Building a HIPAA-Compliant Cybersecurity Program Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area f...

Descripción completa

Detalles Bibliográficos
Autor principal: Thompson, Eric C. author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Berkeley, CA : Apress 2017.
Edición:1st ed. 2017.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630649806719
Tabla de Contenidos:
  • Part I: Why Risk Assessment and Analysis
  • Chapter 1: Not If, But When
  • Chapter 2: Meeting Regulator Expectations
  • Chapter 3: Selecting Security Measures
  • Part II: Assessing and Analyzing Risk
  • Chapter 4: Inventory Your ePHI
  • Chapter 5: Who Wants Health Information
  • Chapter 6: Weaknesses Waiting to Be Exploited
  • Chapter 7: Is It Really This Bad?
  • Chapter 8: Increasing Program Maturity
  • Chapter 9: Targeted Non-technical Testing
  • Chapter 10: Targeted Technical Testing
  • Part III: Applying the Results to Everyday Needs
  • Chapter 11: Refreshing the Risk Register
  • Chapter 12: The Cybersecurity Roadmap
  • Part IV: Continuous Improvement
  • Chapter 13: Investing for Risk Reduction
  • Chapter 14: Third Party-Risk: Beyond the BAA
  • Chapter 15: Social Media, BYOD, IOT and Portability
  • Chapter 16: Risk Treatment and Management
  • Chapter 17: Customizing the Risk Analysis
  • Chapter 18: Think Offensively
  • Appendix A. NIST CSF Internal Controls
  • Appendix B. NIST CSF to HIPAA Crosswalk
  • Appendix C: Risk Analysis Templates.- .