CSA Research Publications
Whitepapers, Reports and Other Resources
Browse Publications
![]() | Medical Devices in A Zero Trust Architecture Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organi... Request to download |
![]() | Telesurgery Tabletop Guide Book The purpose of this guidebook is to assist healthcare providers in planning and facilitating a discussion and evaluation of the procedural response action... Request to download |
![]() | Healthcare Interoperability When Health Information Technology systems seamlessly exchange data with each other, it is referred to as interoperability. Interoperability occurs when i... Request to download |
![]() | Third-Party Vendor Risk Management in Healthcare The increased use of third-party vendors for applications and data processing services is a business model that is likely to continue, especially as HDOs ... Request to download |
![]() | Healthcare Supply Chain Cybersecurity Risk Management It is essential for Healthcare Delivery Organizations to conduct proper risk management practices and risk assessments of suppliers and third-party servic... Request to download |
![]() | Health Information Management Working Group Charter The Health Information Management Working Group aims to directly influence how health information service providers deliver secure cloud solutions (servic... Request to download |
![]() | Artificial Intelligence in Healthcare Artificial intelligence (AI) now has the potential to be integrated into all aspects of healthcare, from management to delivery and diagnosis. These advan... Request to download |
![]() | Information Technology Governance, Risk and Compliance in Healthcare Information Technology (IT) Governance, Risk, and Compliance (GRC), are three words that have a significant impact on organizations. While each term seems... Request to download |
![]() | Ransomware in the Healthcare Cloud Ransomware is the fastest-growing malware threat today. Over the last few years, it has risen to epidemic proportions, quickly becoming a significant reve... Request to download |
![]() | Protecting the Privacy of Healthcare Data in the Cloud The Health Delivery Organization (HDO) needs to understand the relationship between privacy and security, particularly the differences. This understanding... Request to download |
![]() | The Use of Blockchain in Healthcare Healthcare is a large and heavily regulated industry. US and EU privacy and security laws require healthcare organizations to protect personal information... Request to download |
![]() | Healthcare Cybersecurity Playbook - An Evolving Landscape One aspect of healthcare that has increased significantly during the COVID-19 pandemic is the use of telehealth. Telehealth is used for everything from re... Request to download |
![]() | Telehealth Risk Management The recent COVID-19 pandemic has increased the demand for data and accelerated the use of telehealth. The Health Resources and Services Administration (HRSA)... Request to download |
![]() | Healthcare Big Data in the Cloud We are living in the information age. There are large and complex data sets generated daily. Data is generated by social media, emails, as well as numerous d... Request to download |
![]() | Telehealth Data in the Cloud In the wake of COVID-19 Health Delivery Organizations (HDOs) are rapidly increasing their utilization of telehealth capabilities like Remote Patient Monitori... Request to download |
![]() | Managing the Risk for Medical Devices Connected to the Cloud With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in ... Request to download |
![]() | HIM Working Group Charter The use of new technologies, such as cloud services and the Internet of Things (IoT), will disrupt legacy systems and the chain of data processing in the sup... Request to download |
![]() | OWASP Secure Medical Devices Deployment Standard With the explosion of botnets and other malware that now target IoT devices (of which medical devices can be considered a subtype) the need for security-min... Request to download |