語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Designing a HIPAA-Compliant Security...
~
Thompson, Eric C.
Designing a HIPAA-Compliant Security Operations Center = A Guide to Detecting and Responding to Healthcare Breaches and Events /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Designing a HIPAA-Compliant Security Operations Center/ by Eric C. Thompson.
其他題名:
A Guide to Detecting and Responding to Healthcare Breaches and Events /
作者:
Thompson, Eric C.
面頁冊數:
XVIII, 231 p. 136 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-1-4842-5608-4
ISBN:
9781484256084
Designing a HIPAA-Compliant Security Operations Center = A Guide to Detecting and Responding to Healthcare Breaches and Events /
Thompson, Eric C.
Designing a HIPAA-Compliant Security Operations Center
A Guide to Detecting and Responding to Healthcare Breaches and Events /[electronic resource] :by Eric C. Thompson. - 1st ed. 2020. - XVIII, 231 p. 136 illus.online resource.
Chapter 1: Security Operations: The Why and the Roadmap -- Chapter 2: HIPAA Security Rule and Cybersecurity Operations -- Chapter 3: Threat Intelligence -- Chapter 4: Vulnerability Management -- Chapter 5: Continuous Monitoring -- Chapter 6: Incident Response -- Chapter 7: Threat Hunting -- Chapter 8: Where to Go from Here.-.
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare’s current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that’s required is a plan—which author Eric Thompson provides in this book. You will: Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA.
ISBN: 9781484256084
Standard No.: 10.1007/978-1-4842-5608-4doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Designing a HIPAA-Compliant Security Operations Center = A Guide to Detecting and Responding to Healthcare Breaches and Events /
LDR
:03425nam a22003855i 4500
001
1023400
003
DE-He213
005
20200703082658.0
007
cr nn 008mamaa
008
210318s2020 xxu| s |||| 0|eng d
020
$a
9781484256084
$9
978-1-4842-5608-4
024
7
$a
10.1007/978-1-4842-5608-4
$2
doi
035
$a
978-1-4842-5608-4
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Thompson, Eric C.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1073733
245
1 0
$a
Designing a HIPAA-Compliant Security Operations Center
$h
[electronic resource] :
$b
A Guide to Detecting and Responding to Healthcare Breaches and Events /
$c
by Eric C. Thompson.
250
$a
1st ed. 2020.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
XVIII, 231 p. 136 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: Security Operations: The Why and the Roadmap -- Chapter 2: HIPAA Security Rule and Cybersecurity Operations -- Chapter 3: Threat Intelligence -- Chapter 4: Vulnerability Management -- Chapter 5: Continuous Monitoring -- Chapter 6: Incident Response -- Chapter 7: Threat Hunting -- Chapter 8: Where to Go from Here.-.
520
$a
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare’s current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that’s required is a plan—which author Eric Thompson provides in this book. You will: Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA.
650
0
$a
Data protection.
$3
557764
650
1 4
$a
Security.
$3
1114130
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484256077
776
0 8
$i
Printed edition:
$z
9781484256091
856
4 0
$u
https://doi.org/10.1007/978-1-4842-5608-4
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入