Healthcare Best Practices for Securing Email

From training / testing staff to implementing DMARC Special thanks to Justin Armstrong, CISSP, MEDITECH Product Security, for sharing this article in the spirit of helping other H-ISAC member organizations implement DMARC. MEDITECH has been doing DMARC in reject mode...

H-ISAC Collaboration and the MITRE ATT&CK Model

Using Analytics for Proactive Cyber Defense in Healthcare and other Sectors   As the various ISAC’s continue to rally their defenses against the growing number of cyber threats, MITRE has revolutionized the tracking of cyber threat intelligence. The MITRE...

Tactical Tips for CISO Reporting to the Board

Healthcare Cybersecurity Posture Just a few years ago, the thought of a Chief Information Security Officer (CISO) having an audience with the board sounded more like a dream come true than reality. Indeed, cybersecurity was not a top priority for most management...

Information Sharing as a Mitigation Strategy

How Health Sector Organizations Share Cybersecurity With the growing amount of data that organizations must process on a daily basis, cybersecurity has become a top concern. Current cyber threats are becoming more sophisticated, complex, and widespread. In particular,...

H-ISAC Collaboration and the MITRE ATT&CK Model

Using Analytics for Proactive Cyber Defense As the various ISAC’s continue to rally their defenses against the growing number of cyber threats, MITRE has revolutionized the tracking of cyber threat intelligence. The MITRE ATT&CK Model has become the globally...

Third Party Risk Governance

Third Party Risk Governance Over the past decade, the number – and range – of affiliate companies serving the healthcare industry has risen dramatically and become significantly more diverse. In addition, these companies find themselves so interconnected that there...
Translate »