• Complain

Eric C. Thompson - Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events

Here you can read online Eric C. Thompson - Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Berkeley, CA, year: 2020, publisher: Apress, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Eric C. Thompson Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events
  • Book:
    Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2020
  • City:
    Berkeley, CA
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Eric C. Thompson: author's other books


Who wrote Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events? Find out the surname, the name of the author of the book and a list of all author's works by series.

Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Eric C Thompson Designing a HIPAA-Compliant Security Operations Center A - photo 1
Eric C. Thompson
Designing a HIPAA-Compliant Security Operations Center
A Guide to Detecting and Responding to Healthcare Breaches and Events
Eric C Thompson Dekalb IL USA Any source code or other supplementary - photo 2
Eric C. Thompson
Dekalb, IL, USA

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/9781484256077 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-5607-7 e-ISBN 978-1-4842-5608-4
https://doi.org/10.1007/978-1-4842-5608-4
Eric C. Thompson 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 233 Spring Street, 6th Floor, New York, NY 10013. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

I would like to dedicate this book to my wife, Daina, who finds the strength to put up with me and my antics every day.

Introduction

Since the advent of the Wall of Shame hosted by the Department of Health and Human Services Office for Civil Rights, healthcare has been under constant attack. The first few years stolen medical records highlighted the attacks. Then right around 2015, ransomware attacks began. Millions of medical records are affected annually by ransomware, theft, and unauthorized disclosure due to misconfigurations.

Several tools and frameworks are available for healthcare entities to use when building and evaluating information security programs. The Cybersecurity Framework developed by the National Institute of Standards and Technology (NIST) and the Health Information Trust Alliance (HITRUST) framework are two examples. Each covers information security from top to bottom, from policy and procedure development, asset management to monitoring the environment. These are great places to start. Many prerequisite capabilities are addressed, each necessary for any program to achieve high levels of maturity. But more is needed to address the ongoing attacks. A deeper focus, a mindset if you will, on security operations is needed. That is what this book is about, adopting a mindset focused on security operations. After a short discussion on why security operations is important, and the compliance requirements within HIPAA, the book addresses each component of security operations: the need for vulnerability management to go beyond scanning and patching, why threat intelligence is important, how intelligence gathering leads to better alerting and monitoring processes, and how to respond to events effectively. This book talks about how to implement security, not check a box. If an entity does not monitor command-line execution and attackers targeting healthcare use PowerShell at the command line to download tools and escalate privileges, entities need to monitor for uses of PowerShell and other command-line executions. And when such events occur, the entity needs to respond swiftly.

Large budgets are not necessary to implement the processes necessary for security operations. Open source solutions are available, and it is possible for team members to learn how to customize each based on the environments where they are deployed. Security operations does not require large teams either. Having less than five members in the information security team is not unheard of, especially for small- to medium-sized providers, payers, and business associates. Again, it is about adopting the mindset of wanting to understand how sophisticated attackers and malicious insiders are targeting entities and implementing information security that quickly detects this activity. This book was a lot of fun to write, and I hope you enjoy it and learn something you can take to work.

Acknowledgments

Thanks to Susan McDermott. Over ten years ago, I went back to graduate school to make a career change, hoping to one day publish books in my field. Thanks to Susan, I have published three and the experience was amazing. Thanks to Rita Fernando for shepherding me through the process once again. Writing a book is challenging and its not unusual for self-doubt to appear during the process. Ritas positive attitude and direction play a significant role each time I complete one of these projects. I would also like to thank my technical editors Alfonso Gallegos and Julie Yang. These two are wonderful to work with and I am grateful for the experience.

Finally, I need to thank my family: my wife Daina, our daughter Hannah, and our two sons Daniel and Hunter. I beam with pride just thinking about you all.

Table of Contents
About the Author
Eric C. Thompson
is the author of two previous Apress booksBuilding a HIPAA-Compliant - photo 3

is the author of two previous Apress books:Building a HIPAA-Compliant Cybersecurity ProgramandCybersecurity Incident Response. Eric is certified by GIAC in intrusion analysis, incident handling, network forensics, and detection. He is the Director of Information Security and IT Compliance at Blue Health Intelligence, a company focused on data analytics in the Healthcare Payer space. Eric has implemented and matured all elements of security operations. He is a passionate user of many open source solutions and loves working with new implementations of Snort, Zeek, and SOF-ELK. Eric also has significant experience assessing and managing cyber risks and complying with HIPAA.

About the Technical Reviewers
Alfonso Gallegos

has been in the IT profession for over 25 years. His focus has been primarily in Linux operating systems, but he has extensive knowledge in Microsoft Windows and networking. He has held positions in the areas of banking, futures trading, and healthcare as a Linux/Windows Administrator, Systems Engineer, and Network Engineer. He currently holds the position of Senior Security Engineer in the healthcare industry in Chicago.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events»

Look at similar books to Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events»

Discussion, reviews of the book Designing a HIPAA-Compliant Security Operations Center A Guide to Detecting and Responding to Healthcare Breaches and Events and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.