Thompson, Eric C.
Building a HIPAA-Compliant Cybersecurity Program
Part I. Why Risk Assessment and Analysis?
1. Not If, but When
Eric C. Thompson
2. Meeting Regulator Expectations
Eric C. Thompson
3. Selecting Security Measures
Eric C. Thompson
4. Inventory Your ePHI
Eric C. Thompson
5. Who Wants Health Information?
Eric C. Thompson
6. Weaknesses Waiting to BeExploited
Eric C. Thompson
Part II. Assessing and Analyzing Risk
7. Is It Really This Bad?
Eric C. Thompson
8. Increasing Program Maturity
Eric C. Thompson
9. Targeted Nontechnical Testing
Eric C. Thompson
10. Targeted Technical Testing
Eric C. Thompson
11. Refreshing the Risk Register
Eric C. Thompson
12. The Cybersecurity Road Map
Eric C. Thompson
13. Investing for Risk Reduction
Eric C. Thompson
14. Third-Party Risk: Beyond the BAA
Eric C. Thompson
15. Social Media, BYOD, IOT, and Portability
Eric C. Thompson
16. Risk Treatment and Management
Eric C. Thompson
Part IV. Continuous Improvement
17. Customizing the Risk Analysis
Eric C. Thompson
18. Think Offensively
Eric C. Thompson
Nyckelord: Computer Science, Security
- Författare
- Thompson, Eric C.
- Utgivare
- Springer
- Utgivningsår
- 2017
- Språk
- en
- Utgåva
- 1
- Sidantal
- 22 sidor
- Kategori
- Datateknik, Datakommunikation
- Format
- E-bok
- eISBN (PDF)
- 9781484230602
- Tryckt ISBN
- 978-1-4842-3059-6