adhics compliance services uae

What is ADHICS

ADHICS is the abbreviation for Abu Dhabi Healthcare Information and Cyber Security Standard. The Abu Dhabi Department of Health (DoH) is the sole regulator of the healthcare division in Abu Dhabi. The DoH published the ADHICS Standards on 3 February 2019 to protect the privacy and security of health information. ADHICS Standard intends to improve healthcare cybersecurity in the UAE to the next level by meeting international healthcare cyber security and privacy practices. ADHICS also aids the healthcare sector meet the required compliance with UAE Information Assurance Standards.

ValueMentor is a leading Risk & Compliance service provider in UAE, helping companies achieve ADHICS Compliance by performing ADHICS Audit. We have a proven record of helping companies in the healthcare sector become compliant with ADHICS standards. Our experts handhold you in achieving ADHICS Compliance in UAE. Achieve healthcare compliance by adhering to ADHICS standards and policy.

Our ADHICS Consultancy Services

ADHICS GAP Assessment

ValueMentor Analysts perform Gap Assessments as a part of the ADHICS Audit and evaluate the current state using the ADHICS standard.

Cyber Risk Assessment

All risks related to healthcare data security and privacy are identified and assessed by our Team using the ADHICS framework.

Risk Treatment Plan

Develop a Risk Treatment plan to remediate the gaps and risks to acceptable levels.

ADHICS Policies & Procedures

Sets the privacy and security policies & procedures for you to achieve ADHICS Compliance.

Security Testing

Perform continuous security assessments and penetration testing helping you maintain compliance with the ADHICS Standard.

Security Awareness

Provides Security Awareness Training for all employees so that your weakest link in security is not people.

Technology Implementations

Deliver advisory on remediation of technology gaps and implementation of technical controls.

ADHICS Implementation Reviews

Conduct periodical ADHICS Implementation progress reviews to evaluate the compliance levels and remediate any deviations.

ADHICS Internal Audits

Internal Audits help you identify deviations from the defined ISMS policies and procedures and make course corrections.

Would you like to speak to a ADHICS Consultant?

Phase 1 – Assessment

The first phase of an ADHICS Audit & Compliance project is to assess the current state of compliance.

Identify Critical Assets

  • Project Initiation
  • Understand the organization
  • Identify critical business services
  • Identify information infrastructure

ADHICS Controls Identification

  • Identify cyber security controls that can mitigate the risks in line with ADHICS Compliance requirements.
  • Define ADHICS Risk Treatment Plan

Gap & Risk Assessment

  • Inspection of current risk state using ADHICS Standard
  • Discovering threats & vulnerabilities by exploiting the gaps

Phase 2 – Control Development

This second phase of the ADHICS Audit is to develop the controls to treat the risks identified. ISMS Risk Treatment Plan provides the directions for this phase of the implementation.

NESA Policies & Procedures

Policies and procedures provide the base for executing cyber security best practices within the organization.

Security Awareness

Humans are often considered the most vulnerable connection in cyber security. Security Awareness & Training provides them with adequate learning on cyber security.

Technology Controls

  • Security Architecture
  • Technology Gaps
  • Configuration Advisory

Management Controls

  • Operational Controls
  • Physical Security
  • Managerial Controls

Phase 3 – Security Services

This phase of the Engagement executes cyber security best practices for the organization. Some of the key services performed by the ValueMentor Team are:

Periodic Security Testing

  • Vulnerability Assessments
  • Penetration Testing
  • Security Configuration Reviews

SIEM & Incident Response

  • SIEM Solution Deployment
  • 24×7 Security Monitoring
  • Security Device Management

Managed Network Security

  • Next Gen Firewalls, UTMs
  • URL Filter, Web Security
  • Wi-Fi Security
  • VPN and Remote Access Security

Data & Endpoint Security

  • DLP Solutions
  • Patch Management
  • Endpoint Security
  • Mobile Device Management

Phase 4 – Compliance Review

A periodic review of the ISMS Compliance status is critical for the success of the Information Security Management System.

ISMS Performance Review

Assess the performance of the ISMS against the defined metrics. It is a significant measure towards the continual improvement of the ISMS.

ISMS Internal Audits

Perform periodic ISMS Audits to assess compliance with the defined policies and procedures

Mock Compliance Audit

Perform Mock Compliance Audits that help you identify the weak areas of ISMS implementation.

External Audit Support

Assist the customer during the Compliance Audit to meet the required ISMS requirements.

Would you like to speak to a ADHICS Consultant?