书目名称 | Designing a HIPAA-Compliant Security Operations Center | 副标题 | A Guide to Detecting | 编辑 | Eric C. Thompson | 视频video | | 概述 | Identifies technical and non-technical vulnerabilities, including assessing severity and providing remediation challenges and solutions.Illustrates the value of open source tools (OpenVas, Snort, Zeek | 图书封面 |  | 描述 | .Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare’s current threats. ..Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats...Cybersecurity operations do not require expensive tools o | 出版日期 | Book 2020 | 关键词 | Threat Intelligence; Threat and Vulnerability Management; Cybersecurity; HIPAA; Data Breach; Healthcare D | 版次 | 1 | doi | https://doi.org/10.1007/978-1-4842-5608-4 | isbn_softcover | 978-1-4842-5607-7 | isbn_ebook | 978-1-4842-5608-4 | copyright | Eric C. Thompson 2020 |
The information of publication is updating
|
|