Warehouse Stock Clearance Sale

Grab a bargain today!


Designing a HIPAA-Compliant Security Operations Center
By

Rating

Product Description
Product Details

Table of Contents

Chapter 1: Security Operations: The Why and the Roadmap.- Chapter 2: HIPAA Security Rule and Cybersecurity Operations.- Chapter 3: Threat Intelligence.- Chapter 4: Vulnerability Management.- Chapter 5: Continuous Monitoring.- Chapter 6: Incident Response.- Chapter 7: Threat Hunting.- Chapter 8: Where to Go from Here.-

About the Author

Eric C. Thompson is the author of two previous Apress books: Building a HIPAA Compliant Cybersecurity Program and Cybersecurity Incident Response. He is certified by GIAC in intrusion analysis, incident handling, network forensics, and detection. He is currently Director of Information Security and IT Compliance at Blue Health Intelligence, a company focused on data analytics in the healthcare payer space. He has Implemented and matured all elements of security operations. He is a passionate user of many open-source solutions and loves working with new implementations of Snort, Zeek, and SOF-ELK. He also has significant experience assessing and managing cyber risks and complying with HIPAA.

Ask a Question About this Product More...
 
Look for similar items by category
Item ships from and is sold by Fishpond.com, Inc.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.