Tactical Tips for CISO Reporting to the Board

Healthcare Cybersecurity Posture Just a few years ago, the thought of a Chief Information Security Officer (CISO) having an audience with the board sounded more like a dream come true than reality. Indeed, cybersecurity was not a top priority for most management...

Information Sharing as a Mitigation Strategy

How Health Sector Organizations Share Cybersecurity With the growing amount of data that organizations must process on a daily basis, cybersecurity has become a top concern. Current cyber threats are becoming more sophisticated, complex, and widespread. In particular,...

H-ISAC Collaboration and the MITRE ATT&CK Model

Using Analytics for Proactive Cyber Defense As the various ISAC’s continue to rally their defenses against the growing number of cyber threats, MITRE has revolutionized the tracking of cyber threat intelligence. The MITRE ATT&CK Model has become the globally...

Third Party Risk Governance

Third Party Risk Governance Over the past decade, the number – and range – of affiliate companies serving the healthcare industry has risen dramatically and become significantly more diverse. In addition, these companies find themselves so interconnected that there...