Building a HIPAA-compliant cybersecu...
Thompson, Eric C.

Linked to FindBook      Google Book      Amazon      博客來     
  • Building a HIPAA-compliant cybersecurity program = using NIST 800-30 and CSF to secure protected health information /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Building a HIPAA-compliant cybersecurity program/ by Eric C. Thompson.
    Reminder of title: using NIST 800-30 and CSF to secure protected health information /
    Author: Thompson, Eric C.
    Published: Berkeley, CA :Apress : : 2017.,
    Description: xxii, 297 p. :ill., digital ;24 cm.
    [NT 15003449]: Part I: Why Risk Assessment and Analysis -- Chapter 1: Not If, But When -- Chapter 2: Meeting Regulator Expectations -- Chapter 3: Selecting Security Measures -- Part II: Assessing and Analyzing Risk -- Chapter 4: Inventory Your ePHI -- Chapter 5: Who Wants Health Information -- Chapter 6: Weaknesses Waiting to Be Exploited -- Chapter 7: Is It Really This Bad? -- Chapter 8: Increasing Program Maturity -- Chapter 9: Targeted Non-technical Testing -- Chapter 10: Targeted Technical Testing -- Part III: Applying the Results to Everyday Needs -- Chapter 11: Refreshing the Risk Register -- Chapter 12: The Cybersecurity Roadmap -- Part IV: Continuous Improvement -- Chapter 13: Investing for Risk Reduction -- Chapter 14: Third Party-Risk: Beyond the BAA -- Chapter 15: Social Media, BYOD, IOT and Portability -- Chapter 16: Risk Treatment and Management -- Chapter 17: Customizing the Risk Analysis -- Chapter 18: Think Offensively -- Appendix A. NIST CSF Internal Controls -- Appendix B. NIST CSF to HIPAA Crosswalk -- Appendix C: Risk Analysis Templates.
    Contained By: Springer eBooks
    Subject: Medical informatics - Security measures. -
    Online resource: http://dx.doi.org/10.1007/978-1-4842-3060-2
    ISBN: 9781484230602
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login