Books > Medicine > General issues > Health systems & services > Hospital administration & management
|
Buy Now
Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Loot Price: R1,077
Discovery Miles 10 770
You Save: R220
(17%)
|
|
Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Expected to ship within 10 - 15 working days
|
Develop a comprehensive plan for building a HIPAA-compliant
security operations center, designed to detect and respond to an
increasing number of healthcare data breaches and events. Using
risk analysis, assessment, and management data combined with
knowledge of cybersecurity program maturity, this book gives you
the tools you need to operationalize threat intelligence,
vulnerability management, security monitoring, and incident
response processes to effectively meet the challenges presented by
healthcare's current threats. Healthcare entities are bombarded
with data. Threat intelligence feeds, news updates, and messages
come rapidly and in many forms such as email, podcasts, and more.
New vulnerabilities are found every day in applications, operating
systems, and databases while older vulnerabilities remain
exploitable. Add in the number of dashboards, alerts, and data
points each information security tool provides and security teams
find themselves swimming in oceans of data and unsure where to
focus their energy. There is an urgent need to have a cohesive plan
in place to cut through the noise and face these threats.
Cybersecurity operations do not require expensive tools or large
capital investments. There are ways to capture the necessary data.
Teams protecting data and supporting HIPAA compliance can do this.
All that's required is a plan-which author Eric Thompson provides
in this book. What You Will Learn Know what threat intelligence is
and how you can make it useful Understand how effective
vulnerability management extends beyond the risk scores provided by
vendors Develop continuous monitoring on a budget Ensure that
incident response is appropriate Help healthcare organizations
comply with HIPAA Who This Book Is For Cybersecurity, privacy, and
compliance professionals working for organizations responsible for
creating, maintaining, storing, and protecting patient information.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.