O'Reilly logo

Healthcare Information Security and Privacy by Sean Murphy

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11

 

Administering Risk Management and Cybersecurity

Rob Davis

   In this chapter, you will learn to

         Understand the anatomy of an external cybersecurity attack using an organized approach

         Appreciate the cyber operations application of risk management frameworks

         Comprehend what a detection capability can provide for risk mitigation

         Understand incident response and recovery for the entire organization

         Apply tailored risk assessment consideration and balance to compensating controls in healthcare

 

Healthcare has seen a tremendous explosion of technology become integrated into the everyday care of patients. Traditional computing of desktops, laptops, and servers centrally managed by the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required