Security Implementation of Privacy Regulation

Security Implementation of Privacy Regulation This paper is a product of the Health-ISAC GOVERNANCE AND POLICY WORKING GROUP SCOPE STATEMENT: This paper provides a recommendation for a minimum set of security controls and process tasks to  protect Personal...

Preparing for the Next SolarWinds Event

Strategic Threat Intelligence: Preparing for the Next "SolarWinds" Event   TLP WHITE Health-ISAC / AHA Threat Intelligence   STRATEGIC THREAT INTELLIGENCE:PREPARING FOR THE NEXT “SOLARWINDS” EVENT   INTRODUCTION As the impact of the SolarWinds incident is still...

Authentication: A Health-ISAC Guide for CISOs

ALL ABOUT AUTHENTICATION: A Health-ISAC Guide for CISOs Scope Statement MFA. OTP. FIDO. SMS. PKI. All of these acronyms might have you saying OMG, but they are each important to understand when it comes to managing authentication. It’s an anomaly these days when a...

Medical Device Cybersecurity Lifecycle Management

Medical Device Cybersecurity Lifecycle Management Abstract — This document provides an overview of a lifecycle-based approach to managing medical device cybersecurity from the perspective of Medical Device Manufacturers and Healthcare Delivery Organizations. It...

An H-ISAC Framework for CISOs to Manage Identity

An H-ISAC Framework for CISOs to Manage Identity ABSTRACT: Our first paper “Identity for the CISO Not Yet Paying Attention to Identity” detailed why healthcare CISOs need to embrace an identity-centric approach to cybersecurity – including where and how to get...
Translate »