© 2020

Designing a HIPAA-Compliant Security Operations Center

A Guide to Detecting and Responding to Healthcare Breaches and Events


Table of contents

  1. Front Matter
    Pages i-xviii
  2. Eric C. Thompson
    Pages 1-22
  3. Eric C. Thompson
    Pages 37-63
  4. Eric C. Thompson
    Pages 65-93
  5. Eric C. Thompson
    Pages 95-163
  6. Eric C. Thompson
    Pages 165-204
  7. Eric C. Thompson
    Pages 205-212
  8. Eric C. Thompson
    Pages 213-223
  9. Back Matter
    Pages 225-231

About this book


Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare’s current threats.  

Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats.

Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that’s required is a plan—which author Eric Thompson provides in this book.

You will:

  • Know what threat intelligence is and how you can make it useful
  • Understand how effective vulnerability management extends beyond the risk scores provided by vendors
  • Develop continuous monitoring on a budget
  • Ensure that incident response is appropriate
  • Help healthcare organizations comply with HIPAA


Threat Intelligence Threat and Vulnerability Management Cybersecurity HIPAA Data Breach Healthcare Data breach OCR Investigation/Audit Intrusion Detection Network Traffic Analysis Risk Assessment Compliance Hackivists Criminals Malicious insiders Capability Maturity Model Governance

Authors and affiliations

  1. 1.DekalbUSA

About the authors

Eric C. Thompson is the author of two previous Apress books: Building a HIPAA Compliant Cybersecurity Program and Cybersecurity Incident Response. He is certified by GIAC in intrusion analysis, incident handling, network forensics, and detection. He is currently Director of Information Security and IT Compliance at Blue Health Intelligence, a company focused on data analytics in the healthcare payer space. He has Implemented and matured all elements of security operations. He is a passionate user of many open-source solutions and loves working with new implementations of Snort, Zeek, and SOF-ELK. He also has significant experience assessing and managing cyber risks and complying with HIPAA.

Bibliographic information

  • Book Title Designing a HIPAA-Compliant Security Operations Center
  • Book Subtitle A Guide to Detecting and Responding to Healthcare Breaches and Events
  • Authors Eric C. Thompson
  • DOI
  • Copyright Information Eric C. Thompson 2020
  • Publisher Name Apress, Berkeley, CA
  • eBook Packages Professional and Applied Computing Professional and Applied Computing (R0)
  • Softcover ISBN 978-1-4842-5607-7
  • eBook ISBN 978-1-4842-5608-4
  • Edition Number 1
  • Number of Pages XVIII, 231
  • Number of Illustrations 136 b/w illustrations, 0 illustrations in colour
  • Topics Security
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking