Designing a HIPAA-Compliant Security Operations Center

CHF 74.75
Auf Lager
SKU
5CS7UUR9KCS
Stock 1 Verfügbar
Geliefert zwischen Fr., 27.02.2026 und Mo., 02.03.2026

Details

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats.

Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats.

Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a planwhich author Eric Thompson provides in this book.

What You Will Learn

  • Know what threat intelligence is and how you can make it useful

  • Understand how effective vulnerability management extends beyond the risk scores provided by vendors

  • Develop continuous monitoring on a budget

  • Ensure that incident response is appropriate

  • Help healthcare organizations comply with HIPAA

    Who This Book Is For

    Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

    Identifies technical and non-technical vulnerabilities, including assessing severity and providing remediation challenges and solutions Illustrates the value of open source tools (OpenVas, Snort, Zeek, Moloch, the Elastic Stack, and others) for entities with limited budgets Covers monitoring from perimeter to endpoint, with a focus on host-based tools, network analyzers, and IDS solutions Complements Thompson's 2017 Apress book, Building a HIPAA-Compliant Cybersecurity Program

    Autorentext

    Eric C. Thompson is the author of two previous Apress books: Building a HIPAA Compliant Cybersecurity Program and Cybersecurity Incident Response. He is certified by GIAC in intrusion analysis, incident handling, network forensics, and detection. He is currently Director of Information Security and IT Compliance at Blue Health Intelligence, a company focused on data analytics in the healthcare payer space. He has Implemented and matured all elements of security operations. He is a passionate user of many open-source solutions and loves working with new implementations of Snort, Zeek, and SOF-ELK. He also has significant experience assessing and managing cyber risks and complying with HIPAA.


Zusammenfassung
Beginning-Intermediate user level

Inhalt

Chapter 1: Security Operations: The Why and the Roadmap.- Chapter 2: HIPAA Security Rule and Cybersecurity Operations.- Chapter 3: Threat Intelligence.- Chapter 4: Vulnerability Management.- Chapter 5: Continuous Monitoring.- Chapter 6: Incident Response.- Chapter 7: Threat Hunting.- Chapter 8: Where to Go from Here.- <p

Weitere Informationen

  • Allgemeine Informationen
    • GTIN 09781484256077
    • Sprache Englisch
    • Auflage First Edition
    • Größe H254mm x B178mm x T14mm
    • Jahr 2020
    • EAN 9781484256077
    • Format Kartonierter Einband
    • ISBN 1484256077
    • Veröffentlichung 26.02.2020
    • Titel Designing a HIPAA-Compliant Security Operations Center
    • Autor Eric C. Thompson
    • Untertitel A Guide to Detecting and Responding to Healthcare Breaches and Events
    • Gewicht 482g
    • Herausgeber Apress
    • Anzahl Seiten 252
    • Lesemotiv Verstehen
    • Genre Informatik

Bewertungen

Schreiben Sie eine Bewertung
Nur registrierte Benutzer können Bewertungen schreiben. Bitte loggen Sie sich ein oder erstellen Sie ein Konto.
Made with ♥ in Switzerland | ©2025 Avento by Gametime AG
Gametime AG | Hohlstrasse 216 | 8004 Zürich | Schweiz | UID: CHE-112.967.470
Kundenservice: customerservice@avento.shop | Tel: +41 44 248 38 38