Health Information Management
The main objective of this working group is to provide direct influence on how health information service providers deliver secure cloud solutions (services, transport, applications and storage) to their clients.Sign-Up View Current Projects
Working Group Leadership
After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...
Dr. Jim Angle
Jim has dedicated hundreds of hours to CSA and was instrumental in reviving CSA’s Health Information Management working group. In doing so, he drafted the group’s first charter and went on to become its co-chair. In this role, he authored three papers — Managing the Risk for Medical Devices Connected to the Cloud, Telehealth in the ...
|Publications in Review||Open Until|
|Top Threats to Cloud Computing Pandemic Eleven||May 21, 2022|
|Third-Party Vendor Risk Management||Jun 13, 2022|
Who can join?
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.
What is the time commitment?
The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.
Attend our next meeting. You can just listen in to decide if this group is a good for you or you can choose to actively participate. During these calls we discuss current projects, and well as share ideas for new projects. This is a good way to meet the other members of the group. You can view all research meetings here.
Open Peer Reviews
Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.
Top Threats to Cloud Computing Pandemic Eleven
Open Until: 05/21/2022
The Top Threats reports have traditionally aimed to raise awareness of threats, risks, and vulnerabilities in the ...
Third-Party Vendor Risk Management
Open Until: 06/13/2022
The increased use of third-party vendors for applications and data processing services is a business model that is likely t...