ADHICS Compliance

ValueMentor is a leading Risk & Compliance service provider in UAE
helping companies achieve ADHICS Compliance.

Let us connect
Home » UAE » ADHICS Compliance in UAE

The Abu Dhabi Department of Health (“DoH”), being the regulator of healthcare sector in Abu Dhabi, had released the ADHICS Standards on 3 February 2019 to improve the privacy and security of health information. ADHICS standard intends to enhance the healthcare cyber security in UAE to the next levels by meeting international healthcare cyber security and privacy practices. ADHICS also helps healthcare sector meet the compliance with UAE Information assurance standards.

Our team has helped multiple hospitals and other healthcare sector entities meet cyber security requirements and thereby comply with the ADHICS standard.

Our ADHICS Consultancy Services

ADHICS GAP Assessment

ValueMentor analysts performs the assessment of your current state using the ADHICS standard

Cyber Risk Assessment

Identification of risks to healthcare data security and privacy are assessed using the ADHICS framework

Risk Treatment Plan

Develop Risk Treatment Plans to remediate the gaps and risks identified to acceptable levels.

ADHICS Policies & Procedures

Our security analysts will develop the privacy and security policies and procedures for you to achieve ADHICS Compliance

Security Testing

Ongoing security assessments and penetration testing are required for continuous compliance towards ADHICS

Security Awareness

Provide Security Awareness Training for employees so that your weakest link of security is not people.

Technology Implementations

Advisory on remediation of technology gaps and implementation of technical controls

ADHICS Implementation Reviews

Perform periodic ADHICS Implementation progress reviews to assess the compliance levels and remediate any deviations 

ADHICS Internal Audits

Internal audits helps you identify deviations from the defined ISMS policies and procedures and make course corrections

Start your ADHICS Compliance project

Assessment-adhics

Phase 1 – Assessment

The first phase of a ADHICS Compliance project is to assess the current state of compliance.

Identify Critical Assets

  • Project Initiation
  • Understand the organization
  • Identify critical business services
  • Identify information infrastructure

ADHICS Controls Identification

  • Identify cyber security controls that can mitigate the risks and thereby result in ADHICS Compliance.
  • Define ADHICS Risk treatment plan

Gap & Risk Assessment

  • Assessment of current state and mapping it to ADHICS Standard
  • Identification of threats and vulnerabilities exploiting the gaps resulting in risk.

Phase 2 – Control Development

This second phase of the project is to develop the controls to treat the risks identified. ISMS Risk Treatment Plan provides the directions for this phase of the implementation.

NESA Policies & Procedures

Policies and procedures provides the basis for implementing cyber security within the organization.

Technology Controls

  • Security Architecture
  • Technology gaps
  • Configuration advisory

Security Awareness

Humans are often considered as the weakest link in cyber security. Security awareness improves the cyber security posture.

Management Controls

  • Operational controls
  • Physical Security
  • Managerial Controls
Control-Development-adhics
Security-Services-adhics

Phase 3 – Security Services

This phase of the engagement suppliments existing security practices in the organization. Some of the key service performed by ValueMentor team are:

Periodic Security Testing

  • Vulnerability Assessments
  • Penetration Testing
  • Security configuration reviews

Managed Network Security

  • Next Gen Firewalls, UTMs
  • URL Filter, Web Security
  • Wi-Fi Security
  • VPN and remote access security

SIEM & Incident Response

  • SIEM Solution deployment
  • 24×7 Security Monitoring
  • Security Device Management

Data & Endpoint Security

  • DLP Solutions
  • Patch Management
  • End point security
  • Mobile Device Management

Phase 4 – Compliance Review

Periodic review of the ISMS Compliance status is critical for the success of the Information Security Management System.

ISMS Performance Review

Assess the performance of the ISMS against the defined metrics. This is a key measure towards continual improvement of the ISMS

Mock Compliance Audit

Perform mock compliance audits help you identify the weak areas of ISMS implementation.

ISMS Internal Audits

Perform periodic ISMS audits to assess the compliance to the defined policies and procedures

External Audit Support

Assist the customer during the compliance audit to meet the required ISMS requirements.

Compliance-Review-adhics

Would you like to speak to a ADHICS Consultant?

Related Insights

What is NESA Compliance

What is NESA Compliance

NESA Compliance is mandated by Signals Intellegence Agency (SIA), earlier known as NESA, on all critical information infrastructure operators in UAE...

read more