© Eric C. Thompson 2017

Eric C. Thompson, Building a HIPAA-Compliant Cybersecurity Program, https://doi.org/10.1007/978-1-4842-3060-2_12

12. The Cybersecurity Road Map

Eric C. Thompson

(1)Lisle, Illinois, USA

After focusing on identifying and measuring risks to ePHI, the next two chapters focus on laying out short- and long-term plans for the cybersecurity program. Risk analysis and assessment guides cybersecurity leaders toward protecting the most sensitive and important assets and gives clarity to the current state of the program. The key objective of cybersecurity leaders inside healthcare providers, payers, and business associates is protecting ePHI. This is accomplished by reducing cyber risk, assisting the organization in complying with the ...

Get Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.