ADHICS Security Awareness

Abu Dhabi Healthcare Information and Cyber Security Standard

Elevate your team’s capabilities with our ADHICS compliance training course, strengthening healthcare data security and enabling proficient management of Protected Healthcare Information to avert breaches proactively.

Learning Time
Employees and Contractors
20-25 mintues
Create a free account

About this course

The Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS) course provides an understanding of ADHICS regulations. The real-world case studies help employees understand the importance of safeguarding Protected Healthcare Information (PHI) and also cover the best practices for protecting PHI and reporting security breaches. 

Section 1: Healthcare Threat Landscape 

This section presents actual case studies involving breaches of Protected Healthcare Information in real-world scenarios. Further, these case studies help employees understand the significance of Protected Healthcare Information (PHI) and the potential consequences of not adhering to the ADHICS regulations. 


Section 2: Introduction to Protected Healthcare Information

This section provides employees with an introduction to Protected Healthcare Information and describes the importance of protecting PHI. 

What is PHI? 

Examples of PHI 

Why is protecting PHI important? 


Section 3: Cyberattack against PHI 

In this section, employees gain insights into common and emerging threats against Protected Healthcare Information (PHI), including their classifications. This overview equips them to be vigilant and cautious against potential threats.  

Common threats against PHI

Insider threat 

Malware and Ransomware Attack 

Third-Party Risk 

Social Engineering Attack 

Emerging threats against PHI

Internet of Things (IoT) Vulnerabilities 

Cloud Security Challenges 

AI and ML Risk 

Supply Chain Compromise 


Section 4: Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS) 

This section provides employees with a comprehensive understanding of ADHICS, including its scope and significance. It describes the roles, responsibilities, and consequences for failing to comply, emphasizing the importance of following the regulation. 

What is ADHICS? 

The scope of ADHICS 

Why is ADHICS important? 

Roles and responsibilities under ADHICS 

Consequences of violating ADHICS 


Section 5: Protecting PHI 

This section comprises six scenario-based challenges based on the best practices in protecting PHI. 

Safeguarding PHI while working remotely 

Securing access credentials to protect PHI 

Safe internet browsing practices to protect PHI 

Securing PHI while using emails and collaboration platforms 

Protecting PHI while using AI apps 

Secure storage and transfer of PHI 


Section 6: Reporting Security Breaches 

This section includes examples of security breaches of PHI and guides employees on effectively reporting such incidents. 

What is a security breach? 

Examples of security breaches 

How to report a security breach? 


Section 7: Summary and Assessment

This section wraps up the key points covered in the course, followed by an assessment. 



Customize this Course

Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.

Book a Demo

Feature your logo

Choose case-studies

Choose topics

Add information classification

Add incident reporting information

Translate the course (optional)

You may also like


UAE (United Arab Emirates)

Information Security and UAE Personal Data Protection Law

Cultivate employee awareness in safeguarding the personal data of customers and employees.

Employees and Contractors

35-40 minutes



Information Security and Singapore Personal Data Protection Act

Promote employee awareness to safeguard customer and employee personal data in adherence to Singapore PDPA.

Employees and Contractors

35-40 minutes



Information Security and Malaysia Personal Data Protection Act

Boost awareness to safeguard personal data under InfoSec and Malaysia PDPA.

Employees and Contractors

35-40 minutes