Book description
HealthCare Information Security and Privacy Practitioners (HCISPPSM) are the frontline defense for protecting patient information. These are the practitioners whose foundational knowledge and experience unite healthcare information security and privacy best practices and techniques under one credential to protect organizations and sensitive patient data against emerging threats and breaches. The Official (ISC)2 (R) Guide to the HCISPPSM CBK (R) is a comprehensive resource that provides an in-depth look at the six domains of the HCISPP Common Body of Knowledge (CBK). This guide covers the diversity of the healthcare industry, the types of technologies and information flows that require various levels of protection, and the exchange of healthcare information within the industry, including relevant regulatory, compliance, and legal requirements. Numerous illustrated examples and tables are included that illustrate key concepts, frameworks, and real-life scenarios. Endorsed by the (ISC)(2) and compiled and reviewed by HCISPPs and (ISC)(2) members, this book brings together a global and thorough perspective on healthcare information security and privacy. Utilize this book as your fundamental study tool in preparation for the HCISPP certification exam.
Table of contents
- Front Cover
- Contents (1/2)
- Contents (2/2)
- Introduction
- Authors
- Domain 1: Healthcare Industry (1/12)
- Domain 1: Healthcare Industry (2/12)
- Domain 1: Healthcare Industry (3/12)
- Domain 1: Healthcare Industry (4/12)
- Domain 1: Healthcare Industry (5/12)
- Domain 1: Healthcare Industry (6/12)
- Domain 1: Healthcare Industry (7/12)
- Domain 1: Healthcare Industry (8/12)
- Domain 1: Healthcare Industry (9/12)
- Domain 1: Healthcare Industry (10/12)
- Domain 1: Healthcare Industry (11/12)
- Domain 1: Healthcare Industry (12/12)
- Domain 2 : Regulatory Environment (1/16)
- Domain 2 : Regulatory Environment (2/16)
- Domain 2 : Regulatory Environment (3/16)
- Domain 2 : Regulatory Environment (4/16)
- Domain 2 : Regulatory Environment (5/16)
- Domain 2 : Regulatory Environment (6/16)
- Domain 2 : Regulatory Environment (7/16)
- Domain 2 : Regulatory Environment (8/16)
- Domain 2 : Regulatory Environment (9/16)
- Domain 2 : Regulatory Environment (10/16)
- Domain 2 : Regulatory Environment (11/16)
- Domain 2 : Regulatory Environment (12/16)
- Domain 2 : Regulatory Environment (13/16)
- Domain 2 : Regulatory Environment (14/16)
- Domain 2 : Regulatory Environment (15/16)
- Domain 2 : Regulatory Environment (16/16)
- Domain 3 : Privacy and Securityin Health Care (1/10)
- Domain 3 : Privacy and Securityin Health Care (2/10)
- Domain 3 : Privacy and Securityin Health Care (3/10)
- Domain 3 : Privacy and Securityin Health Care (4/10)
- Domain 3 : Privacy and Securityin Health Care (5/10)
- Domain 3 : Privacy and Securityin Health Care (6/10)
- Domain 3 : Privacy and Securityin Health Care (7/10)
- Domain 3 : Privacy and Securityin Health Care (8/10)
- Domain 3 : Privacy and Securityin Health Care (9/10)
- Domain 3 : Privacy and Securityin Health Care (10/10)
- Domain 4: Information Governance and Risk Management (1/10)
- Domain 4: Information Governance and Risk Management (2/10)
- Domain 4: Information Governance and Risk Management (3/10)
- Domain 4: Information Governance and Risk Management (4/10)
- Domain 4: Information Governance and Risk Management (5/10)
- Domain 4: Information Governance and Risk Management (6/10)
- Domain 4: Information Governance and Risk Management (7/10)
- Domain 4: Information Governance and Risk Management (8/10)
- Domain 4: Information Governance and Risk Management (9/10)
- Domain 4: Information Governance and Risk Management (10/10)
- Domain 5: Information RiskAssessment (1/10)
- Domain 5: Information RiskAssessment (2/10)
- Domain 5: Information RiskAssessment (3/10)
- Domain 5: Information RiskAssessment (4/10)
- Domain 5: Information RiskAssessment (5/10)
- Domain 5: Information RiskAssessment (6/10)
- Domain 5: Information RiskAssessment (7/10)
- Domain 5: Information RiskAssessment (8/10)
- Domain 5: Information RiskAssessment (9/10)
- Domain 5: Information RiskAssessment (10/10)
- Domain 6: Third-Party RiskManagement (1/9)
- Domain 6: Third-Party RiskManagement (2/9)
- Domain 6: Third-Party RiskManagement (3/9)
- Domain 6: Third-Party RiskManagement (4/9)
- Domain 6: Third-Party RiskManagement (5/9)
- Domain 6: Third-Party RiskManagement (6/9)
- Domain 6: Third-Party RiskManagement (7/9)
- Domain 6: Third-Party RiskManagement (8/9)
- Domain 6: Third-Party RiskManagement (9/9)
- Appendix A : Answers to DomainReview Questions (1/7)
- Appendix A : Answers to DomainReview Questions (2/7)
- Appendix A : Answers to DomainReview Questions (3/7)
- Appendix A : Answers to DomainReview Questions (4/7)
- Appendix A : Answers to DomainReview Questions (5/7)
- Appendix A : Answers to DomainReview Questions (6/7)
- Appendix A : Answers to DomainReview Questions (7/7)
- Back Cover
Product information
- Title: Official (ISC)2 Guide to the HCISPP CBK
- Author(s):
- Release date: November 2018
- Publisher(s): Auerbach Publications
- ISBN: 9781482262780
You might also like
book
Official (ISC)2® Guide to the ISSAP® CBK, 2nd Edition
Candidates for the CISSP-ISSAP professional certification need to not only demonstrate a thorough understanding of the …
book
Official (ISC)2 Guide to the CAP CBK, 2nd Edition
Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and …
book
(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide, 3rd Edition
The only SSCP study guide officially approved by (ISC)2 The (ISC)2 Systems Security Certified Practitioner (SSCP) …
book
Information Security Policy Development for Compliance
Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards …