

What is ADHICS
ADHICS is the abbreviation for Abu Dhabi Healthcare Information and Cyber Security Standard. The Abu Dhabi Department of Health (DoH) is the sole regulator of the healthcare division in Abu Dhabi. The DoH published the ADHICS Standards on 3 February 2019 to protect the privacy and security of health information. ADHICS Standard intends to improve healthcare cybersecurity in the UAE to the next level by meeting international healthcare cyber security and privacy practices. ADHICS also aids the healthcare sector meet the required compliance with UAE Information Assurance Standards.
ValueMentor is a leading Risk & Compliance service provider in UAE, helping companies achieve ADHICS Compliance by performing ADHICS Audit. We have a proven record of helping companies in the healthcare sector become compliant with ADHICS standards. Our experts handhold you in achieving ADHICS Compliance in UAE. Achieve healthcare compliance by adhering to ADHICS standards and policy.
Our ADHICS Consultancy Services
Would you like to speak to a ADHICS Consultant?
Phase 1 – Assessment
The first phase of an ADHICS Audit & Compliance project is to assess the current state of compliance.
Identify Critical Assets
- Project Initiation
- Understand the organization
- Identify critical business services
- Identify information infrastructure
ADHICS Controls Identification
- Identify cyber security controls that can mitigate the risks in line with ADHICS Compliance requirements.
- Define ADHICS Risk Treatment Plan
Gap & Risk Assessment
- Inspection of current risk state using ADHICS Standard
- Discovering threats & vulnerabilities by exploiting the gaps
Phase 2 – Control Development
This second phase of the ADHICS Audit is to develop the controls to treat the risks identified. ISMS Risk Treatment Plan provides the directions for this phase of the implementation.
NESA Policies & Procedures
Policies and procedures provide the base for executing cyber security best practices within the organization.
Security Awareness
Humans are often considered the most vulnerable connection in cyber security. Security Awareness & Training provides them with adequate learning on cyber security.
Technology Controls
- Security Architecture
- Technology Gaps
- Configuration Advisory
Management Controls
- Operational Controls
- Physical Security
- Managerial Controls
Phase 3 – Security Services
This phase of the Engagement executes cyber security best practices for the organization. Some of the key services performed by the ValueMentor Team are:
Periodic Security Testing
- Vulnerability Assessments
- Penetration Testing
- Security Configuration Reviews
SIEM & Incident Response
- SIEM Solution Deployment
- 24×7 Security Monitoring
- Security Device Management
Managed Network Security
- Next Gen Firewalls, UTMs
- URL Filter, Web Security
- Wi-Fi Security
- VPN and Remote Access Security
Data & Endpoint Security
- DLP Solutions
- Patch Management
- Endpoint Security
- Mobile Device Management
Phase 4 – Compliance Review
A periodic review of the ISMS Compliance status is critical for the success of the Information Security Management System.
ISMS Performance Review
Assess the performance of the ISMS against the defined metrics. It is a significant measure towards the continual improvement of the ISMS.
ISMS Internal Audits
Perform periodic ISMS Audits to assess compliance with the defined policies and procedures
Mock Compliance Audit
Perform Mock Compliance Audits that help you identify the weak areas of ISMS implementation.
External Audit Support
Assist the customer during the Compliance Audit to meet the required ISMS requirements.