Download Publication
Data Loss Prevention in Healthcare
Release Date: 10/04/2023
Working Group: Health Information Management
- How DLP works
- The three main types of DLP
- What is Exact Data Matching (EDM) and Indexed Document Matching (IDM)
- The importance of collaborating on DLP with the Threat Intel team
- The impact of location on data usage
- How to properly configure DLP
- DLP best practices
- How to measure DLP maturity
Download this Resource
Prefer to access this resource without
an account?
Download the publication. Download the presentation.
Acknowledgements
Dr. Jim Angle
Jim has dedicated hundreds of hours to CSA and was instrumental in reviving CSA’s Health Information Management working group. In doing so, he drafted the group’s first charter and went on to become its co-chair. In this role, he authored three papers — Managing the Risk for Medical Devices Connected to the Cloud, Telehealth in the ...
Michael Roza
Risk, Audit, Control and Compliance Professional
Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...
Imran Pirzada
Principal IT Security Engineer - Data Protection & Governance
Joined CSA Healthcare Information Management working group in 2020. Participated in several publications and recently authored "Data Loss Prevention in Healthcare"
Imran is a Principal IT Security Engineer at a Healthcare Fortune 500 company, coming with extenstive experience in IT security across various industries. Imran's concentration is in IT Security Data Governance where he has designed and implemented policies, procedures, and...
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more