Ayala, L. (2016). Cybersecurity for hospitals and healthcare facilities: A guide to detection and prevention [eBook edition]. Apress. NOTE* If it is your first time accessing O’Reilly, it may prompt you to choose an institution. If so, select "Not Listed? Click Here" from the Institution List and sign in for access using your NCU school email address.
Reading: Chapter 8
This chapter provides information on developing a response and recovery plan for use in a healthcare network environment.
Reading: Appendix: Cyber-Attack Response Procedures Template
This appendix provides templates for developing cyber-attack response procedures for a healthcare network environment. Download and review.
The MITRE Corporation. (n.d.). Getting started | MITRE ATT&CK. This web page provides tips on using the MITRE ATT&CK Framework, including a short video, e-book, technical papers, uses cases, and additional resources. The video and Getting Started with ATT&CK eBook are directly relevant to the evaluation of the organization’s needs based on industry. The video and e-book are valuable tools to have as a reference.
Zrahia, A. (2018). Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views. Journal of Cybersecurity, 1. This article stresses the importance of sharing threat intelligence between vendors to limit the duplication of effort and allowing the knowledge gained by one organization to prevent attacks for other organizations.
Siegel, C.A., & Sweeney, M. (2020). Cyber strategy: Risk-driven security and resiliency. Auerbach Publications. This e-book describes cybersecurity strategies using several of the industry-standard frameworks discussed in this class. Some of the topics detailed are cyber risks and controls, current and target statement assessments, and measuring cybersecurity plan performance. This e-book is a valuable tool to have as a reference, and specific chapters are valuable resources for the weekly assignments.