CHAPTER 11
Administering Risk Management and Cybersecurity
In this chapter, you will learn to
• Understand the anatomy of an external cybersecurity attack using an organized approach
• Appreciate the cyber operations application of risk management frameworks
• Comprehend what a detection capability can provide for risk mitigation
• Understand incident response and recovery for the entire organization
• Apply tailored risk assessment consideration and balance to compensating controls in healthcare
Healthcare has seen a tremendous explosion of technology become integrated into the everyday care of patients. Traditional computing of desktops, laptops, and servers centrally managed by the ...
Get Healthcare Information Security and Privacy now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.