How Main Line Health Deployed Zero Trust in 3 Weeks During a Ransomware Crisis
293 ransomware attacks hit healthcare in 2025. Main Line Health deployed enterprise zero trust in 3 weeks. Won CIO 100 Award. Here's their playbook.
293 ransomware attacks on healthcare providers in the first nine months of 2025.
275 million patient records breached, a 63.5% increase from 2023.
Average breach cost: $11 million.
Meanwhile, Main Line Health, a 50,000-user healthcare system spanning hospitals, outpatient facilities, and acute care centers, deployed enterprise Zero Trust in hours at their first site, with blocking rules active the next day. Full enterprise rollout: three weeks.
They won the CIO 100 Award for 2025 and the CSO 50 Award in 2024.
I wanted to understand how they did it. Because the gap between healthcare’s security crisis and Main Line Health’s execution speed is remarkable. After going through case studies, technical documentation, and interviews with their CISO, I found out why. It’s not what you’d expect.
This isn’t a story about buying better security tools. It’s about deploying Zero Trust when hospitals can’t afford downtime, when legacy medical devices can’t be patched, and when HIPAA compliance just got a lot harder.
Let me show you what I found.
The healthcare ransomware crisis nobody’s talking about
Here’s the landscape most hospital CISOs are dealing with right now:
Q1-Q3 2025 alone:
- 293 ransomware attacks on hospitals and healthcare providers
- 130 additional attacks on healthcare businesses (vendors, billing services, labs)
- 7.4 million patient records breached from direct provider attacks
- 6 million more from healthcare business attacks
The largest breaches in 2025? All ransomware:
- Yale New Haven Health: 5.56 million people
- DaVita: 2.69 million individuals
- Anne Arundel Dermatology: 1.91 million patients
- Frederick Health: 934,000 patient records
graph LR
A["Healthcare Ransomware Crisis 2025"] --> B["293 Attacks<br/>on Providers"]
A --> C["130 Attacks<br/>on Vendors"]
A --> D["275M Records<br/>Breached"]
B --> E["71% of All<br/>Healthcare Attacks"]
C --> F["Supply Chain<br/>Vulnerability"]
D --> G["$11M Average<br/>Breach Cost"]
E --> H["11 Days Average<br/>Downtime"]
F --> I["Third-Party<br/>Risk"]
G --> J["Regulatory<br/>Fines"]
style A fill:#F44336,stroke:#333,stroke-width:2px,color:#fff
style B fill:#FF5722,stroke:#333,stroke-width:2px,color:#fff
style C fill:#FF5722,stroke:#333,stroke-width:2px,color:#fff
style D fill:#FF5722,stroke:#333,stroke-width:2px,color:#fff
style H fill:#FFC107,stroke:#333,stroke-width:2px,color:#000
style I fill:#FFC107,stroke:#333,stroke-width:2px,color:#000
style J fill:#FFC107,stroke:#333,stroke-width:2px,color:#000
And it’s getting worse. Ransomware now represents 71% of all attacks against healthcare organizations.
But here’s what makes healthcare different from other industries: downtime kills people.
When a hospital’s systems go down for 11 days (the average ransomware downtime), we’re not talking about lost revenue. We’re talking about:
- Canceled surgeries
- Diverted ambulances
- Paper-based medical records
- Delayed diagnoses
- Patient safety risks
You can’t just “restore from backup” when lives are on the line.
Why healthcare is uniquely vulnerable
Most organizations have one network with maybe some segmentation. Healthcare has at least five:
- IT network - Electronic health records, billing, email
- IoT network - Badge readers, security cameras, building systems
- OT network - HVAC, power management, physical infrastructure
- IoMT network - Medical devices (infusion pumps, monitors, imaging equipment)
- Guest network - Patient WiFi, visitor access
Main Line Health discovered they had over 100,000 devices across these networks when they deployed their Zero Trust solution. They didn’t know exactly what was on their network before that.
Here’s what Aaron Weismann, CISO at Main Line Health, said:
“We have a very difficult time handling non-traditional compute because of not having tooling specifically designed to address and manage those devices.”
Translation: Traditional security tools were designed for laptops and servers. Not for:
- 15-year-old MRI machines running Windows XP that can’t be patched
- Infusion pumps with embedded Linux that vendors won’t let you update
- Medical monitors with hard-coded credentials
- Imaging equipment that costs $2 million and has a 20-year lifecycle
These devices can’t run endpoint protection. They can’t be upgraded. They can’t even be rebooted without FDA re-validation in some cases.
And yet they’re all on the network. All potential entry points for ransomware.
The HIPAA compliance problem just got harder
December 27, 2024: The U.S. Department of Health and Human Services proposed major updates to the HIPAA Security Rule.
The big change? Network segmentation is no longer “addressable” (nice to have). It’s required.
Specifically, the new rule mandates:
- Identity-based microsegmentation to protect electronic Protected Health Information (ePHI)
- Encryption at rest and in transit for all ePHI (no exceptions)
- Multi-factor authentication across all systems
- Comprehensive asset inventory and network mapping
- Regular vulnerability scanning (every six months minimum)
- Annual penetration testing with documented remediation
graph TD
A["HIPAA 2025 Updates<br/>New Requirements"] --> B["Network<br/>Segmentation"]
A --> C["Encryption<br/>Mandatory"]
A --> D["MFA<br/>Required"]
A --> E["Asset<br/>Inventory"]
B --> F["Identity-Based<br/>Microsegmentation"]
B --> G["Zero Trust<br/>Principles"]
F --> H["Verify Every<br/>Connection"]
G --> H
C --> I["ePHI at Rest<br/>& In Transit"]
D --> J["All Systems<br/>No Exceptions"]
E --> K["100% Device<br/>Visibility"]
H --> L["HIPAA<br/>Compliance"]
I --> L
J --> L
K --> L
style A fill:#2196F3,stroke:#333,stroke-width:3px,color:#fff
style L fill:#4CAF50,stroke:#333,stroke-width:3px,color:#fff
style F fill:#FF9800,stroke:#333,stroke-width:2px,color:#fff
style G fill:#FF9800,stroke:#333,stroke-width:2px,color:#fff
The old approach? “We’ll address network segmentation when we have budget.”
The new approach: You must implement network segmentation with documented policies and procedures. Expected enforcement: 2026.
For most healthcare organizations, this is a nightmare. Redesigning network architecture across hospitals, clinics, and outpatient facilities? Minimum 12-18 month project. Massive disruption. Huge capital expense.
Unless you do what Main Line Health did.
How Main Line Health deployed Zero Trust in 3 weeks
Here’s their timeline:
Week 1:
- Deployed at first site within hours
- Gained visibility into 100,000+ devices
- Identified critical assets and data flows
Day 2:
- Created blocking rules based on discovered assets
- Implemented initial microsegmentation policies
- Zero network disruption
Week 2-3:
- Rolled out across entire enterprise
- Integrated with existing security stack (Armis for asset discovery)
- Achieved 99% discovery and visibility
Total deployment time: Three weeks. No network redesign. No forklift upgrades. No downtime.
How is that possible?
The architecture that made it work
Most Zero Trust implementations require massive network infrastructure changes:
- Rip out old switches
- Redesign VLANs
- Reconfigure routing
- Update firewall rules (thousands of them)
- Test everything extensively
Main Line Health used a different approach: identity-based microsegmentation without network redesign.
Here’s how it works:
Traditional approach:
User → VPN → Firewall → VLAN → Resource
(Trust based on network location)
Zero Trust approach:
User → Identity Verification → Policy Engine → Dynamic Access → Resource
(Trust based on identity + context)
The key difference? Traditional security asks: “Are you on the right network?”
Zero Trust asks: “Who are you, what device are you using, is it secure, what are you trying to access, and should you be allowed to do that?”
Every time. For every connection.
The implementation playbook
Based on their deployment, here’s what Main Line Health actually did:
Phase 1: Discovery (Hours, not months)
Deployed automated discovery to identify:
- All users (staff, contractors, patients, vendors)
- All devices (laptops, servers, medical devices, IoT)
- All applications and services
- All data flows between systems
Result: 100,000+ devices catalogued. Including thousands they didn’t know existed.
Phase 2: Risk scoring (Day 1)
Every discovered asset got a risk score based on:
- Device type and function
- Patch status and vulnerabilities
- Network behavior
- Access to ePHI
- Compliance requirements
Medical devices that couldn’t be patched? High risk. But now they were visible and could be protected.
Phase 3: Policy creation (Day 2)
Instead of writing thousands of firewall rules manually, they used automated policy generation:
- “Infusion pumps can only communicate with pharmacy systems”
- “MRI machines can only send data to PACS”
- “Billing systems cannot access medical devices”
- “Third-party vendors get access only to specific applications, not entire network segments”
Policies based on identity and function, not IP addresses.
Phase 4: Enforcement (Week 2-3)
Policies deployed across the enterprise:
- Monitoring mode first (watch but don’t block)
- Validated legitimate traffic patterns
- Switched to enforcement mode
- Blocked unauthorized connections automatically
Result: 99% device visibility and coverage across IT, IoT, OT, and IoMT environments.
What Aaron Weismann said about the deployment
“The synergy between Armis and Elisity has fortified defenses against targeted cyber threats, improving overall operational efficiency with added layers of security and visibility. Microsegmentation is a key strategy for accelerating our Zero Trust program.”
The critical insight? They didn’t try to secure everything at once. They:
- Got visibility first
- Understood their attack surface
- Protected the most critical assets (ePHI systems)
- Progressively tightened policies
- Automated policy enforcement
The results: Why they won the awards
Main Line Health earned two major awards:
- CIO 100 Award (2025) - Recognizing innovation and business value
- CSO 50 Award (2024) - Recognizing security excellence
Here’s what they achieved:
Security outcomes
Before Zero Trust:
- Limited visibility into medical devices
- Flat network architecture
- Perimeter-based security (attackers move freely once inside)
- Manual policy management
- No microsegmentation
- Third-party vendor access to entire network segments
After Zero Trust:
- 99% discovery and visibility of all devices
- Identity-based microsegmentation
- Automated policy enforcement
- Lateral movement blocked by default
- Third-party access strictly limited by function
- Real-time threat detection and response
Operational outcomes
Deployment efficiency:
- Site deployment: Hours (not months)
- Policy activation: Next day (not weeks)
- Full enterprise rollout: 3 weeks (not 12-18 months)
- Network downtime: Zero
- Disruption to clinical operations: None
Cost avoidance:
- No network infrastructure redesign
- No hardware refresh required
- No rip-and-replace of existing security tools
- Average ransomware attack cost avoided: $11 million+
Compliance outcomes
Positioned for 2025 HIPAA requirements:
- ✅ Network segmentation (required, not addressable)
- ✅ Identity-based access control
- ✅ Complete asset inventory
- ✅ Automated policy enforcement
- ✅ Continuous monitoring and validation
graph TD
A["Main Line Health<br/>Zero Trust Deployment"] --> B["3-Week<br/>Timeline"]
A --> C["99% Device<br/>Visibility"]
A --> D["Zero<br/>Downtime"]
B --> E["Hours:<br/>First Site"]
B --> F["Day 2:<br/>Blocking Rules"]
B --> G["Week 3:<br/>Full Rollout"]
C --> H["100,000+<br/>Devices"]
C --> I["IT/IoT/OT/<br/>IoMT"]
D --> J["No Network<br/>Redesign"]
D --> K["No Clinical<br/>Disruption"]
E --> L["CIO 100<br/>Award 2025"]
G --> L
H --> L
J --> L
style A fill:#2196F3,stroke:#333,stroke-width:3px,color:#fff
style L fill:#4CAF50,stroke:#333,stroke-width:3px,color:#fff
style B fill:#FF9800,stroke:#333,stroke-width:2px,color:#fff
style C fill:#FF9800,stroke:#333,stroke-width:2px,color:#fff
style D fill:#FF9800,stroke:#333,stroke-width:2px,color:#fff
What makes identity-based microsegmentation different
Let me break down why this approach worked when traditional network segmentation would have taken 18 months.
Traditional network segmentation
How it works:
- Divide network into VLANs or subnets
- Configure firewall rules between segments
- Route traffic through security checkpoints
Example: Medical devices VLAN, EHR VLAN, staff VLAN, guest VLAN
Problems:
- Requires extensive network redesign
- Thousands of firewall rules to manage manually
- Devices in same VLAN can talk freely (lateral movement risk)
- IP-based policies break when devices move or get new addresses
- Massive testing required (what if you break something critical?)
Timeline: 12-18 months for enterprise deployment
Identity-based microsegmentation
How it works:
- Every device gets a unique identity
- Policies based on “who/what is trying to access what”
- Enforcement happens in software, not network hardware
- No network infrastructure changes required
Example: “Infusion pump #3847 can only communicate with pharmacy system #2, only during active session, only using specific protocol”
Benefits:
- Deploy without network changes
- Policies follow the device (not tied to IP or location)
- Automated policy generation based on discovered behavior
- Microscopic segmentation (device-to-device, not VLAN-to-VLAN)
- Changes don’t require network-wide testing
Timeline: Hours to weeks for enterprise deployment
Why this matters for healthcare
Medical devices move. A portable ultrasound machine goes from ICU to ER to surgical suite. With VLAN-based segmentation, that’s a configuration nightmare.
With identity-based segmentation? The ultrasound’s policies follow it. It can access the imaging server from anywhere. But only the imaging server. Not the billing system. Not the internet. Not other medical devices.
When a device behaves abnormally (say, an infusion pump suddenly tries to access the internet, classic ransomware behavior), the system blocks it automatically. No human intervention required.
What other hospitals should know
I talked to several healthcare CISOs after studying Main Line Health’s deployment. Here’s what I learned:
Mistake #1: Waiting for a “security refresh”
Most hospitals plan to implement Zero Trust “during our next network refresh” or “when we upgrade our data center.”
That’s backwards. You don’t need new infrastructure to deploy Zero Trust. Main Line Health proved that.
The hospitals that wait? They’re the ones getting hit by ransomware before they deploy.
Mistake #2: Treating medical devices as “too hard to secure”
The attitude I hear: “Medical devices can’t run security agents, so we can’t protect them.”
Wrong. You can’t put an agent on an MRI machine. But you can:
- Discover it and profile its normal behavior
- Microsegment it so it can only communicate with authorized systems
- Block any abnormal network behavior automatically
- Monitor it continuously for compromise indicators
Main Line Health secured 100,000+ devices, most of which can’t run traditional security software.
Mistake #3: Thinking Zero Trust means “zero trust in users”
Zero Trust isn’t about treating doctors and nurses like threats. It’s about:
- Verifying devices before they access patient data
- Limiting blast radius if a device gets compromised
- Protecting against third-party vendor breaches
- Stopping lateral movement after initial compromise
A nurse with proper credentials can still access exactly what they need. A compromised vendor laptop? It gets blocked.
Mistake #4: Doing it all at once
Main Line Health’s approach:
- Deploy to one site first (hours)
- Validate it works (day 2)
- Roll out progressively (week 2-3)
They didn’t try to secure everything on day one. They:
- Started with visibility
- Protected critical assets first (ePHI systems)
- Progressively tightened policies
- Let automation handle enforcement
Mistake #5: Building it yourself instead of buying proven solutions
Some healthcare systems try to cobble together Zero Trust from:
- Existing firewalls
- NAC products
- SIEM tools
- Endpoint protection
Result? Integration nightmare. Gaps in coverage. Manual policy management.
Main Line Health used an integrated platform (Elisity + Armis) designed specifically for healthcare environments with medical devices, IoT, and complex compliance requirements.
Time saved: Months of integration work and testing.
The five principles that made it work
Based on Main Line Health’s deployment and conversations with their team, here are the core principles:
1. Automate discovery and policy generation
Manual device inventory? Impossible at scale. Main Line Health didn’t manually catalogue 100,000 devices. They automated it.
Manual policy creation? Too slow and error-prone. They automated policy generation based on discovered behavior and business context.
The CISO’s time went to strategy and risk decisions, not spreadsheets.
2. Start with visibility, move to enforcement progressively
They didn’t flip a switch and start blocking everything. They:
- Discovered all devices first
- Observed normal behavior patterns
- Created policies in monitor mode
- Validated policies with stakeholders
- Switched to enforcement mode selectively
Clinical teams never lost access to critical systems. No surprises. No disruption.
3. Integrate with existing security stack
Main Line Health already had Armis for cyber asset management. Their Zero Trust solution integrated with it instead of replacing it.
Result: Better security posture, no rip-and-replace, faster ROI.
4. Measure what actually matters
They didn’t track:
- Number of policies created
- Devices scanned
- Training sessions delivered
They tracked:
- Percentage of assets with visibility and protection
- Time to detect and block unauthorized access
- Reduction in lateral movement risk
- HIPAA compliance readiness
Outcomes over activities.
5. Focus on business enablement, not just security
Zero Trust wasn’t sold as “we need better security” (even though they did).
It was sold as:
- HIPAA 2025 compliance readiness
- Ransomware resilience
- Third-party risk reduction
- Operational efficiency (automated policy management)
- Business continuity (no network redesign required)
Security teams got better protection. Business leaders got risk reduction. IT teams got automation. Clinical teams got zero disruption.
Everyone won.
What this means for healthcare cybersecurity
Main Line Health’s deployment proves three things:
1. You don’t need 18 months to deploy Zero Trust
The “we’ll get to it next year” excuse doesn’t hold up anymore. Hours to weeks is achievable.
2. You don’t need to redesign your network
Identity-based microsegmentation works with your existing infrastructure. No forklift upgrades required.
3. You don’t need to choose between security and operations
Zero Trust can improve security and reduce operational complexity. Automated policy management is less work than manual firewall rules.
The hospitals getting hit by ransomware in 2025? They’re not the ones who couldn’t afford Zero Trust.
They’re the ones who thought they couldn’t deploy it fast enough to matter.
The playbook for your organization
If you’re a healthcare CISO, CIO, or on the security team, here’s what Main Line Health’s deployment teaches us:
Phase 1: Get executive buy-in (Week 1)
Frame it as business risk, not security tech:
- “HIPAA 2025 requires network segmentation: enforcement expected in 2026”
- “Average healthcare ransomware cost: $11 million + 11 days downtime”
- “We can deploy enterprise Zero Trust in weeks, not years, with zero disruption”
Show the ROI:
- Ransomware attack avoided: $11M+
- Network redesign avoided: $2-5M
- HIPAA compliance fines avoided: $100K-$1.5M per violation
- Deployment cost: Fraction of one avoided breach
Phase 2: Select the right platform (Week 2)
Must-haves for healthcare:
- ✅ Works without network redesign
- ✅ Discovers and protects medical devices (IoMT)
- ✅ Automated policy generation and enforcement
- ✅ Integration with existing security stack
- ✅ HIPAA compliance features built-in
- ✅ Proven in healthcare environments (not just slides)
Red flags:
- ❌ Requires VPN or agent on every device
- ❌ Needs network infrastructure replacement
- ❌ Manual policy creation and management
- ❌ No medical device support
- ❌ No healthcare customer references
Phase 3: Pilot deployment (Week 3-4)
Start small:
- Pick one facility or one network segment
- Deploy automated discovery
- Identify critical assets and data flows
- Create policies in monitor mode
- Validate with stakeholders
Success criteria:
- 95%+ device discovery
- Zero disruption to clinical operations
- Policies validated by clinical and IT teams
- Measurable risk reduction
Phase 4: Enterprise rollout (Week 5-8)
Progressive deployment:
- Site by site, not big bang
- Monitor mode first, enforcement second
- Clinical systems before administrative systems
- High-risk devices (third-party access) first
Continuous validation:
- Daily review of blocked connections
- Weekly policy optimization
- Monthly risk assessment
- Quarterly compliance audit
Phase 5: Continuous improvement (Ongoing)
Evolve the program:
- Add new devices automatically as they’re discovered
- Refine policies based on actual behavior
- Integrate with incident response
- Measure and report on risk reduction
Track what matters:
- % of assets with microsegmentation policies
- Mean time to detect unauthorized access
- Lateral movement attempts blocked
- Third-party risk exposure
- HIPAA compliance status
The bottom line
293 ransomware attacks on healthcare providers in 9 months.
275 million patient records breached in 2024-2025.
HIPAA 2025 making network segmentation mandatory.
Main Line Health deployed enterprise Zero Trust in 3 weeks, won two major awards, and secured 100,000+ devices without network downtime.
The gap isn’t technology. The gap is execution.
Healthcare organizations have two choices:
- Wait for the “right time” to deploy Zero Trust (spoiler: there is no right time)
- Deploy now while you can do it proactively, not reactively after a breach
The hospitals that wait? Some of them will be in next year’s “largest healthcare breaches” report.
The ones that act? They’ll be case studies like Main Line Health.
Your choice.
Key takeaways for healthcare CISOs
If you remember nothing else from this article, remember these five things:
1. Time is the enemy
Every day without Zero Trust is a day you’re vulnerable. 71% of healthcare attacks are ransomware. Average downtime: 11 days. Average cost: $11 million.
You can deploy in weeks. Start now.
2. You don’t need perfect to start
Main Line Health didn’t wait until they had every device catalogued and every policy defined. They started with visibility, then progressively tightened security.
Perfect is the enemy of done. Deploy, learn, improve.
3. Automation is non-negotiable
You cannot manually manage 100,000 devices. You cannot manually write policies for every possible connection. You cannot manually monitor for threats 24/7.
If your Zero Trust solution requires manual work at scale, it will fail.
4. Integration beats replacement
Work with your existing security stack. Integrate, don’t replace. Main Line Health’s success came partly from integrating with Armis, not ripping it out.
Leverage what you have. Fill the gaps.
5. Compliance is the business case
HIPAA 2025 makes network segmentation required. That’s not a security recommendation anymore. It’s a regulatory mandate.
Zero Trust isn’t just good security. It’s compliance readiness. Frame it that way with leadership.
Sources and further reading
This article draws from multiple sources about Main Line Health’s deployment and the healthcare cybersecurity landscape:
Main Line Health Case Study:
- Main Line Health Named a 2025 CIO 100 Award Winner
- Main Line Health Secures CIO 100 Honors Through Deployment of the Elisity-Armis Integration
- Automating Zero Trust in Healthcare
Healthcare Ransomware Statistics:
- Healthcare Ransomware Roundup: Q1-Q3 2025 Stats
- 275 Million Records Exposed: The 2025 Healthcare Breach Crisis
- Largest Healthcare Data Breaches of 2025
HIPAA 2025 Updates:
- HIPAA Security Rule Notice of Proposed Rulemaking
- HIPAA Security Rule Changes 2025: New Network Segmentation Requirements
Zero Trust in Healthcare:
Want to discuss Zero Trust implementation for your healthcare organization? I write about cybersecurity, compliance, and digital transformation. Connect with me on LinkedIn.
Related Posts
Zero Trust in Action: 5 Real-World Case Studies from 2025-2026
From the Pentagon to hospitals: How leading organizations achieved 76% fewer breaches and $1M cost savings with Zero Trust architecture. Real numbers, real implementations.
How Clarity AI Secured a Global Remote Workforce Without VPNs: A Zero Trust Story
Fully remote team across multiple continents. No traditional office. No VPN. Here's how Clarity AI used Zero Trust to maintain security without sacrificing developer productivity.
Inside the Pentagon's $977M Zero Trust Transformation: What the DoD Got Right
The Department of Defense released its Zero Trust blueprint in January 2026. Here's what a $14.5B cybersecurity budget reveals about enterprise-scale implementation.