LEADER 03883nam 22005535 450 001 9910380726103321 005 20250609110053.0 010 $a9781484256084 010 $a1484256085 024 7 $a10.1007/978-1-4842-5608-4 035 $a(CKB)4100000010480454 035 $a(DE-He213)978-1-4842-5608-4 035 $a(MiAaPQ)EBC6126781 035 $a(CaSebORM)9781484256084 035 $a(PPN)242982107 035 $a(OCoLC)1181958594 035 $a(OCoLC)on1181958594 035 $a(Perlego)4900990 035 $a(MiAaPQ)EBC6126473 035 $a(EXLCZ)994100000010480454 100 $a20200225d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDesigning a HIPAA-Compliant Security Operations Center $eA Guide to Detecting and Responding to Healthcare Breaches and Events /$fby Eric C. Thompson 205 $a1st ed. 2020. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2020. 215 $a1 online resource (XVIII, 231 p. 136 illus.) 311 08$a9781484256077 311 08$a1484256077 320 $aIncludes bibliographical references. 327 $aChapter 1: Security Operations: The Why and the Roadmap -- Chapter 2: HIPAA Security Rule and Cybersecurity Operations -- Chapter 3: Threat Intelligence -- Chapter 4: Vulnerability Management -- Chapter 5: Continuous Monitoring -- Chapter 6: Incident Response -- Chapter 7: Threat Hunting -- Chapter 8: Where to Go from Here.-. 330 $aDevelop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare?s current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that?s required is a plan?which author Eric Thompson provides in this book. You will: Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA. 517 3 $aGuide to detecting and responding to healthcare breaches and events 606 $aData protection 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 615 0$aData protection. 615 14$aSecurity. 676 $a005.8 700 $aThompson$b Eric C$4aut$4http://id.loc.gov/vocabulary/relators/aut$0917128 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910380726103321 996 $aDesigning a HIPAA-Compliant Security Operations Center$92212336 997 $aUNINA