Skip to main content

Whitepaper Series for CISOs on Identity Access Management

In cybersecurity, identity is suddenly more important than ever before. This series of Health-ISAC whitepapers is designed to provide CISOs – and the broader health care community – a holistic guide on how to best approach Identity and Access Management (IAM) and its role in managing cybersecurity risk. The series provides an explanation of key concepts, outlines a framework and best practices, investigates the various identity solutions, and highlights the aspects of effective implementation. The papers are listed in a recommended order of reading.
Health-ISAC defines passwordless technologies and how healthcare organizations can deploy the authentication technology for patients and in the enterprise. It includes case studies on different passwordless implementations.
| , ,
Overviews biometric technologies—both physiological and behavioral—that can help healthcare organizations more easily enable MFA, secure patient data, and identity proof patients
| ,
Covers remote identity proofing solutions for health care CISOs and challenges around the technologies.
Educates health care CISOs on the basic tenets of zero trust, the challenges that may be unique to that market, and how to begin implementing the architecture.
| , ,
Helps CISOs understand how an identity-centric approach to securing and enabling access to EHI will allow health organizations to minimize risks involved in complying with the US 21st Century Cures Act.
| , ,
A deeper dive into the Framework, starting with authentication.
Outlines a comprehensive Framework that health CISOs can use to architect, build and deploy a modern identity system that will protect against modern attacks and also support key business drivers.
| , ,
Details why healthcare CISOs need to embrace an identity-centric approach to cybersecurity – including where and how to get started.
This site is registered on Toolset.com as a development site.