Skip to main content

Threat Operations

Central threat intelligence and operations helps to ensure all health sector members are informed and protected

Health Sector Threat Intelligence

H-ISAC provides threat intelligence for the health sector free of charge to all members.  With a dedicated staff of analysts, the H-ISAC Threat Operations Center (TOC) serves as your first line of defense against physical and cyber threat actors.  The TOC generates and distributes a portfolio of intelligence, including:  Daily Cyber Headlines, Cyber Threat Bulletins, Cyber Vulnerability Alerts, Physical Security Threat Intelligence, and a host of timely and topical special programming.

[dnxte_3d_flipbox front_icon_switch=”off” front_image_switch=”on” front_image=”https://h-isac.org/wp-content/uploads/Screen-Shot-2020-11-02-at-11.20.09-AM-150×150.png” front_heading=”Centralizing Threat Intelligence” front_heading_tag=”h1″ front_bgc_color=”#ffffff” front_bgi_show_hide=”on” front_image_size=”-1%” front_image_alignment=”center” back_icon_switch=”off” back_content=”

Members are given free access to the H-ISAC Threat Intelligence Portal, where they can review the latest intelligence, see the history of the data, and communicate with other members. They can also control the type(s) of information they view and how they view it.

” back_bgc_color=”#ffffff” btn_show_hide=”off” flipbox_effect=”dnext-3d-transform-flpb-rightto-left” _builder_version=”4.6.6″ _module_preset=”default” front_flip_text_text_align=”center” front_flip_text_text_color=”#000000″ front_flip_text_font_size=”26px” front_flip_text_letter_spacing=”3px” front_body_text_align=”center” back_body_text_align=”center” back_body_text_color=”#000000″ back_body_font_size=”20px” background_enable_image=”off” background_size=”initial” module_alignment=”center” max_height=”287px” custom_margin=”||||false|false” custom_padding=”||||false|false” hover_enabled=”0″ border_width_all=”0px” border_width_all_front_borders=”0px” border_width_all_back_borders=”0px” box_shadow_style_front_box_shadow=”preset1″ box_shadow_style_back_box_shadow=”preset1″ locked=”off” sticky_enabled=”0″][/dnxte_3d_flipbox][dnxte_3d_flipbox front_icon_switch=”off” front_image_switch=”on” front_image=”https://h-isac.org/wp-content/uploads/Screen-Shot-2020-11-02-at-11.20.09-AM-150×150.png” front_heading=”Automating Threat Information” front_heading_tag=”h1″ front_bgc_color=”#ffffff” front_bgi_show_hide=”on” front_image_size=”-1%” front_image_alignment=”center” back_icon_switch=”off” back_content=”

H-ISAC’s free, comprehensive threat feed includes cyber, physical, and healthcare-specific intelligence. Using STIX and TAXII, organizations are able to accept our feed into their threat intelligence platform or SIEM as their primary intelligence, or to augment other threat feeds.

” back_bgc_color=”#ffffff” btn_show_hide=”off” flipbox_effect=”dnext-3d-transform-flpb-rightto-left” _builder_version=”4.6.6″ _module_preset=”default” front_flip_text_text_align=”center” front_flip_text_text_color=”#000000″ front_flip_text_font_size=”26px” front_flip_text_letter_spacing=”3px” front_body_text_align=”center” back_body_text_align=”center” back_body_text_color=”#000000″ back_body_font_size=”20px” background_enable_image=”off” background_size=”initial” module_alignment=”center” max_height=”287px” custom_margin=”||||false|false” custom_padding=”||||false|false” hover_enabled=”0″ border_width_all=”0px” border_width_all_front_borders=”0px” border_width_all_back_borders=”0px” box_shadow_style_front_box_shadow=”preset1″ box_shadow_style_back_box_shadow=”preset1″ locked=”off” sticky_enabled=”0″][/dnxte_3d_flipbox][dnxte_3d_flipbox front_icon_switch=”off” front_image_switch=”on” front_image=”https://h-isac.org/wp-content/uploads/Screen-Shot-2020-11-02-at-11.20.09-AM-150×150.png” front_heading=”Bolstering Security Operations” front_heading_tag=”h1″ front_bgc_color=”#ffffff” front_bgi_show_hide=”on” front_image_size=”-1%” front_image_alignment=”center” back_icon_switch=”off” back_content=”

H-ISAC has preferred agreements with Anomali, Celerium, Perch Security, and TruStar that allow members who cannot accept automated feeds to do so inexpensively. Each solution has unique benefits, allowing members to choose the one that best fits their needs.

” back_bgc_color=”#ffffff” btn_show_hide=”off” _builder_version=”4.6.6″ _module_preset=”default” front_flip_text_text_align=”center” front_flip_text_text_color=”#000000″ front_flip_text_font_size=”26px” front_flip_text_letter_spacing=”3px” front_body_text_align=”center” back_body_text_align=”center” back_body_text_color=”#000000″ back_body_font_size=”20px” background_enable_image=”off” background_size=”initial” module_alignment=”center” max_height=”287px” custom_margin=”||||false|false” custom_padding=”||||false|false” hover_enabled=”0″ border_width_all=”0px” border_width_all_front_borders=”0px” border_width_all_back_borders=”0px” box_shadow_style_front_box_shadow=”preset1″ box_shadow_style_back_box_shadow=”preset1″ locked=”off” sticky_enabled=”0″][/dnxte_3d_flipbox][dnxte_3d_flipbox front_icon_switch=”off” front_image_switch=”on” front_image=”https://h-isac.org/wp-content/uploads/Screen-Shot-2020-11-02-at-11.20.09-AM-150×150.png” front_heading=”Building a Strong Community” front_heading_tag=”h1″ front_bgc_color=”#ffffff” front_bgi_show_hide=”on” front_image_size=”-1%” front_image_alignment=”center” back_icon_switch=”off” back_content=”

Not only are members able to receive threat intelligence, but they are encouraged to input the threats they are witnessing in their environments back into the H-ISAC feed. Contributing in this manner makes the information more robust, benefiting the entire health sector.

” back_bgc_color=”#ffffff” btn_show_hide=”off” _builder_version=”4.6.6″ _module_preset=”default” front_flip_text_text_align=”center” front_flip_text_text_color=”#000000″ front_flip_text_font_size=”26px” front_flip_text_letter_spacing=”3px” front_body_text_align=”center” back_body_text_align=”center” back_body_text_color=”#000000″ back_body_font_size=”20px” background_enable_image=”off” background_size=”initial” module_alignment=”center” max_height=”287px” custom_margin=”||||false|false” custom_padding=”||||false|false” hover_enabled=”0″ border_width_all=”0px” border_width_all_front_borders=”0px” border_width_all_back_borders=”0px” box_shadow_style_front_box_shadow=”preset1″ box_shadow_style_back_box_shadow=”preset1″ locked=”off” sticky_enabled=”0″][/dnxte_3d_flipbox]

Security Solutions

In addition to our TOC, H-ISAC offers a host of solutions to help you to better safeguard your environment.  We have negotiated with vendors in the areas of digital monitoring, identity, third-party risk, and education so you don’t have to.  Click here to see a complete list of vendor provided solutions.

This site is registered on Toolset.com as a development site.