Designing a HIPAA-Compliant Security Operations Center Designing a HIPAA-Compliant Security Operations Center

Designing a HIPAA-Compliant Security Operations Center

A Guide to Detecting and Responding to Healthcare Breaches and Events

    • $39.99
    • $39.99

Publisher Description

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare’s current threats.  

Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats.

Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that’s required is a plan—which author Eric Thompson provides in this book.

You will:
Know what threat intelligence is and how you can make it useful
Understand how effective vulnerability management extends beyond the risk scores provided by vendors
Develop continuous monitoring on a budget
Ensure that incident response is appropriate
Help healthcare organizations comply with HIPAA

GENRE
Computers & Internet
RELEASED
2020
February 25
LANGUAGE
EN
English
LENGTH
249
Pages
PUBLISHER
Apress
SELLER
Springer Nature B.V.
SIZE
17.8
MB

More Books Like This

Managing Cyber Threats Managing Cyber Threats
2006
Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Modern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization
2020
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002) CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002)
2020
Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition) Practical Cyber Threat Intelligence: Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices (English Edition)
2022
Security Information and Event Management (SIEM) Implementation Security Information and Event Management (SIEM) Implementation
2010
Intelligent Security Systems Intelligent Security Systems
2021

More Books by Eric C. Thompson

Cybersecurity Incident Response Cybersecurity Incident Response
2018
Building a HIPAA-Compliant Cybersecurity Program Building a HIPAA-Compliant Cybersecurity Program
2017
Cleavage, Connection and Conflict in Rural, Urban and Contemporary Asia Cleavage, Connection and Conflict in Rural, Urban and Contemporary Asia
2012