Delivering and Masking Critical Patient Data for the Full Development Lifecycle

Webinar Transcript

Delivering and Masking Critical Patient Data for the Full Development Lifecycle

Topic: Protecting Healthcare Data While Powering Development and AI Innovation

Speakers:

Kellyn Gorman, Director of Data and AI, Silk

Mark Cooper, Principal Consultant, Cloudgainz

Summary

In this session, Silk’s Kellyn Gorman sits down with Mark Cooper of Cloudgainz — a long-time partner and consultant for Sentara Health — to discuss how healthcare organizations can secure, mask, and deliver critical patient data throughout the development and analytics lifecycle.

They explore the alarming rise in healthcare data breaches, the evolution of data masking and encryption, and how Sentara Health implemented an innovative architecture using Silk’s instant extracts and Redgate’s data masking tools to safely support development, analytics, and AI workloads — without exposing sensitive data.

The conversation highlights how software-defined storage, automation, and data masking combine to balance performance, protection, and agility — ensuring healthcare innovation continues securely.

Key Takeaways

Healthcare data breaches rose 141% in 2023, impacting 134 million patients.

True data masking is irreversible, preserving referential integrity while anonymizing sensitive fields.

Sentara Health uses Silk instant extracts + Redgate Data Masker to clone and mask data safely.

Architecture enables daily masked data refreshes for dev/test at near-zero cost.

Masked datasets feed AI and analytics pipelines securely, protecting PHI/PII.

“Data Masking as a Service” reduces cost, risk, and refresh time across environments.

Healthcare innovation can thrive without sacrificing data protection.

Transcript
[00:00–02:00] Introductions

Kellyn Gorman (Silk):
Welcome, everyone! This is Delivering and Masking Critical Patient Data for the Full Development Lifecycle. I’m Kellyn Gorman, Director of Data and AI at Silk — and yes, the “weird Oracle girl that Microsoft adopted.”

I’ve spent over 25 years in the data world, from Oracle and SQL Server to Postgres and MongoDB. Today, I’m joined by Mark Cooper, Principal Consultant at Cloudgainz and a longtime partner with Sentara Health.

Mark Cooper (Cloudgainz):
Thanks, Kellyn. I’m thrilled to be here. I’ve spent over 25 years in cloud hosting and data center operations — and for the last six years, I’ve worked closely with Sentara on FinOps, cost optimization, and Silk data platform adoption.

[02:00–04:00] The Healthcare Security Crisis

Kellyn:
Let’s start with the elephant in the room: data breaches. In 2023 alone, 134 million patients were affected by healthcare breaches — that’s almost half the U.S. population. It’s not “if,” but “when.”

Mark:
Exactly. Many assume HIPAA guarantees protection, but compliance ≠ security. We’re seeing weekly breaches, often from unencrypted backups or unsecured test systems. Healthcare data isn’t just PII — it’s full personal identity: insurance, SSNs, medical history, and even biometrics.

[04:00–09:00] Real Breaches and Their Lessons

Kellyn:
Just in 2024, we’ve seen:

Tricare: 5M records lost from unencrypted backups

Community Health Systems: 4.5M via test system breach

Advocate Health: 4M through stolen, unprotected laptops

Newkirk Products: 3.8M through test server data leak

Trinity Health: ransomware on unmasked subset of data

OneTouchPoint: 2.6M affected from third-party vendor access

Each one highlights how test and non-production environments are prime attack vectors.

Mark:
Yes, and vendors are often the weakest link. Many have no business holding PHI, yet still receive it. That’s where data masking changes the game.

[09:00–12:00] What Is and Isn’t Data Masking

Kellyn:
Let’s clear something up — “Dynamic Data Masking” in SQL Server isn’t true masking. It just hides data on screen. True data masking is irreversible, used for non-production data, and maintains referential integrity across databases.

Mark:
Exactly. And while encryption protects data at rest or in transit, it’s still readable by anyone with the key. Masking fundamentally changes the data, rendering it useless to attackers. Even if breached, it’s just anonymized test data.

[12:00–15:00] The Case for Masking in Healthcare

Kellyn:
Healthcare is the most targeted industry for data theft. Developers and testers still need real data — but they don’t need real identities. Masking lets them build and test with realistic datasets safely.

Mark:
Plus, masked data accelerates innovation. You can open datasets to analytics, partners, or AI initiatives without risk. The referential integrity stays intact, but PHI disappears.

[15:00–22:00] Sentara Health: Architecture and Innovation

Kellyn:
Let’s dive into Sentara Health’s story — because this architecture blew my mind.

Mark:
Sentara originally adopted Silk for performance — running their Epic EHR workloads. But then they realized Silk’s instant extract feature could create zero-footprint clones in minutes.

That allowed them to:

Snap live databases instantly

Mount exact copies to SQL servers for dev/test

Mask sensitive data using Redgate Data Masker

Refresh non-prod daily — safely and automatically

It cut their analytics runtime from 18 hours to under 12, and dropped storage costs by nearly $1 million compared to native cloud storage.

Kellyn:
And with Redgate, you integrated classification templates too, right?

Mark:
Yes. Sentara classifies sensitive data automatically before masking — detecting PII or PHI wherever it appears. It’s streamlined and repeatable, turning data masking into a service rather than a project.

[22:00–29:00] Data Masking as a Service

Mark:
We call it Data Masking as a Service.

Infrastructure teams just manage Silk’s automation — no manual refreshes. Data owners define masking rules through Redgate; Silk handles cloning, masking, and rehydrating environments.

The result:

Daily masked data refreshes in under 1 hour

Zero disruption to production

Developers and data scientists work safely and fast

Kellyn:
That’s revolutionary. It gives healthcare developers what they need without exposing patient data.

[29:00–34:00] AI, Copilot, and Safe Data for Machine Learning

Kellyn:
You also mentioned Silk’s integration with AI initiatives at Sentara — using masked data for LLMs and Copilot testing.

Mark:
Right. AI can easily be “poisoned” by real PHI — so we isolate training data entirely. Masked, cloned datasets let Sentara test AI use cases without risk.

They can train on full-scale datasets (40–100 TB) instantly, because Silk mounts them directly without network strain or extra copies.

Kellyn:
So they can explore AI freely while keeping compliance airtight. That’s huge.

[34:00–41:00] Measurable Benefits

Mark:
The results are striking:

Data masking runs dropped from hours to under one hour using Silk’s parallel I/O.

Storage costs reduced by 90% through zero-footprint clones.

Compute runtime costs fell from ~$60K to <$1K/month using burst scaling.

Developers now refresh data daily instead of weekly.

Kellyn:
That’s “instant gratification” for developers — without risk.

[41:00–46:00] Broader Impact on Healthcare and AI

Kellyn:
This isn’t just a tech story — it’s cultural. Healthcare teams used to treat data like radioactive material. Now, with proper masking and instant extracts, they can collaborate and innovate again.

Mark:
Exactly. It’s turned “security” from a blocker into an enabler.
Developers, data scientists, and infrastructure teams now share repeatable design patterns — not manual processes.

[46:00–53:00] Future Trends

Kellyn:
Looking ahead, here’s what’s coming fast:

Stricter HIPAA and state-level privacy laws (Oregon, Texas, Montana)

Increased data subsetting and minimization

Homomorphic encryption — share without decrypting

AI-driven anomaly detection for unauthorized access

Differential privacy and multi-party computation for selective sharing

These trends make masked data and automation even more critical.

Mark:
And for healthcare especially — masking + automation = survival.

[53:00–59:00] Key Takeaways

Kellyn:

It’s not if a data breach happens — it’s when.

Masking protects your data before the breach.

Instant extracts with Silk enable high-speed cloning and refresh.

Developers get full agility without compliance risk.

AI and analytics can thrive safely on masked, relational data.

Mark:
Exactly — and at Sentara, these practices have evolved from “security projects” into core business processes.

Kellyn:
That’s the future of healthcare data: secure, automated, and intelligent.