By linking granular threats identified in active threat intelligence to (1) higher-level threats contained in the HITRUST Threat Catalogue and (2) related HITRUST CSF controls, organizations will gain greater insight into how well they are addressing extant and emerging threats by evaluating how well they’ve implemented related HITRUST CSF controls in their environment.


Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Post Comment