Listing 1 - 10 of 16 << page
of 2
>>
Sort by

Book
Building a HIPAA-Compliant Cybersecurity Program : Using NIST 800-30 and CSF to Secure Protected Health Information
Author:
ISBN: 1484230604 1484230590 Year: 2017 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. This book lays out a plan for healthcare organizations of all types to successfully comply with these requirements and use the output to build upon the cybersecurity program.   With the proliferation of cybersecurity breaches, the number of healthcare providers, payers, and business associates investigated by the OCR has risen significantly. It is not unusual for additional penalties to be levied when victims of breaches cannot demonstrate that an enterprise-wide risk assessment exists, comprehensive enough to document all of the risks to ePHI. Why is it that so many covered entities and business associates fail to comply with this fundamental safeguard? Building a HIPAA Compliant Cybersecurity Program cuts through the confusion and ambiguity of regulatory requirements and provides detailed guidance to help readers: Understand and document all known instances where patient data exist Know what regulators want and expect from the risk analysis process Assess and analyze the level of severity that each risk poses to ePHI Focus on the beneficial outcomes of the process: understanding real risks, and optimizing deployment of resources and alignment with business objectives What You’ll Learn: Use NIST 800-30 to execute a risk analysis and assessment, which meets the expectations of regulators such as the Office for Civil Rights (OCR) Understand why this is not just a compliance exercise, but a way to take back control of protecting ePHI Leverage the risk analysis process to improve your cybersecurity program Know the value of integrating technical assessments to further define risk management activities Employ an iterative process that continuously assesses the environment to identify improvement opportunities.


Book
Cybersecurity Incident Response : How to Contain, Eradicate, and Recover from Incidents
Author:
ISBN: 1484238702 1484238699 Year: 2018 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing Detection Containment Eradication Post-incident actions What You’ll Learn: Know the sub-categories of the NIST Cybersecurity Framework Understand the components of incident response Go beyond the incident response plan Turn the plan into a program that needs vision, leadership, and culture to make it successful Be effective in your role on the incident response team.


Book
Designing a HIPAA-Compliant Security Operations Center : A Guide to Detecting and Responding to Healthcare Breaches and Events
Author:
ISBN: 1484256085 1484256077 Year: 2020 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare’s current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that’s required is a plan—which author Eric Thompson provides in this book. You will: Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA.


Digital
Cybersecurity Incident Response : How to Contain, Eradicate, and Recover from Incidents
Author:
ISBN: 9781484238707 Year: 2018 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing Detection Containment Eradication Post-incident actions What You’ll Learn: Know the sub-categories of the NIST Cybersecurity Framework Understand the components of incident response Go beyond the incident response plan Turn the plan into a program that needs vision, leadership, and culture to make it successful Be effective in your role on the incident response team.


Digital
Building a HIPAA-Compliant Cybersecurity Program : Using NIST 800-30 and CSF to Secure Protected Health Information
Author:
ISBN: 9781484230602 Year: 2017 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) during breach investigations and compliance audits. This book lays out a plan for healthcare organizations of all types to successfully comply with these requirements and use the output to build upon the cybersecurity program.   With the proliferation of cybersecurity breaches, the number of healthcare providers, payers, and business associates investigated by the OCR has risen significantly. It is not unusual for additional penalties to be levied when victims of breaches cannot demonstrate that an enterprise-wide risk assessment exists, comprehensive enough to document all of the risks to ePHI. Why is it that so many covered entities and business associates fail to comply with this fundamental safeguard? Building a HIPAA Compliant Cybersecurity Program cuts through the confusion and ambiguity of regulatory requirements and provides detailed guidance to help readers: Understand and document all known instances where patient data exist Know what regulators want and expect from the risk analysis process Assess and analyze the level of severity that each risk poses to ePHI Focus on the beneficial outcomes of the process: understanding real risks, and optimizing deployment of resources and alignment with business objectives What You’ll Learn: Use NIST 800-30 to execute a risk analysis and assessment, which meets the expectations of regulators such as the Office for Civil Rights (OCR) Understand why this is not just a compliance exercise, but a way to take back control of protecting ePHI Leverage the risk analysis process to improve your cybersecurity program Know the value of integrating technical assessments to further define risk management activities Employ an iterative process that continuously assesses the environment to identify improvement opportunities.


Book
Southeast Asian Anthropologies : National Traditions and Transnational Practices
Authors: --- ---
ISBN: 9813250097 9814722960 Year: 2019 Publisher: Singapore NUS Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Anthropology is a flourishing discipline in Southeast Asia. This book makes visible the development of national traditions and transnational practices of anthropology across the region. The authors are practising anthropologists with decades of experience in the intellectual traditions and institutions that have taken root in the region. Three overlapping issues are addressed in these pages. First, the historical development of traditions of research, scholarship, and social engagement across diverse anthropological communities of the region, which have adopted and adapted global anthropological trends to their local circumstances. Second, the opportunities and challenges faced by Southeast Asian anthropologists as they practise their craft in different political contexts. Third, the emergence of locally-grounded, intra-regional, transnational linkages and practices. The book contributes to a 21st-century, world anthropologies paradigm from a Southeast Asian perspective.


Book
Cleavage, connection and conflict in rural, urban and contemporary Asia
Authors: --- ---
ISBN: 9400754817 9401783012 9400754825 1283936186 Year: 2013 Volume: v. 3 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Asia, the location of the world’s fastest-growing economies, is also home to some of the fastest rates of urbanization humanity has ever seen, a process whose speed renders long-term outcomes highly unpredictable. This volume contrasts with much published work on the rural/urban divide, which has tended to focus on single case studies. It provides empirical perspectives from four Asian countries: India, Indonesia, Malaysia, and Thailand, and includes a wealth of insights that both critique and expand popular notions of the rural-urban divide. The volume is relevant not just to Asian contexts but to social scientific research on population dynamics more generally. Rather than deploying a single study to chart national trends, three chapters on each country make possible much more complex perspectives. As a result, this volume does more than extend our understanding of the interplay between cities and hinterlands within Asia. It enhances our notions of rural/urban cleavages, connections and conflicts more generally, with data and analysis ready for application to other contexts. Of interest to diverse scholars across the social sciences and Asian studies, this work includes accounts ranging from rural youth real estate entrepreneurs in Hyderabad, India, to social development in Aceh province in Indonesia, devastated by the 2004 tsunami, to the relationship between urban space and commonly held notions of the supernatural in Thailand’s northern city of Chiang Mai.

Keywords

Asia -- Social conditions. --- Rural-urban migration -- China. --- Urbanization. --- Sociology, Urban --- Sociology, Rural --- Social Sciences --- Social Sciences - General --- Politics and culture --- Political sociology --- Southeast Asia --- Social conditions. --- Politics and government. --- Mass political behavior --- Political behavior --- Political science --- Culture --- Culture and politics --- Sociological aspects --- Political aspects --- Social sciences. --- Urban planning. --- City planning. --- Anthropology. --- Sociology. --- Human geography. --- Social Sciences. --- Social Sciences, general. --- Urbanism. --- Human Geography. --- Sociology, general. --- Sociology --- Architecture. --- Anthropo-geography --- Anthropogeography --- Geographical distribution of humans --- Social geography --- Anthropology --- Geography --- Human ecology --- Human beings --- Architecture, Western (Western countries) --- Building design --- Buildings --- Construction --- Western architecture (Western countries) --- Art --- Building --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Design and construction --- Cities and towns --- City planning --- Civic planning --- Land use, Urban --- Model cities --- Redevelopment, Urban --- Slum clearance --- Town planning --- Urban design --- Urban development --- Urban planning --- Land use --- Planning --- Art, Municipal --- Civic improvement --- Regional planning --- Urban policy --- Urban renewal --- Social theory --- Social sciences --- Government policy --- Management --- 2000 - 2099 --- Asia --- Asia. --- Asie --- Politics and government --- Social conditions --- Conditions sociales --- Orient --- Asie centrale --- Asie du Nord --- Asie du Sud --- Asie orientale --- Moyen-Orient --- Hémisphère oriental --- Eurasie --- Asian and Pacific Council countries --- Eastern Hemisphere --- Eurasia --- Civilisation --- Conditions économiques --- Étude et enseignement --- Histoire --- Langues --- Politique et gouvernement --- Relations extérieures --- Primitive societies


Book
Designing a HIPAA-Compliant Security Operations Center
Authors: ---
ISBN: 9781484256084 Year: 2020 Publisher: Berkeley, CA Apress :Imprint: Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Do young people know ASEAN?
Authors: --- ---
ISBN: 9789814695640 9789814695640 Year: 2016 Publisher: Singapore ISEAS-Yusof Ishak Institute

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Cleavage, Connection and Conflict in Rural, Urban and Contemporary Asia
Authors: --- ---
ISBN: 9789400754829 Year: 2013 Publisher: Dordrecht Springer Netherlands

Loading...
Export citation

Choose an application

Bookmark

Abstract

Asia, the location of the world’s fastest-growing economies, is also home to some of the fastest rates of urbanization humanity has ever seen, a process whose speed renders long-term outcomes highly unpredictable. This volume contrasts with much published work on the rural/urban divide, which has tended to focus on single case studies. It provides empirical perspectives from four Asian countries: India, Indonesia, Malaysia, and Thailand, and includes a wealth of insights that both critique and expand popular notions of the rural-urban divide. The volume is relevant not just to Asian contexts but to social scientific research on population dynamics more generally.   Rather than deploying a single study to chart national trends, three chapters on each country make possible much more complex perspectives. As a result, this volume does more than extend our understanding of the interplay between cities and hinterlands within Asia. It enhances our notions of rural/urban cleavages, connections and conflicts more generally, with data and analysis ready for application to other contexts. Of interest to diverse scholars across the social sciences and Asian studies, this work includes accounts ranging from rural youth real estate entrepreneurs in Hyderabad, India, to social development in Aceh province in Indonesia, devastated by the 2004 tsunami, to the relationship between urban space and commonly held notions of the supernatural in Thailand’s northern city of Chiang Mai.

Listing 1 - 10 of 16 << page
of 2
>>
Sort by