Blog
|

Most healthcare CISOs don’t lose budget fights because their case is wrong. They lose because their evidence can’t tell the whole truth. Telemetry got priced out, the synthesis is editable, and the CFO has been trained to push back on numbers they can’t check live.

That’s an evidence architecture problem, not a tooling one. The proposed HIPAA Security Rule update from the U.S. Department of Health and Human Services, currently on the agenda for May 2026 finalization, is about to make evidence architecture harder to ignore. The timeline’s uncertain, but the direction is clear regardless of when the final rule lands.

You don’t need more budget, you need defensible evidence.

Most healthcare CISOs don’t lose budget fights because their case is wrong. They lose because their evidence can’t tell the whole truth.

What the Data Says

Healthcare security budgets grew at a 4% rate in 2024 (down from 6% in 2023) while other industries experienced budget growth by at least two percentage points over 2023 figures, according to the IANS and Artico Search 2025 Compensation and Budget for CISOs in Healthcare Benchmark Report. The same report found healthcare CISOs earn 10% to 40% less in cash and total compensation than peers in other sectors.

OCR’s HIPAA Security Rule guidance now includes a risk management video released April 8, 2026. In it, Nick Heesters, senior advisor for cybersecurity at the HHS Office for Civil Rights, says “Policies and procedures alone are not sufficient evidence of security measure implementation.”

Policies and procedures alone are not sufficient evidence of security measure implementation.

Logo for ArmorNick Heesters Senior Advisor HHS Office for Civil Rights

The Pattern Shows Up in Three Places

Every healthcare CISO I talk to recognizes one of these:

  • A board director asks where a metric came from. The CISO knows roughly. Roughly isn’t the same as a real-time trace to a source system. Confidence drops by a notch.
  • Two-week-old compliance data gets discounted as historical, the moment a budget ask is on the table.
  • Audit prep means manually rebuilding the same metrics from 15 tools, every cycle, with no audit trail on the synthesis.

The problem isn’t any one of these, it’s all of them, every cycle.

Two-week-old compliance data gets discounted as historical the moment a budget ask is on the table.

The Unfiltered Four

When evidence holds up, it answers four questions. We call this The Unfiltered Four, because every dimension is an unfiltered cut of the data: where it comes from, when it was collected, who touched it, and what it covers. The framework is how we test whether a board pack will survive an OCR audit, a CFO budget conversation, or a determined challenger.

Dimension The Question a Determined Challenger Will Ask
Source Traceability Where did this number come from? Can I click through to a source system with a timestamp?
Real-Time Data Is this current, or a snapshot from the last assessment cycle? How current?
Unfiltered Architecture How many human hands edited this between the source and the report? Including Business Associates?
Stack Coverage Does this reflect the full security stack, including AI tools, medical devices, and the integrations no one wants to touch?

Most healthcare reporting fails on at least two of the four. The most common pattern:

  • Source Traceability passes for systems that integrate easily.
  • Real-Time Data passes for systems that integrate easily.
  • Unfiltered Architecture fails. Too many hands in the chain, Business Associates included.
  • Stack Coverage fails. Cloud, AI, and medical devices live outside the dashboard until someone asks.

The proposed HIPAA Security Rule update directly targets these gaps with new BA verification requirements and detailed asset inventory mandates.

Evidence-based has become a marketing word. The Unfiltered Four is how you take it back, the working definition you can hold any platform accountable to. If your tool can’t answer all four honestly, it isn’t evidence-based, no matter what the brochure says.

The Conversation That Works

The CFO has heard this before, “We need more security budget because the threat is rising.” The numbers behind it are the same numbers that just got discounted.

What works instead sounds something like this:

The metrics I’ve been bringing to the board reflect the best data I had at the time. But two weeks of lag is built into the current reporting process, and there’s no way for the board to verify the source of any specific number. We need to fix that. The gap isn’t a tooling problem; it’s an evidence architecture problem. Here’s what defensible architecture looks like.

That reframes the ask from “give me more budget” to “let me show you what we’re working with.” Every CISO who has used some version of it tells us the same thing, it changes the room.

If your last board pack wouldn’t survive this test, your next budget conversation won’t either.

Run Our Frameworks Against Your Last Board Pack

Two self-scoring tools built on the dimensions auditors and boards actually press on. Both are free. Both stay with you. We don’t collect your answers.

Self-Assessment

CISOs | 12 Questions | 10 Minutes

Built on The Unfiltered Four
The dimension you score lowest on is where your next budget or audit conversation will surface gaps.

Take the Self-Assessment

Readiness Checklist

Compliance, GRC, and privacy officers | 32 Items | 20 Minutes

Built on the Five Dimensions of Defensible Evidence
Audit-readiness framing, mapped to the dimensions auditors and compliance officers use.

Start the Checklist

If your scores surface a gap you want to talk through, we offer a 30-minute peer review with a strategic advisor. No deck, no demo, no follow-up unless you ask.

Three Questions We Get From CISOs Reading This

Why do healthcare CISOs score lowest on Source Traceability?

Healthcare security stacks evolved tool by tool over a decade or more, with reporting bolted on top. Numbers reach the board after three to five undocumented manual transformations. Real numbers, no traceable origin.

Does HIPAA 2025 already require continuous evidence?

Not yet. The proposed HIPAA Security Rule update is on HHS’s regulatory agenda for May 2026 finalization, though that timeline’s uncertain after the January 2025 regulatory freeze. It would raise the bar from “do you have a control” to “can you evidence that the control is working continuously,” and includes a proposed 72-hour system restoration requirement and 24-hour notification when a workforce member’s access to ePHI is changed or terminated.
The current Security Rule still applies. But OCR’s 2023 risk-analysis enforcement is already producing penalties on similar grounds, and auditors and cyber insurers are already raising the bar.

What is the difference between an audit log and architectural read-only?

An audit log records who edited a metric. Architectural read-only means nobody can edit it. The first is a paper trail. The second is the absence of an opportunity to alter the data. Both have their uses, only one of them holds up cleanly when an auditor asks who could’ve changed a number and when.

About Armor

Armor is a global leader in cloud-native managed detection and response. Trusted by over 1,700 organizations across 40 countries, Armor delivers cybersecurity, compliance consulting, and 24/7 managed defense built for transparency, speed, and results. By combining human expertise with AI-driven precision, Armor safeguards critical environments to outpace evolving threats and build lasting resilience. For more information visit our website, follow us on LinkedIn, or request a free Cyber Resilience assessment.