All NH-ISAC Members are welcome to participate in the NH-ISAC Working Groups. If you are an NH-ISAC Member and would like to form a Working Group or for additional information on the Working Groups listed below, please email us at email@example.com.
Threat Intelligence Committee
The Threat Intelligence Committee (TIC) is responsible for looking at the cyber threat landscape for the health and public health (HPH) sector and developing strategic direction for the ISAC community to anticipate and prepare for threats. The TIC helps facilitate the planning, coordination, collection, trending, processing and analysis, production of white papers and other materials and dissemination of primarily cyber threat intelligence for the HPH sector through engagement with internal and external stakeholders. The NH-ISAC Threat Intelligence Committee will:
- Define information sharing services for peer-to-peer, hub-and-spoke, and source subscriber threat intelligence sharing models including situational awareness, real-time cyber defense, and threat analysis
- Develop standardized representations for campaigns, threat actors, incidents, tactics techniques and procedures (TTPs), indicators, exploit targets, observables, and courses of action
- Develop tools and technologies to protect subscribers
- Develop a long term vision to shift from reactive to proactive analytics and best cyber practices
Emergent Healthcare Identity and Authentication (EHIA)
The EHIA will establish expectations for functionality of healthcare identity and authentication with the NH-ISAC membership and identify industry activities that are furthering this work. Overlapping, conflicting or missing capabilities will be tracked.
The NH-ISAC and membership will then identify opportunities to influence activities to create a more harmonized model. We will align with the goals of the 2011 Presidential Directive for a National Strategy for Trusted Identities in Cyberspace (NSTIC).
Cloud Security Working Group
This new working group strives to bring together stakeholders in the health care security arena to develop solutions, identify best practices and facilitate the exchange of information that will result in a more efficient and secure use of cloud services and related practices.
• Share ideas, white papers and new ways of working with cloud providers • Certifications, Checklist/Guidelines/Crosswalk for adoption or participation • Focus on and update management and specific laws or regulations • A CYBERFIT assessment for members to use for cloud adoption highlighting security gaps
Big Data Working Group
The Big Data Controls Working Group provides a forum for individuals working in the healthcare industry to share lessons learned regarding the challenges and opportunities associated with big data systems. The working group seeks to identify information control best practices for big data systems and also identify data analytics best practices for security and business applications. Meetings are held once per month and are designed to provide an opportunity to learn about the different tools and techniques that have proven effective in our different environments.
Medical Device Cyber Security Information Sharing Council (MDCSISC)
The National Health Information Sharing and Analysis Center (NH-ISAC) established the Medical Device Security Information Sharing Council (MDSISC) on October 1, 2015. The mission of the MDSISC is to bring together stakeholders in the medical device security arena to develop solutions, identify best practices and facilitate the exchange of information that will result in a more efficient and secure use of medical devices and related practices.
Membership is open to medical device manufacturers and stakeholders of the medical device security community that conduct their activities consistent with NH-ISAC’s Operating Rules including Non-Disclosure Agreement, health industry regulations and best practices, and the highest ethical standards.
Provider Special Interest Council
The purpose of this work group is to find innovative ways to improve cybersecurity while not impeding patient care to lower the risk to the organization that may be vulnerable to attacks by the former employees, contractors, or potential hackers who look to compromise critical systems and steal health records. The goals of the Provider Working Group are to share ideas and generate white papers as well as new solutions to address the new technology within the provider community.
Focus areas include:
- Establish (or adopt) a minimum standard for cybersecurity
- Establish standards for tele health technology
- Assist with supporting the smaller provider organizations
- Increase the share of methods for cybersecurity and data protection
- Develop patient/employee friendly cybersecurity approaches
- Assist with training and awareness campaigns
Business Resiliency for Small & Medium Healthcare Entities
The overall goal of the working group BRSM is for members to share ideas, best practices, experiences and program success and challenges. In addition, the group will discuss and propose potential solutions and approaches to the opportunities presented and challenges faced in the ever-changing operational and technology landscapes. An example discussion would be integrating new offshore operations offices into a strategic continuity plan. Another example would be developing resiliency plans and appropriate recovery security protections for cloud solutions integrated into the technology stack. BRSM is intended to address the needs, issues and challenges small and medium healthcare entities face in building resiliency in respect to business continuity, disaster recovery, major incident response and crisis management.
Cyber Education and Awareness Committee
The purpose of this new working group is to develop a mechanism whereby members can share ideas and tangible assets that can be leveraged to support the cybersecurity education and awareness programs of our NH-ISAC member community.
Payer Special Interest Council
The purpose of the Payer Special Interest Council is to connect large and small insurance carriers to collaborate and share risk-based cybersecurity and anti-fraud strategies while reducing control impact to the business. We will discuss control frameworks, vendor tools, templates, and other non-proprietary information that can help combat and prevent cyber and fraud risks. Goals include: Development of white papers on cybersecurity approaches and best practices/awareness training, Share/exchange tactics and broad strategies that make material differences in the involved payer organizations and Assist with supporting smaller payer organizations.
Focus areas include:
- Differentiating and addressing Payer vs. Provider cyber/fraud risk
- Risk-based strategic and tactical safeguards/frameworks/programs
- Control implementation and impacts to the business
- Anti-Fraud mitigation strategies – Special Investigation Units (SIU)
- Tools and vendor feedback
- Regulatory items (HIPAA, PCI, etc.)
- Current threats/vulnerabilities