Jump to ratings and reviews
Rate this book

Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Rate this book
Part Why Risk Assessment and Analysis.- Chapter 1: Not If, But When.- Chapter 2: Meeting Regulator Expectations.- Chapter 3: Selecting Security Measures.- Part Assessing and Analyzing Risk.- Chapter 4: Inventory Your ePHI.- Chapter 5: Who Wants Health Information.- Chapter 6: Weaknesses Waiting to Be Exploited.- Chapter 7: Is It Really This Bad?.- Chapter 8: Increasing Program Maturity.- Chapter 9: Targeted Non-technical Testing.- Chapter 10: Targeted Technical Testing.- Part Applying the Results to Everyday Needs.- Chapter 11: Refreshing the Risk Register.- Chapter 12: The Cybersecurity Roadmap.- Part Continuous Improvement.- Chapter 13: Investing for Risk Reduction.- Chapter 14: Third Beyond the BAA.- Chapter 15: Social Media, BYOD, IOT and Portability.- Chapter 16: Risk Treatment and Management.- Chapter 17: Customizing the Risk Analysis.- Chapter 18: Think Offensively.- Appendix A. NIST CSF Internal Controls.- Appendix B. NIST CSF to HIPAA Crosswalk.- Appendix Risk Analysis Templates.-

324 pages, Paperback

Published November 12, 2017

15 people are currently reading
6 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
2 (66%)
3 stars
1 (33%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.