Buy Securing a Healthcare Facility Book by Derek Sliger
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Medicine & Health Science textbooks > Medicine: general issues > Health systems and services > Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities
Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities

Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The need for this book arises from the growing cybersecurity challenges faced by small to medium-sized healthcare facilities, which often lack the resources, expertise, and dedicated staff to interpret and implement complex security regulations. These facilities must comply with critical standards such as the Health Insurance Portability and Accountability Act (HIPAA) Security Rule, 405(d) Health Industry Cybersecurity Practices (HICP), and the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), yet understanding these frameworks can be overwhelming. Without clear guidance, hospitals risk data breaches, operational disruptions, and regulatory penalties that could impact patient safety and trust. Securing through simplified explanations, actionable checklists, and real-world applications, this book empowers small and medium-sized hospitals to strengthen their security posture, achieve compliance, and ensure continued safety and efficiency of patient care. The book brings together three essential entities (one regulatory, one practice, and one framework) – HIPAA Security Rule, 405(d) HICP, and the NIST CSF – to guide organizations in creating a comprehensive cybersecurity program.

Table of Contents:
About the Author. Introduction. Chapter 1: Introduction to Healthcare Information Security. Chapter 2: Regulatory Compliance Foundations. Chapter 3: Conducting a Security Risk Assessment. Chapter 4: Administrative Safeguards. Chapter 5: Physical Safeguards. Chapter 6: Technical Safeguards. Chapter 7: Implementing the NIST CSF in a Healthcare Context. Chapter 8: Implementing 405(d) Health Industry Cybersecurity Practices. Chapter 9: Measuring Program Effectiveness and Continuous Improvement. Chapter 10: Future Trends in Healthcare Cybersecurity. Chapter 11: Implementing and Sustaining a Robust Cybersecurity Program. Appendix A: HIPAA Security Rule Outline. Appendix B: 405(d) Health Industry Cybersecurity Practices (HICP) Outline. Appendix C: NIST Cybersecurity Framework (NIST CSF) Outline. Appendix D: Healthcare Cybersecurity Compliance Checklist. Appendix E: Essential Information Security Technologies. Bibliography.

About the Author :
I am an Information Security professional with a unique and diverse background that spans high-stakes National Defense and complex healthcare environments. My journey began with the American Missile Command (AMC) and the Strategic Defense Command (SDC), where I had the privilege of serving in critical roles that honed my technical and strategic expertise. Working with these organizations demanded the highest levels of vigilance, precision, and commitment to safeguarding national assets. The security stakes in missile command and strategic defense are uncompromising, and these early experiences shaped my understanding of threat landscapes and defense mechanisms at their most fundamental level. After over a decade in National Defense, I transitioned into the healthcare industry, where I later assumed the role of Chief Information Security Officer (CISO) for multiple healthcare organizations. As a CISO, I found that while the operational environments differed vastly, the mission of protecting sensitive information and critical infrastructure remained paramount. Healthcare, like defense, is a high-stakes field where breaches can lead to severe consequences, not only data loss but also risks to patient safety and trust. This sector demands a nuanced approach that balances security and compliance with the accessibility required in medical settings. My role has involved implementing robust cybersecurity frameworks to safeguard patient information and ensure regulatory compliance while supporting a seamless healthcare delivery experience. Over the years, I have developed extensive expertise with several foundational cybersecurity frameworks and regulations that are critical to both healthcare and other industries. My experience with National Institute of Standards and Technology (NIST) 800-53 has been a cornerstone of my work, allowing me to establish security and privacy controls that align with best practices for protecting information systems. I am well versed in tailoring NIST 800-53 controls to fit diverse organizational contexts, ensuring that they are both effective and adaptable to emerging threats and compliance requirements. In the healthcare sector, Health Insurance Portability and Accountability Act (HIPAA) Security has been a primary focus, driving my efforts to protect electronic Protected Health Information (ePHI). I have guided organizations in implementing HIPAA’s administrative, physical, and technical safeguards, ensuring that they are both compliant and resilient against cyber threats. I am also deeply familiar with 405(d) Health Industry Cybersecurity Practices, a framework tailored specifically for healthcare that provides practical measures for managing cyber risks. By aligning healthcare organizations with 405(d), I have helped them address top threats like phishing, ransomware, insider threats, and the security of medical devices, thus fortifying their defenses against the unique challenges the industry faces. Furthermore, I have been integrally involved with the NIST Cybersecurity Framework (CSF), a versatile, industry-agnostic framework that has allowed me to build structured, scalable cybersecurity programs. Using the CSF’s five core functions (Identify, Protect, Detect, Respond, and Recover), I have successfully established risk management strategies that are both comprehensive and adaptable. The CSF has been instrumental in guiding organizations through Risk Analysis, incident response planning, and continuous improvement cycles, all while aligning with business objectives. This blend of experience, from the high-stakes realm of National Defense to the highly regulated, sensitive world of healthcare, has given me a unique perspective on cybersecurity. I bring a disciplined approach to risk management, compliance, and incident response, coupled with a deep understanding of how to protect information assets without disrupting critical operations. My career has been dedicated to building resilient, adaptive cybersecurity programs that not only meet regulatory requirements but also foster a culture of security across organizations. I am committed to staying ahead of evolving threats, integrating innovative technologies, and ensuring that security efforts align seamlessly with each organization’s mission and values.


Best Sellers


Product Details
  • ISBN-13: 9781040598528
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: Productivity Press
  • Language: English
  • ISBN-10: 1040598528
  • Publisher Date: 02 Dec 2025
  • Binding: Digital (delivered electronically)
  • Sub Title: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities
Taylor & Francis Ltd -
Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Securing a Healthcare Facility: A Guide to Implementing a Comprehensive Cybersecurity Program for Small to Medium-Sized Facilities

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!