Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to HITRUST
- Understanding the definition of HITRUST and its importance in the healthcare sector.
- The history and objectives of the HITRUST CSF.
Overview of the HITRUST Framework
- Introduction to the structure and components of the HITRUST CSF.
- Key concepts, principles, and practices outlined within the framework.
HITRUST Control Domains
- Detailed exploration of administrative and security control domains within the HITRUST CSF.
- Understanding how these domains contribute to a comprehensive security strategy.
Information Risk Management
- The significance of risk management in cybersecurity.
- Methods for assessing, analyzing, and managing information risks using HITRUST guidelines.
Security Compliance
- Exploration of various regulatory frameworks (e.g., HIPAA, NIST, PCI-DSS).
- Understanding how the HITRUST CSF assists organizations in meeting these requirements.
Types of HITRUST Assessments and Scoring
- Overview of different assessment types and scoring methodologies.
- The importance of assessments in maintaining and enhancing security posture.
HITRUST Certification Process and Requirements
- Step-by-step guidance on the certification process for achieving HITRUST compliance.
- Meeting the requirements to attain various levels of HITRUST compliance (e.g., CSF, CSF+).
HITRUST Implementation Levels
- Understanding the various implementation levels within the HITRUST framework.
- Best practices for each level and their impact on security posture.
Best Practices and Tips for HITRUST Adoption
- Strategies for adopting a HITRUST-compliant approach in software development and IT management.
- Lessons learned from real-life implementations.
Summary and Q&A
- Reviewing key points covered during the training session.
- Open discussion and answering of participants' questions.
Requirements
- Foundational understanding of cybersecurity concepts.
- Familiarity with healthcare industry standards is advantageous but not mandatory.
Target Audience
- Developers responsible for creating software solutions for the healthcare sector.
- System administrators managing IT infrastructure within healthcare organizations.
14 Hours
Testimonials (3)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects