Feb 26, 2021 | In The News, White Papers
ALL ABOUT AUTHENTICATION: A Health-ISAC Guide for CISOs Scope Statement MFA. OTP. FIDO. SMS. PKI. All of these acronyms might have you saying OMG, but they are each important to understand when it comes to managing authentication. It’s an anomaly these days when a...
Oct 19, 2020 | In The News, White Papers
Medical Device Cybersecurity Lifecycle Management Abstract — This document provides an overview of a lifecycle-based approach to managing medical device cybersecurity from the perspective of Medical Device Manufacturers and Healthcare Delivery Organizations. It...
Jul 1, 2020 | In The News, White Papers
MEDICAL DEVICE SECURITY PART 1: LANDSCAPE OF GLOBAL REGULATORY GUIDANCE ABSTRACT: The pace of release of cybersecurity guidance for medical devices across the globe has been accelerating over the past few years. Compliance and legal officers, CIOs, and CSOs...
May 19, 2020 | In The News, White Papers
An H-ISAC Framework for CISOs to Manage Identity ABSTRACT: Our first paper “Identity for the CISO Not Yet Paying Attention to Identity” detailed why healthcare CISOs need to embrace an identity-centric approach to cybersecurity – including where and how to get...
Mar 23, 2020 | In The News, White Papers
Abstract Information sharing programs, when done properly, produce significant benefit at low risk for the organizations that participate. This document provides Healthcare and Public Health Sector (HPH) organizations with a set of guidelines and best practices for...
Dec 18, 2019 | In The News, White Papers
Sharable outcomes aggregated from the Health-ISAC Blended Threats exercise series H-ISAC conducted six Blended Threats Workshops across the United States. A goal of these exercises was to create consensus on approaches to building layered defenses and then sharing the...
Sep 17, 2019 | In The News, White Papers
Identity for the CISO Not Yet Paying Attention to Identity Click Here to View / Download Identity is the leading cause of breaches today – but many health care organizations don’t understand why securing identity is so important, or where to get started. Download the...
Jun 14, 2018 | In The News, White Papers
In this practical, informative white paper, you’ll learn: – Data analytics and controls and risks associated with it – Model governance, derived data, automated decisions and security analytics – Data encryption pros, cons and emerging techniques...
Jul 6, 2017 | In The News, White Papers
“It’s Not Who’s First… It’s Who Puts The Industry First“ By: H-ISAC Threat Intelligence Committee Jim Routh, CSO Aetna Global Security H-ISAC – “The healthcare industry has been hit with two significant and subsequent cyber challenges in recent weeks (WannaCry and...
Oct 27, 2016 | In The News, White Papers
The Electricity Information Sharing and Analysis Center (E-ISAC) has released a white paper regarding a new type of DDoS attack....