Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to HITRUST
- Gaining an understanding of what HITRUST is and its importance in the healthcare sector.
- Exploring the history and objectives of the HITRUST CSF.
Overview of HITRUST Framework
- An introduction to the structure and components of the HITRUST CSF.
- Reviewing the key concepts, principles, and practices defined in the framework.
HITRUST Control Domains
- A detailed exploration of administrative and security control domains within the HITRUST CSF.
- Understanding how these domains contribute to a comprehensive security strategy.
Information Risk Management
- The significance of risk management in cybersecurity.
- Methods for assessing, analyzing, and managing information risks using HITRUST guidelines.
Security Compliance
- Examining various regulatory frameworks (e.g., HIPAA, NIST, PCI-DSS).
- Understanding how the HITRUST CSF assists organizations in meeting these requirements.
Types of HITRUST Assessments and Scoring
- A summary of different assessment types and scoring methodologies.
- The role of assessments in maintaining and improving security posture.
HITRUST Certification Process and Requirements
- A step-by-step guide to the certification process for achieving HITRUST compliance.
- Meeting the requirements to attain different levels of HITRUST compliance (e.g., CSF, CSF+).
HITRUST Implementation Levels
- Understanding the various implementation levels within the HITRUST framework.
- Best practices for each level and their impact on security posture.
Best Practices and Tips for HITRUST Adoption
- Strategies for adopting a HITRUST-compliant approach in software development and IT management.
- Lessons learned from real-life implementations.
Summary and Q&A
- Reviewing key points covered during the training session.
- Open discussion and answering of participants' questions.
Requirements
- A basic understanding of cybersecurity concepts.
- Familiarity with healthcare industry standards is advantageous but not mandatory.
Target Audience
- Developers working on software solutions for the healthcare industry.
- System administrators responsible for managing IT infrastructure within healthcare organizations.
14 Hours
Testimonials (3)
The trainer was helpful..
Attila - Lifial
Course - Compliance and the Management of Compliance Risk
learning about Basel
Daksha Vallabh - Standard Bank of SA Ltd
Course - Basel III – Certified Basel Professional
Risk optimization is more clear than the other subjects