Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Welcome to the Healthcare topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
265 Members
0 Online
6822 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 33 total

Must be a Topic member to contribute
View All »
In the Hospital and Healthcare sector the concept of security is based on the short term Security Management plan (SMP) and the long term security strategic plan/security master plan. I am looking for a template for a security management plan for a client...
Khokhar | 12/19/2017 6:16:11 AM | COMMENTS(2)
Organizational technology change and user alignment are common struggles across industry. Organizational leaders and their technology teams spend a great deal of time and resources analyzing, developing, acquiring and implementing technologies to improve...
Sam534 | 11/17/2017 4:40:54 PM | COMMENTS(0)
Hello all, looking for some thoughts about a coding vendor for ICD-10.  One of the potential ICD-10 coding vendors is a domestic company but they have employees in India and Philippines.  From a risk perspective, we are very concerned about this arrangeme...
Chris | 6/26/2015 8:11:08 AM | COMMENTS(3)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:13:12 AM | COMMENTS(0)
Am looking for an Information Security Plan Template specific to Healthcare?  Our organization has a number of IS security policies based on the Administration, Technical and Physical controls. We are developing an IS security plan that would address the ...
Debney Moore | 6/3/2015 4:05:32 PM | COMMENTS(4)
Tele-health systems improve the accessibility, affordability, quality, and effectiveness of health care. Concerns about privacy and security may adversely affect peoples' trust in these systems thereby impeding and adversely affecting health delivery. H...
Dr Sujata Kanhere | 3/20/2015 4:24:45 AM | COMMENTS(5)

Documents & Publications: 8 total

Must be a Topic member to contribute
View All »
This publication explains the latest threats along with detailed fixes, best practices and "from the headlines" case studies.
Posted by ISACA 1696 days ago
The presentation was delivered at the ISRM/ IT GRC Conference November 15 in Las Vegas. This presentation addressed the following points. Recognize the importance of Personal Health Information (PHI /PII) inventory and life cycle management for IT personnel; · Learn about your conflicting regulatoryobligations for breach incident response; · Understand the steps for effective incidentresponse and compliance management; · Learn about metrics to measure your compliance performanceand return on investment; · Build a case to establish a sustainable audit response process; · Communicate to management and peers theimportance of department partnerships to achieve unified goals
Posted by Chad_SDS 1831 days ago

Events & Online Learning: 1 total

11 Sep 2017
ISACA International Event
Portland, OR, USA

Journal Articles: 8 total

Volume 1, 2017
by Shounak Pal and Arunabha Mukhopadhyay, Ph.D.
Telemedicine is a component of ehealth that uses information and communication technology (ICT) to deliver health care services to overcome distance and connect the provider and the patient.
Volume 2, 2015
by Elena Beratarbide, Ph.D., CISA, Thomas W. Kelsey, Ph.D., and Hermenegildo Gil, Ph.D.
From the health care service perspective, e-health plays an essential role. It is perceived as crucial for high-quality and cost-effective health care.
Volume 5, 2014
by Giuliano Pozza
The discussion around bring your own device (BYOD) policies is often focused on topics such as the opportunity, risk and security implications of using personal devices and user apps in the business context.
Volume 3, 2013
by Santhosh Patil
Health care spending is a key component of any industrialized nation’s economy.
Volume 5, 2011
by Haris Hamidovic, CIA, ISMS IA, ITIL-F, IT Project+ and Jasmina Kabil
The main objective of this article is to provide an introduction to the key elements of information security management in health care using ISO 27799:2008.
Volume 5, 2010
This article focuses on the privacy and security aspects of the HITECH Act portion of the US American Recovery and Reinvestment Act, EHR certification criteria, and standards included in meaningful use.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
There is no doubt with our current business environment, we will be experiencing more cyber breaches in the next few months.  The latest threat is an architectural design flaw in newer CPU's.  These design vulnerabilities could allow attackers to intercep...
Posted By : Fred586 | 1 comments