Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.


Welcome to the Healthcare topic!

In this topic you may collaborate with your peers by participating in discussions, adding links and documents, and starting or contributing to wikis.

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

This Topic Has:
268 Members
0 Online
6926 Visits

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 33 total

Must be a Topic member to contribute
View All »
In the Hospital and Healthcare sector the concept of security is based on the short term Security Management plan (SMP) and the long term security strategic plan/security master plan. I am looking for a template for a security management plan for a client...
Khokhar | 3/7/2018 1:57:13 PM | COMMENTS(3)
Organizational technology change and user alignment are common struggles across industry. Organizational leaders and their technology teams spend a great deal of time and resources analyzing, developing, acquiring and implementing technologies to improve...
Sam534 | 11/17/2017 4:40:54 PM | COMMENTS(0)
Hello all, looking for some thoughts about a coding vendor for ICD-10.  One of the potential ICD-10 coding vendors is a domestic company but they have employees in India and Philippines.  From a risk perspective, we are very concerned about this arrangeme...
Chris | 6/26/2015 8:11:08 AM | COMMENTS(3)
Hope you don't mind me posting in this groupabout this year's ISACA Ireland conference, which is focusing on placingbusiness first. Wewould like this conference to be as successful as last year's, which was trulyinternational with 24 speakers from 12 coun...
Neil_Curran | 6/17/2015 4:13:12 AM | COMMENTS(0)
Am looking for an Information Security Plan Template specific to Healthcare?  Our organization has a number of IS security policies based on the Administration, Technical and Physical controls. We are developing an IS security plan that would address the ...
Debney Moore | 6/3/2015 4:05:32 PM | COMMENTS(4)
Tele-health systems improve the accessibility, affordability, quality, and effectiveness of health care. Concerns about privacy and security may adversely affect peoples' trust in these systems thereby impeding and adversely affecting health delivery. H...
Dr Sujata Kanhere | 3/20/2015 4:24:45 AM | COMMENTS(5)

Documents & Publications: 7 total

Must be a Topic member to contribute
View All »
This publication explains the latest threats along with detailed fixes, best practices and "from the headlines" case studies.
Posted by ISACA 1815 days ago
The presentation was delivered at the ISRM/ IT GRC Conference November 15 in Las Vegas. This presentation addressed the following points. Recognize the importance of Personal Health Information (PHI /PII) inventory and life cycle management for IT personnel; · Learn about your conflicting regulatoryobligations for breach incident response; · Understand the steps for effective incidentresponse and compliance management; · Learn about metrics to measure your compliance performanceand return on investment; · Build a case to establish a sustainable audit response process; · Communicate to management and peers theimportance of department partnerships to achieve unified goals
Posted by Chad_SDS 1950 days ago

Events & Online Learning: 1 total

29 Oct 2018
ISACA International Event
Seattle, WA, USA

Journal Articles: 10 total

Volume 3, 2018
by Giuliano Pozza, CGEIT, e-CF Plus (CIO), ITIL v3
The world of information and data management is changing faster than anyone could have predicted a few years ago, and attention to sensitive data protection is growing, as the new GDPR is clearly proving.
Volume 3, 2018
by Justine Bone, Violet Morris and Chadwick Williamson
Healthcare technology is at a critical juncture of rapid growth, seamless implementation and the need for constant adaptability.
Volume 1, 2017
by Shounak Pal and Arunabha Mukhopadhyay, Ph.D.
Telemedicine is a component of ehealth that uses information and communication technology (ICT) to deliver health care services to overcome distance and connect the provider and the patient.
Volume 2, 2015
by Elena Beratarbide, Ph.D., CISA, Thomas W. Kelsey, Ph.D., and Hermenegildo Gil, Ph.D.
From the health care service perspective, e-health plays an essential role. It is perceived as crucial for high-quality and cost-effective health care.
Volume 5, 2014
by Giuliano Pozza
The discussion around bring your own device (BYOD) policies is often focused on topics such as the opportunity, risk and security implications of using personal devices and user apps in the business context.
Volume 3, 2013
by Santhosh Patil
Health care spending is a key component of any industrialized nation’s economy.

Wikis: 2 total

Blog Posts: 1 total

Must be a Topic member to view blog posts
There is no doubt with our current business environment, we will be experiencing more cyber breaches in the next few months.  The latest threat is an architectural design flaw in newer CPU's.  These design vulnerabilities could allow attackers to intercep...
Posted By : Fred586 | 1 comments