Haben Sie Fragen? Einfach anrufen, wir helfen gerne: Tel. 089/210233-0
oder besuchen Sie unser Ladengeschäft in der Pacellistraße 5 (Maxburg) 80333 München
+++ Versandkostenfreie Lieferung innerhalb Deutschlands
Haben Sie Fragen? Tel. 089/210233-0

Designing a HIPAA-Compliant Security Operations Center

58,84 €*

Sofort verfügbar, Lieferzeit: 1-3 Tage

Produktnummer: 18a5641ca5572f4fa98f82dd19193a038f
Autor: Thompson, Eric C.
Themengebiete: Cybersecurity Data Breach HIPAA Healthcare Data breach Intrusion Detection Network Traffic Analysis OCR Investigation/Audit Risk Assessment Threat Intelligence Threat and Vulnerability Management
Veröffentlichungsdatum: 26.02.2020
EAN: 9781484256077
Sprache: Englisch
Seitenzahl: 231
Produktart: Kartoniert / Broschiert
Verlag: APRESS
Untertitel: A Guide to Detecting and Responding to Healthcare Breaches and Events
Produktinformationen "Designing a HIPAA-Compliant Security Operations Center"
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare’s current threats.  Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats.Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that’s required is a plan—which author Eric Thompson provides in this book. What You Will LearnKnow what threat intelligence is and how you can make it usefulUnderstand how effective vulnerability management extends beyond the risk scores provided by vendorsDevelop continuous monitoring on a budgetEnsure that incident response is appropriateHelp healthcare organizations comply with HIPAAWho This Book Is ForCybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

Sie möchten lieber vor Ort einkaufen?

Sie haben Fragen zu diesem oder anderen Produkten oder möchten einfach gerne analog im Laden stöbern? Wir sind gerne für Sie da und beraten Sie auch telefonisch.

Juristische Fachbuchhandlung
Georg Blendl

Parcellistraße 5 (Maxburg)
8033 München

Montag - Freitag: 8:15 -18 Uhr
Samstags geschlossen