Designing a HIPAA-Compliant Security Operations Center
A Guide to Detecting and Responding to Healthcare Breaches and Events
Price | $29.90 - $36.07
|
Rating | |
Author | Eric Thompson |
Publisher | Apress |
Published | 2020 |
Pages | 231 |
Language | English |
Format | Paper book / ebook (PDF) |
ISBN-10 | 1484256077 |
ISBN-13 | 9781484256077 |
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats.
Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats.
Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan - which author Eric Thompson provides in this book.
Know what threat intelligence is and how you can make it useful; Understand how effective vulnerability management extends beyond the risk scores provided by vendors; Develop continuous monitoring on a budget
Ensure that incident response is appropriate; Help healthcare organizations comply with HIPAA.
- Eric Thompson
Similar Books
Wireless Security Architecture
by Jennifer Minella, Stephen Orr
Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise offers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint to a resilient and compliant architecture that responds to regulatory requirements, reduces organizational risk, and conforms t...
Price: $37.74 | Publisher: Wiley | Release: 2022
Microsoft Azure Security Center, 2nd Edition
by Yuri Diogenes, Tom Shinder
Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key ...
Price: $39.99 | Publisher: Microsoft Press | Release: 2019
The Definitive Guide to Security in Jakarta EE
by Arjan Tijms, Teo Bais, Werner Keil
Refer to this definitive and authoritative book to understand the Jakarta EE Security Spec, with Jakarta Authentication & Authorization as its underlying official foundation. Jakarta EE Security implementations are discussed, such as Soteria and Open Liberty, along with the build-in modules and Jakarta EE Security third-party modules,...
Price: $52.25 | Publisher: Apress | Release: 2022
Microsoft Azure Security Center
by Yuri Diogenes, Tom Shinder
This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center's full spectrum of features and capabilities to address protection, detection, and response in key ...
Price: $22.79 | Publisher: Microsoft Press | Release: 2018
Building a Comprehensive IT Security Program
by Jeremy Wittkop
This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the cu...
Price: $39.99 | Publisher: Apress | Release: 2016
Mastering Azure API Management
by Sven Malvik
Unsure of how or where to get started with Azure API Management, Microsoft's managed service for securing, maintaining, and monitoring APIs? Then this guide is for you. Azure API Management integrates services like Azure Kubernetes Services (AKS), Function Apps, Logic Apps, and many others with the cloud and provides users with a sin...
Price: $36.99 | Publisher: Apress | Release: 2022
by Jon DiMaggio
Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyz...
Price: $35.90 | Publisher: No Starch Press | Release: 2022
Microsoft System Center Reporting Cookbook
by Samuel Erskine
This hands-on cookbook will guide you through how to create ready-to-use reports for all the components of System Center. The book starts by showing you how to plan business valued reports, while also discussing the building blocks of your reporting framework. Moving on from the basics, the later recipes demonstrate how you can create Sys...
Price: $49.99 | Publisher: Packt Publishing | Release: 2015