adhics
 

Empower your team with our ADHICS compliance training course, reinforcing healthcare data protection and ensuring expert handling of Protected Healthcare Information to prevent breaches. 

Audience: All/ End-Users, Learning time: 20-25minutes

Customize this course

Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.

Feature your logo

Choose case-studies

Choose topics

Add information classification

Add incident reporting information

Translate the course (optional)

Learn more

Course data

The Protecting Healthcare Information, Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS) course provides an understanding of ADHICS regulations. The real-world case studies help employees understand the importance of safeguarding Protected Healthcare Information (PHI) and also cover the best practices for protecting PHI and reporting security breaches. 

The course has an assessment at the end.

Section 1: Healthcare Threat Landscape 
This section presents actual case studies involving breaches of Protected Healthcare Information in real-world scenarios. Further, these case studies help employees understand the significance of protecting Protected Healthcare Information (PHI) and the potential consequences of not adhering to the ADHICS regulations. 
 

Section 1: Healthcare Threat Landscape 

Section 2: Introduction to Protected Healthcare Information 

This section provides employees with an introduction to Protected Healthcare Information and describes the importance of protecting PHI. 

  • What is PHI? 
  • Examples of PHI 
  • Why is protecting PHI important? 
Section 2: Introduction to Protected Healthcare Information 

Section 3: Cyberattack against PHI 

In this section, employees gain insights into common and emerging threats against Protected Healthcare Information (PHI), including their classifications. This overview equips them to be vigilant and cautious against potential threats.  

  • Common threats against PHI 
    • Insider threat 
    • Malware and Ransomware Attack 
    • Third-Party Risk 
    • Social Engineering Attack 
  • Emerging threats against PHI 
    • Internet of Things (IoT) Vulnerabilities 
    • Cloud Security Challenges 
    • AI and ML Risk 
    • Supply Chain Compromise 
Section 3: Cyberattack against PHI 

Section 4: Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS) 

This section provides employees with a comprehensive understanding of ADHICS, including its scope and significance. It describes the roles, responsibilities, and consequences for failing to comply, emphasizing the importance of following the regulation. 

  • What is ADHICS? 
  • The scope of ADHICS 
  • Why is ADHICS important? 
  • Roles and responsibilities under ADHICS 
  • Consequences of violating ADHICS 
Section 4: Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS) 

Section 5: Protecting PHI 

This section comprises six scenario-based challenges based on the best practices in protecting PHI. 

  • Safeguarding PHI while Working Remotely 
  • Securing Access Credentials to Protect PHI 
  • Safe Internet Browsing Practices to Protect PHI 
  • Securing PHI while Using Emails and Collaboration Platforms 
  • Protecting PHI while Using AI Apps 
  • Secure Storage and Transfer of PHI 
Section 5: Protecting PHI 

Section 6: Reporting Security Breaches 

This section includes examples of security breaches of PHI and guides employees on effectively reporting such incidents. 

  • What is a security breach? 
  • Examples of Security Breaches 
  • How to Report a Security Breach? 
Section 6: Reporting Security Breaches 

Section 7: Summary and Assessment 

This section wraps up the key points covered in the course, followed by an assessment. 

  • Summary
  • Assessment  
Section 7: Summary and Assessment 

Have more questions?

Get your questions answered by our team of security awareness experts.

Pick a convenient slot from our calendar.

Image representing schedule a demo