Shared Services

Providing organizations with affordable access to shared data and enhanced security
services and making it easy to locate trusted vendors and to obtain lower
member rates due to our volume pricing.

IP & Digital Risk Monitoring

View Details

Identity & Access Management

View Details

Security Operations Services

View Details

Third Party Risk Management

View Details

What do IP and Digital Risk Monitoring Services Offer:

 + Obtain complete visibility into your organization’s expanding and persistently changing digital footprint; the activities, actions and communications that can be passively or actively collected by third parties when using digital devices & services.

+ Enhance your organization’s ability to protect confidential data, organizational reputation and customer experience.

+ Adjust and adapt to breaking situations analysts must triage and mitigate to maintain organizational resiliency and protect its reputation

IP and digital risk monitoring

What are the key benefits?:

 

+ Real-time social media monitoring and situational awareness

+ Detect content and meta data from the front page of millions of registered domains

+ Social media abuse, malicious domain, and mobile app detection

+ Detect exposure and sale of confidential and proprietary information

+ Executive protection and location-based threat detection

+ Continuous third-party vendor & partner reputation monitoring

+ Expert support to investigate and mitigate digital threats

    What Are The Key Benefits?

    + Meets regulatory requirements

    + Reduce Risks

    + Increase business and cost efficiencies

    + Improve cyber security

    + Enables secure collaboration with external partners and applications throughout the supply chain

    Identity and access management

    What do SAFE-BioPharma Certified Identity and Access Management Services Offer?

    Identity Trust Ecosystem

    A single, trusted cyber identity recognized across all participating ecosystems

    Digital Signatures

    Legally binding and globally recognized for electronic submissions, electronic prescriptions, electronic health records, contracts, etc.

    Cyber Security

    Mitigates threats resulting from weak identity trust

    Protects confidentiality and information integrity

    Workflow Automation

    Significantly improve workflows migrated from labor-intensive paper-based processes

    Regulatory Compliance

    Meets requirements for FDA, EMA, and DEA’s EPCS

    Aligned with USG strong authentication requirements and is the only digital signature standard recognized globally

     

    What Are The Key Benefits?

    + Access to best-in-class tools to advance your organization’s cybersecurity

    + A streamlined procurement process making it easier to obtain services from trusted vendors

    + Services tailored for the healthcare industry

    + Personalized recommendations for remediation

    + Discounted rates due to volume pricing

    + A document repository to assist members with planning for Incident response

    Security Operations services

    What do Security Operations Services Offer?

    1. Incident Response and Malware Analysis

    – Priority emergency access to Incident Response team with or without a pre-established retainer

    – Pre-established Security Services retainer available for additional savings

    2. Penetration Testing

    – External and internal penetration testing at pre-negotiated rate

    – Web application testing

    3. Vulnerability Assessment – one time

    4. Vulnerability Management

    – Quarterly scheduled scans with a quarterly call to review and make recommendations

    – Up to 16 external IPs and up to 256 internal IPs at a discounted yearly rate

     

    What are the key benefits?

    + Reduce time and cost associated with vendor assessments through a collaborative and standardized model

    + Benchmark your own risk assessments and achieve repeatable, auditable results with our best in class process

    + Leverage the entire H-ISAC membership’s knowledge of third-party products and services, and contribute your own knowledge to help improve healthcare community-wide cybersecurity practices

    + Assistance with a complete portfolio of offerings designed for comprehensive risk reduction are available as standard offerings for the membership including onsite assessments, program design, & vendor monitoring.

    Third party risk management 

    What do Shared Assessments and Third Party Risk Management Services Offer?

    + Automated evidence collection & risk assessment designed specifically for the Healthcare industry to measure third-party vendors for security and data risk.

    + Standardized Shared Services model for evidence collection designed to create a baseline across products, services, & vendors with industry common criteria for risk assessment & remediation.

    + Access to comprehensive vendor repository evidence is immediately available to apply to your own risk assessment processes and practice.

    + Continuous risk monitoring across five key risk areas (cyber data, brand, financial, operational, and regulatory) – areas identified as mandatory to satisfy regulatory obligations. 

    Contact US

    We look forward to hearing from you.  If you would like more information on any of the Shared Services, please complete the form to the right.

    If you would like to contact us directly, please email the H-ISAC below.

    sharedservices@h-isac.org

    Service Selection

    Security Service