disparities across the sector. Organizations in this category should begin positioning themselves to access grant funding as the program matures, starting with baseline security assessments to identify the most critical gaps[1][2]. 

Security and Compliance Professionals 

For GRC and security practitioners, the bill's passage through committee with a 22-1 vote reflects strong bipartisan consensus. While the legislation still needs to pass the full Senate and House, the political momentum is notable[1]. Practitioners would be well served by beginning to map their programs against the bill's emerging requirements now, particularly around incident response planning, workforce training, and HIPAA alignment. 

The HIPAA Security Rule Update: Still Pending 

Running parallel to this legislative activity is a long-awaited regulatory update that compliance professionals must also track. The HHS Office for Civil Rights (OCR) published a Notice of Proposed Rulemaking (NPRM) for an overhaul of the HIPAA Security Rule on January 6, 2025, with a public comment period that closed on March 7, 2025[3]. This represents the first major update to the HIPAA Security Rule since the HIPAA Omnibus Rule of 2013[3]. 

Despite the comment period closing over a year ago, the rule has not yet been finalized. As of late 2025, the rule is scheduled to be finalized in May 2026, meaning that new requirements could take effect before the end of the year[4], although sentiment is mixed on the actual timing of finalization. The current administration at HHS will ultimately determine the final shape and timing of the rule[3]. 

What the Proposed Rule Requires 

The proposed HIPAA Security Rule changes are substantive, eliminating the longstanding "required vs. addressable" implementation specification distinction in favor of mandatory standards across the board[3][5]. Key requirement impacts include: 

Requirement Prior Status Proposed Status 
Encryption of ePHI (at rest and in transit) Addressable Required (limited exceptions
Multi-Factor Authentication (MFA) Addressable Required (limited exceptions
Annual Penetration Testing Not required Required 
Vulnerability Scanning (every 6 months) Not required Required 
Network Segmentation Not required Required 
72-Hour System Restoration Not required Required 
Annual Compliance Audits Not required Required for CEs and BAs 
Business Associate Annual Verification Not required Required 
Asset Inventory and Network Maps Not required Required 
Workforce Access Change Notification (24-hour) Not required Required 

Table 1: Comparison of Current and Proposed HIPAA Security Rule Requirements[5][6] 

Planning in the Absence of a Final Rule 

The gap between the comment period closing and final rule publication creates a practical compliance planning challenge. Organizations that have already invested in modernizing their security programs are reasonably well positioned, while those waiting on a final rule to trigger action carry increasing risk in the interim[4]. OCR has clearly signaled that the current Security Rule's flexibility is being replaced with prescriptive, enforceable requirements aligned with current cybersecurity standards[3]. 

The Legislative and Regulatory Tracks Together 

The Health Care Cybersecurity and Resiliency Act and the HIPAA Security Rule update are moving along separate but complementary tracks. The legislation aims to modernize HIPAA through statute, while the NPRM pursues the same objective through the regulatory process[1][3]. Should both advance, covered entities may find themselves subject to overlapping but reinforcing requirements, which, while operationally demanding, represents a substantive step toward a more defensible healthcare sector. 

For industry leaders, the direction of travel is consistent regardless of which vehicle ultimately prevails: prescriptive cybersecurity requirements in healthcare are coming. Organizations that use this window to build mature, well-documented security programs will be better positioned to protect patients and manage regulatory expectations as both tracks continue to develop. 

Conclusion 

Healthcare organizations navigating this evolving regulatory landscape do not need to do so alone. Meditology Services is a leading healthcare security and privacy advisory firm with deep expertise in helping providers, payers, and health IT organizations build and mature their cybersecurity programs in alignment with the requirements that matter most in this sector. 

As both the Health Care Cybersecurity and Resiliency Act and the updated HIPAA Security Rule continue to develop, Meditology's team of experienced practitioners can support your organization across the full spectrum of program modernization needs, including: 

  • HIPAA Security Rule Readiness Assessments: Gap analyses mapped against the proposed rule's new mandatory requirements, helping organizations understand where they stand today and what remediation efforts to prioritize 
  • Incident Response Program Development: Building and testing incident response plans aligned with HHS expectations and emerging federal requirements 
  • Third-Party and Vendor Risk Management: Strengthening business associate oversight programs in anticipation of new verification and audit requirements 
  • Security Program Maturity Advancement: Designing and executing roadmaps that move organizations from compliance-driven programs to risk-based, operationally resilient security postures 
  • Rural and Safety-Net Provider Support: Helping resource-constrained organizations prepare for new federal grant funding while building foundational security capabilities 

Organizations that engage proactively with the changing requirements rather than waiting for enforcement to drive action will be better positioned to protect patients, reduce operational risk, and demonstrate meaningful compliance when regulators come calling. 

To learn more about how Meditology Services can support your organization's cybersecurity and compliance journey, contact us now! 


About the Author

Jonathan Elmer, CISSP – Director, IT Risk Management and Technical Lead   

Jonathan Elmer is a seasoned cybersecurity professional and IT risk management consultant with over a decade of experience. Adept at delivering impactful information security solutions aligned with business objectives, with a proven track record in leading regulatory and compliance focused initiatives and spearheading the implementation of technical security programs. Notable roles include Chief Information Security Officer, Technical Services Lead, Medical Device Security Architect and Director of IT Risk Management Consulting at Meditology Services, demonstrating leadership and expertise in project delivery, strategic direction, and client engagement.   


Resources
[1] CyberScoop. (2026, February 25). Senate moves one step closer to passing health care cyber reforms. https://cyberscoop.com/senate-passes-health-care-cyber-reforms-cassidy/ 

[2] U.S. Senate Committee on Health, Education, Labor, and Pensions. (2025, December 3). Chair Cassidy, colleagues reintroduce legislation to strengthen cybersecurity in health care. https://www.help.senate.gov/rep/newsroom/press/chair-cassidy-colleagues-reintroduce-legislation-to-strengthen-cybersecurity-in-health-care 

[3] HIPAA Journal. (2025, December 15). HIPAA updates and HIPAA changes in 2026. https://www.hipaajournal.com/hipaa-updates-hipaa-changes/ 

[4] Healthcare Law Insights. (2026, February 8). Major HIPAA Security Rule changes on the horizon. https://www.healthcarelawinsights.com/2026/02/major-hipaa-security-rule-changes-on-the-horizon 

[5] AccountableHQ. (2025, June 27). Latest rule changes, enforcement actions, and compliance updates. https://www.accountablehq.com/post/hipaa-news-latest-rule-changes-enforcement-actions-and-compliance-updates 

[6] RubinBrown. (2026, February 17). HIPAA Security Rule changes: 2025 & 2026 HIPAA updates. https://www.rubinbrown.com/insights-events/insight-articles/hipaa-security-rule-changes-2025-2026-hipaa-updates/ 

[7] U.S. Congress. (2025). S.3315 - Health Care Cybersecurity and Resiliency Act of 2025. https://www.congress.gov/bill/119th-congress/senate-bill/3315 

[8] Alston & Bird LLP. (2024, February 4). HIPAA Security Rule: Still on track for finalization. https://www.alston.com/en/insights/publications/2025/11/hipaa-security-rule-overhaul 

Most Recent Posts
Technical Assurance in Healthcare: Bridging the Gap Between GRC and the Adversary Read More
Selecting the Right SOC 2 Compliance Vendor Read More
What is a Security Risk Assessment? A CISO’s Guide for Ensuring Board-Worthy Outcomes Read More