HCISPP

Course
Time
5 hours 25 minutes
Difficulty
Intermediate
CEU/CPE
6

Video Transcription

00:00
Welcome back, Cyberia Friends to the Hcs PP certification course with Sai Buri.
00:07
My name is Charlene Hutchins and I'll be your instructor today for compliance frameworks.
00:15
Today we're going to touch on a few frameworks that you may see during the exam and you'll definitely see during your career as a security and privacy professional.
00:25
We'll discuss I so
00:27
n'est
00:29
common criteria.
00:30
Yeah,
00:32
a pack and only CD.
00:35
Let's begin.
00:38
I so is International Standards Organisation.
00:41
It is billed as the world's largest standards organization and is headquartered in Geneva, Switzerland.
00:49
Currently, they offer over 19,500 standards for sale individually
00:55
or Group eight memberships.
00:57
They're more than 30 standards addressing information, security practices and audit.
01:02
And each of the standards is constantly reviewed and updated, which requires consistent attention for keeping up with the latest standard changes.
01:11
As an information security professional, you should be familiar with the ISIL security standards.
01:19
NIST is part of the US Department of Commerce and addresses the measurement infrastructure within science and technology efforts of the U. S. Government.
01:29
This sets standards in the number of areas including information security.
01:34
Mrs Developed sets of publications through the CSD over recent decades, and all of these publications Air submitted as draft for public review.
01:44
This encourages comments and suggestions that are taken into consideration within the final version off the documents.
01:53
Just recently, there was a shift and password requirements required recommended by NIST
01:59
Missed SP 863 B now recommends that passwords should only be changed if there's been a known compromise,
02:07
and it recommends that longer passwords are better than more complex passwords with special characters. The numbers, etcetera.
02:15
What's been found over the years is that it's really challenging for the average computer user
02:22
to remember a password, let alone one with special characters in the one that has to be changed every 90 days. With so many systems requiring a unique password,
02:32
people began to use a single password across all their systems to meet requirements. And we're using easy to remember or guess passwords such as winter 2020
02:44
or winter 2020 exclamation mark.
02:46
This defeated the purpose of what a password is supposed to do.
02:51
So making passwords longer, such as setting the minimum character length to 15 and using past phrases such as I am your favorite instructor, makes it easier for users to accomplish the goal of hard to guess passwords and thereby strengthening security
03:12
a little bit more about special publications there. Nearly 200 documents within the 800 Siris of the special publications.
03:20
These are the set of standers aimed at the general information security audience within or outside of the federal government.
03:28
These are the most public set of standard documents and represent outreach and collaborative efforts with information technology specialists and government, private organizations and higher education.
03:39
There is in this standard for interpreting and applying HIPPA for healthcare organizations. It's the Espy 800-66 Revision one, which was published in October of 2008.
03:53
This would be a great reference as you review new organizations who are looking to hit the security requirements. Ah, for a strong security standards
04:04
missed inter agency reports or technical research reports targeting specialized audiences,
04:11
including interim and final reports,
04:14
these air for information technology security specialists who wish to keep abreast with the latest research within the CST,
04:21
the CSD has provided a report on the secure exchange of health information that offers a perspective about how to establish an exchange information between different organizations.
04:32
The Mist IR 7497 Security architecture Design process for health information exchanges. H. Iea's Check it out in your spare time.
04:47
Next, let's talk about common criteria.
04:50
The common criteria for information technology Security evaluation or C C
04:56
for um, along with the common methodology for information technology security evaluation, the C E M. R. The technical basis for an international agreement among member countries.
05:09
The criteria are the targets of the standards, and the methodology is how the standards are achieved
05:15
all according to the arrangement. Among the members,
05:19
A C C includes three sets of documentation describing the general model, the security functional requirements and the security assurance requirements.
05:30
The C M
05:31
describes activities performed by an evaluator assessing the efforts to implement the functional requirements in the sure assurance requirements.
05:41
More than likely public and private healthcare organizations will not require this level of rigor or details.
05:47
Assurance and compliance is toe. Other standards can satisfy the requirements of protecting pH. I.
05:58
Now Gap is a set of principles determined jointly by the American Institute of Certified Public Accountants, or the AI C. P A
06:06
and the Canadian Institute of Chartered Accountants. The C I c. A.
06:12
These principles, as stated in the main, are based on the commonly accepted privacy standards for protecting personal information.
06:20
They include providing initial evaluations, gap risk and control assessments, benchmarking and performance evaluations, and the documentation to support the efforts.
06:32
The efforts target the private personal information of clients, customers and workforce members.
06:39
There will certainly be similarities between Gap and healthcare privacy standards, but the gap principles offer no new concepts to most healthcare organizations.
06:50
APEC is the Asia Pacific Economic Cooperation with a goal to provide sustainable economic growth and prosperity
07:00
in the Asian Pacific region.
07:02
The idea began in 1989 and by 1998
07:08
reach full membership with 21 member countries.
07:12
The APEC Data Privacy Pathfinder was established by ministers in 2007 to achieve accountable cross border flow of personal information within the APEC region.
07:23
This goal was to be achieved by developing and implementing the cross border privacy rules or seed the PETE our system consistent with the APEC Privacy framework, which was first endorsed by APEC ministers in 2004.
07:39
Progress on the implementation of the APEC privacy framework includes the application of information privacy, individual action plans for eight
07:47
I A piece by 14 economies and the creation of a study group within the data privacy subgroup to analyze and identify best practices and the role of trust marks in promoting the cross border flow of information.
08:03
The updated APEC Fry Privacy framework of 2015 addresses gaps in policies and regulatory frameworks on e commerce to ensure that the free flow of information and data across borders is balance, with the effective protection of personal information essential to trust and confidence
08:22
in the online market, please
08:24
The update of the privacy framework was endorsed by ministers in November 2016.
08:31
Lastly,
08:33
the O. E. C. D is the Organization for Economic Cooperation and Development, which works to build better policies for better lives.
08:41
They provide a unique form in knowledge hub for data and in my house, this exchange of experiences, best practice sharing and advice on public policies and international standard setting.
08:54
For several decades, the only CD has been playing an important role in promoting respect for privacy as a fundamental value and the condition for the free flow of personal data across borders.
09:07
The guidelines on the protection of privacy and transport of flows of personal data constitute the first update of the original 1980 version that served as the first internationally agreed upon set of principles.
09:24
A number of new concepts were introduced, including national privacy strategies,
09:31
Um, data security breach notification and privacy management programs.
09:41
In summary, we reviewed several different compliance frameworks. Please use the supplemental study material, such as the flashcards, to test your knowledge of specific points surrounding these frameworks.
09:52
Thank you for joining me today, and I'll see you in the next video.

Up Next

HCISPP

The HCISSP certification course provides students with the knowledge and skills to successfully pass the certification test needed to become a healthcare information security and privacy practitioner. The course covers all seven domains included on the exam.

Instructed By

Instructor Profile Image
Schlaine Hutchins
Director, Information Security / Security Officer
Instructor