Subtopics
- How do I explain the HITRUST Threat Catalogue™ to my executives?
- Why did HITRUST map the threats to HITRUST CSF v10 and not the CSF v9.x?
- How does the HITRUST Threat Catalogue make the HITRUST CSF better or improve its ability to help manage risk?
- Can I get involved in the working group and, if so, how?
- When will cyber threat intelligence be linked to the threats in the catalogue?
- Will all the threats to personal data be listed in the HITRUST Threat Catalogue?
- How will the HITRUST Threat Catalogue evolve over time?
- How does the HITRUST Threat Catalogue help me perform a risk analysis?
- Will the HITRUST Threat Catalogue help me with HIPAA compliance?
- How does threat intelligence linked to the HITRUST CSF help me better protect health information?
- How will HITRUST use threat intelligence to update the requirements in the HITRUST CSF?
- What would prompt HITRUST to issue additional HITRUST CSF implementation guidance?
- How often will the HITRUST Threat Catalogue be updated?
Post your comment on this topic.