Interoperability for Healthcare CISOs

IDENTITY, INTEROPERABILITY, PATIENT ACCESS, and the 21st CENTURY CURES ACT: A Health-ISAC Guide for CISOs SCOPE STATEMENT:   IDENTITY AND INTEROPERABILITY   An identity-centric approach to enabling secure and easy access to patient data The modernization of...

Security Implementation of Privacy Regulation

Security Implementation of Privacy Regulation This paper is a product of the Health-ISAC GOVERNANCE AND POLICY WORKING GROUP SCOPE STATEMENT: This paper provides a recommendation for a minimum set of security controls and process tasks to  protect Personal...

Preparing for the Next SolarWinds Event

Strategic Threat Intelligence: Preparing for the Next "SolarWinds" Event TLP WHITE Health-ISAC / AHA Threat Intelligence   STRATEGIC THREAT INTELLIGENCE:PREPARING FOR THE NEXT “SOLARWINDS” EVENT INTRODUCTION As the impact of the SolarWinds incident is still being...

Authentication: A Health-ISAC Guide for CISOs

ALL ABOUT AUTHENTICATION: A Health-ISAC Guide for CISOs Scope Statement MFA. OTP. FIDO. SMS. PKI. All of these acronyms might have you saying OMG, but they are each important to understand when it comes to managing authentication. It’s an anomaly these days when a...

Blended Threats Whitepaper

Sharable outcomes aggregated from the Health-ISAC Blended Threats exercise series H-ISAC conducted six Blended Threats Workshops across the United States. A goal of these exercises was to create consensus on approaches to building layered defenses and then sharing the...

Big Data Security Controls Whitepaper

 In this practical, informative white paper, you’ll learn: – Data analytics and controls and risks associated with it – Model governance, derived data, automated decisions and security analytics – Data encryption pros, cons and emerging techniques...
Translate »