Sign Up for Fishpond's Best Deals Delivered to You Every Day
Go
Designing a HIPAA-Compliant ­Security Operations Center
A Guide to Detecting and Responding to Healthcare Breaches and Events

Rating
Format
Paperback, 231 pages
Published
United States, 26 February 2020


Eric C. Thompson is an accomplished governance, risk, and compliance professional. In his GRC role as Director of Compliance at Blue Health Intelligence (BHI), he leads efforts to increase cybersecurity maturity in several domains, including governance, policy and controls, risk management, cybersecurity strategy, and business alignment. Eric established the risk management function which includes assessment, analysis and treatments of risk, threat and vulnerability management strategy, and due diligence requirements for assessing third-party risk. Eric also assesses cybersecurity technology capabilities and recommends enhancements to current solutions and new implementations that meet risk reduction requirements.


Prior to BHI, Eric spent seven years at Ernst & Young in the Advisory practice where he specialized in helping healthcare organizations (providers, payers, and business associates) solve problems related to information security, risk management, and compliance when dealing with electronic medical records. He led the HITRUST Common Security Framework (CSF) cybersecurity program management and third-party risk management assessments.

Eric is also a proud member of the SANS Mentor team.



Chapter 1. What is Security Operations and Why is it Important?


Key components of security operations centers


How Security Operations differs from large organizations to medium and small size ones


How to begin the process


Setting the security operations strategy


Maturing security operations through policy, process, measurement and documentation



Chapter 2: Security Operations and HIPAA


How can security operations aid HIPAA compliance?


Mapping HIPAA safeguards to security operations processes



Chapter 3: Threat Intelligence


Types


Feeds


Components and requirements


Understanding what it is


How to consume it


How to generate it


Need and value



Chapter 4: Vulnerabilities


Identification - technical and non-technical


Assessing severity - key components


ExploitDB and other sites


Remediation - need/ challenges and solutions


Compensating controls (legacy systems)



Chapter 5: Monitoring - from the perimeter to the endpoint


Firewalls


IDS Solutions - commercial, Snort, Surricata? Bro


Wireshark, TCPdump, Tshark


Log aggregation and correlation - SIEM


Splunk


ELK


Necessary Log Sources


Traffic Flow


commercial tools


SiLK and other open source tools


Data flow and movement


Host-based tools


Malicious software


Intrusion detection


Firewall


Detection and Response



Chapter 6: Incident Response


Planning


Detecting


Containing


Responding


Post-mortem forensics and root cause



Chapter 7: Conclusion and Wrap-Up

Show more

Our Price
$87.41
Ships from USA Estimated delivery date: 19th May - 26th May from USA
  Include FREE SHIPPING on a Fishpond Premium Trial

Already Own It? Sell Yours
Buy Together
+
Buy together with Building a Hipaa-Compliant Cybersecurity Program at a great price!
Buy Together
$272.41

Product Description


Eric C. Thompson is an accomplished governance, risk, and compliance professional. In his GRC role as Director of Compliance at Blue Health Intelligence (BHI), he leads efforts to increase cybersecurity maturity in several domains, including governance, policy and controls, risk management, cybersecurity strategy, and business alignment. Eric established the risk management function which includes assessment, analysis and treatments of risk, threat and vulnerability management strategy, and due diligence requirements for assessing third-party risk. Eric also assesses cybersecurity technology capabilities and recommends enhancements to current solutions and new implementations that meet risk reduction requirements.


Prior to BHI, Eric spent seven years at Ernst & Young in the Advisory practice where he specialized in helping healthcare organizations (providers, payers, and business associates) solve problems related to information security, risk management, and compliance when dealing with electronic medical records. He led the HITRUST Common Security Framework (CSF) cybersecurity program management and third-party risk management assessments.

Eric is also a proud member of the SANS Mentor team.



Chapter 1. What is Security Operations and Why is it Important?


Key components of security operations centers


How Security Operations differs from large organizations to medium and small size ones


How to begin the process


Setting the security operations strategy


Maturing security operations through policy, process, measurement and documentation



Chapter 2: Security Operations and HIPAA


How can security operations aid HIPAA compliance?


Mapping HIPAA safeguards to security operations processes



Chapter 3: Threat Intelligence


Types


Feeds


Components and requirements


Understanding what it is


How to consume it


How to generate it


Need and value



Chapter 4: Vulnerabilities


Identification - technical and non-technical


Assessing severity - key components


ExploitDB and other sites


Remediation - need/ challenges and solutions


Compensating controls (legacy systems)



Chapter 5: Monitoring - from the perimeter to the endpoint


Firewalls


IDS Solutions - commercial, Snort, Surricata? Bro


Wireshark, TCPdump, Tshark


Log aggregation and correlation - SIEM


Splunk


ELK


Necessary Log Sources


Traffic Flow


commercial tools


SiLK and other open source tools


Data flow and movement


Host-based tools


Malicious software


Intrusion detection


Firewall


Detection and Response



Chapter 6: Incident Response


Planning


Detecting


Containing


Responding


Post-mortem forensics and root cause



Chapter 7: Conclusion and Wrap-Up

Show more
Product Details
EAN
9781484256077
ISBN
1484256077
Publisher
Other Information
136 Illustrations, black and white; XVIII, 231 p. 136 illus.; 136 Illustrations, black and white; XVIII, 231 p. 136 illus.
Dimensions
25.4 x 17.8 x 1.4 centimetres (0.48 kg)

Table of Contents

Chapter 1: Security Operations: The Why and the Roadmap.- Chapter 2: HIPAA Security Rule and Cybersecurity Operations.- Chapter 3: Threat Intelligence.- Chapter 4: Vulnerability Management.- Chapter 5: Continuous Monitoring.- Chapter 6: Incident Response.- Chapter 7: Threat Hunting.- Chapter 8: Where to Go from Here.-

About the Author

Eric C. Thompson is the author of two previous Apress books: Building a HIPAA Compliant Cybersecurity Program and Cybersecurity Incident Response. He is certified by GIAC in intrusion analysis, incident handling, network forensics, and detection. He is currently Director of Information Security and IT Compliance at Blue Health Intelligence, a company focused on data analytics in the healthcare payer space. He has Implemented and matured all elements of security operations. He is a passionate user of many open-source solutions and loves working with new implementations of Snort, Zeek, and SOF-ELK. He also has significant experience assessing and managing cyber risks and complying with HIPAA.

Show more
Review this Product
What our customers have to say
Ask a Question About this Product More...
 
Look for similar items by category
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 8% commission by selling Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond.com, Inc.

Back to top