Remote Identity Proofing – Whitepaper for CISOs
Covers remote identity proofing solutions for health care CISOs and challenges around the technologies.
Remote Identity Proofing – A Health-ISAC Guide for CISOs
Health-ISAC’s newest identity white paper is intended to help CISOs understand remote identity proofing.
This paper can be used to educate health care CISOs on remote identity proofing solutions and challenges around the technologies. There is no one size fits all approach to remote identity proofing. Layering different technologies is recommended. The paper includes several use cases.
The sixth in Health-ISAC’s identity white paper series, intended to help healthcare organizations of all sizes and maturity levels understand the importance of an identity-centric approach to cybersecurity and the ways it can better address the current threat landscape.
H ISAC Remote Identity Proofing White Paper
Size : 2.9 MB Format : PDF
Other white papers in this series
- Identity for the CISO Not Yet Paying Attention to Identity https://h-isac.org/h-isac-white-paper-identity-for-the-ciso-not-yet-paying-attention-to-identity/
- Health-ISAC Framework for CISOs to Manage Identity https://h-isac.org/an-h-isac-framework-for-cisos-to-manage-identity-2/
- Authentication https://h-isac.org/authentication-a-health-isac-guide-for-cisos/
- Identity, Operability, Patient Access and the 21st Century Cures Act https://h-isac.org/interoperability-for-healthcare-cisos/
- Identity and Zero Trust https://h-isac.org/wp-content/uploads/H-ISAC_White-Paper-ZeroTrust_FINAL_82522.pdf
- Related Resources & News
- Health-ISAC Hacking Healthcare 10-15-2024
- Health-ISAC Welcomes Booz Allen Hamilton to the Ambassador Program
- Health-ISAC Hacking Healthcare 10-9-2024
- Monthly Newsletter – October 2024
- Health ISAC leads effort to transform SBOM information sharing under CISA-facilitated community work
- CyberEdBoard Insights: Phil Englert and Errol Weiss
- Health-ISAC Hacking Healthcare 9-10-2024
- Strengthening Healthcare Cybersecurity: Lessons from Recent Supplier Attacks
- Specialize in Securing Critical Infrastructure
- How AI is transforming cybersecurity, on defense and offense