An H-ISAC Framework for CISOs to Manage Identity

An H-ISAC Framework for CISOs to Manage Identity ABSTRACT: Our first paper “Identity for the CISO Not Yet Paying Attention to Identity” detailed why healthcare CISOs need to embrace an identity-centric approach to cybersecurity – including where and how to get...

H-ISAC Information Sharing Best Practices

Abstract Information sharing programs, when done properly, produce significant benefit at low risk for the organizations that participate. This document provides Healthcare and Public Health Sector (HPH) organizations with a set of guidelines and best practices for...

Blended Threats Whitepaper

Sharable outcomes aggregated from the Health-ISAC Blended Threats exercise series H-ISAC conducted six Blended Threats Workshops across the United States. A goal of these exercises was to create consensus on approaches to building layered defenses and then sharing the...

Identity for the CISO Not Yet Paying Attention to Identity

Identity for the CISO Not Yet Paying Attention to Identity Click Here to View / Download Identity is the leading cause of breaches today – but many health care organizations don’t understand why securing identity is so important, or where to get started. Download the...

Big Data Security Controls Whitepaper

 In this practical, informative white paper, you’ll learn: – Data analytics and controls and risks associated with it – Model governance, derived data, automated decisions and security analytics – Data encryption pros, cons and emerging techniques...
Translate »