HITRUST is continuously involved in collaboration and communication with industry leaders. As such, we draw upon the expertise of councils and other groups to help enhance our programs, services, and initiatives to ensure they are serving the information security and privacy needs of the industry. Councils are ongoing groups or assemblies of experts in their respective fields who are selected, summoned, or convened on a rotating basis for consultation, deliberation, or advice on various security and privacy programs, issues, or other areas of interest.

Active Councils (click to expand)

HITRUST Authorized External Assessor Council

Now in its second year, the HITRUST Authorized External Assessor Council has grown to 25 appointees, representing a broad range of experience in information security and privacy. The council provides a forum to ensure that HITRUST Authorized External Assessors can directly submit input to HITRUST thereby influencing the HITRUST CSF Assurance program to continually ensure and evolve its integrity, effectiveness, and efficiency. The creation of the Quality Subcommittee further upholds the continued focus on maintaining a standard of excellence.

The HITRUST Authorized External Assessor Council interacts regularly with HITRUST to share challenges and opportunities relating to HITRUST service offerings. It holds periodic meetings over the course of each year.

HITRUST Authorized External Assessor Council members include:

  • 360 Advanced, Inc. – Ryan Winkler and Chelsea Higgins
  • A-LIGN – Petar Besalev and Shreesh Bhattarai
  • Baker Tilly – Emily Di Nardo and Samantha Boterman
  • Coalfire – Arthur Staff and Tiffany Stewart
  • ControlCase – Omkar Salunkhe and Himanshu Goel
  • Frazier & Deeter – Andrew Hicks and Eric Johnson
  • Intraprise Health – John Toner and Liz Gulden
  • LBMC Security & Risk Services – Robyn Barton and Drew Hendrickson
  • Meditology Services – Angela Fitzpatrick
  • NBD Assurance, LP – Charles Denyer
  • PwC – Brent Stevens and Adrian Leung
  • Schellman – Doug Kanney and Greg Miller
  • Tevora – Justin Graham and Jason Lee

HITRUST Asia Advisory Council

The Asia Advisory Council (the Council) will help ensure the HITRUST Approach remains current and relevant to the needs of the HITRUST community in Asia-Pacific countries. Members will advise and make recommendations to the HITRUST Office of Research and Strategy (OR&S) based on their area of expertise.

The Council will support the OR&S in facilitating continuous improvement of information security and individual privacy as HITRUST expands within Asia by providing thought leadership on the emerging laws, policies, and trends impacting regional risk management and compliance.

For more information about the HITRUST Asia Advisory Council, visit here.

HITRUST Venture Program

The HITRUST Venture Program, governed by a council of members from leading venture capital firms, was established to address the unique challenges of startup organizations by integrating security, privacy, and compliance into an organization’s culture and strategy from their genesis.

One element of the program is providing startups access to a bundle of tools and services to facilitate an efficient and cost-effective process of ensuring they have the appropriate and effective information risk management and compliance controls in place and can demonstrate and provide assurances of such to their prospects, customers and investors.

The purpose of the Venture Program is simple: accelerate innovation for startups.

For more information about the HITRUST Venture Program, also known as the HITRUST Venture Capital Advisory Council, visit here.

Working Groups are generally ad hoc groups of subject matter experts working together to achieve specified goals or stated objectives. The groups are domain- or task-specific and focus on discussion or activity around a specific subject area. The term can refer to an interdisciplinary collaboration of researchers working on activities that would be difficult to sustain without additional working resources. Our working groups generally involve members from different companies, who collaborate on projects requiring their unique expertise. The lifespan of a working group can be anywhere from a few months to several years, and is usually disbanded when it has achieved its goal(s).

Active Working Groups (click to expand)

HITRUST Risk Catalogue Working Group (2021)

The HITRUST Threat Catalogue was designed to help organizations become more proactive and improve their information security posture by better aligning cyber threats with HITRUST CSF controls—a combination not currently found in other frameworks. This helps simplify the risk analysis process and subsequently reduces some of the burden, costs, and confusion otherwise experienced by organizations when conducting a risk analysis.

HITRUST will transition the HITRUST Threat Catalogue into a more comprehensive and rigorous risk management tool—the HITRUST Risk Catalogue—through the planned addition of metadata related to information assets, vulnerabilities, and other non-threat specific areas of risk analysis.

Objectives of the Risk Catalogue Working Group:
The objectives of the HITRUST Risk Catalogue Working Group are to support further development of the HITRUST Risk Catalogue as a comprehensive risk assessment tool that will enable organizations to conduct more meaningful risk analyses and better leverage active threat intelligence in their risk management programs.

HITRUST Risk Catalogue Working Group Members will advise and make recommendations to HITRUST in the following key areas:

  • Updating the threat taxonomy and enumerated threats.
  • Mapping HITRUST CSF control requirements to enumerated threats.
  • Updating threat metadata in the Catalogue to support HITRUST’s work around quasi-quantitative risk analysis, which includes, but is not limited to:
    • Mobile Application Environment (MAE) assessment,
    • Quantitative and quasi-quantitative risk analysis, and
    • The MITRE ATT&CK framework.
  • Providing additional risk information, such as asset and vulnerability types.
  • Mapping this additional information to enumerated threats.

Mobile Application Environment (MAE) Working Group (WG) (2018-Present)

HITRUST launched a new Mobile Application Environment (MAE) Working Group (WG) to help solve the market need for organizations that employ mobile applications (apps) within their environment to ensure and provide interested stakeholders reasonable assurances that the internal development, distribution, implementation, and usage of apps are done securely.

The goal of the HITRUST MAE WG is to support the development and integration of organizational-level mobile app environment-related security and privacy control requirements into the HITRUST CSF and HITRUST CSF Assurance Program. The scope of the WG’s efforts may include an organization’s internal development, vetting, deployment, and operation of mobile apps and mobile devices, but does not currently include the technical testing and certification of the mobile apps themselves.

HITRUST MAE WG Members will advise and make recommendations to HITRUST in the following key areas:

  • Formal definition of the term “mobile applications environment” consistent with public and private sector usage and its intended use for the purpose of HITRUST CSF Certification.
  • Identification of security and privacy risks specific to an organization’s MAE, as defined, and the specification of structured HITRUST CSF control requirements to mitigate those risks, which may include but are not limited to:
    • Apps pushed to mobile devices and personal computers via a third party or organizational app store, and
    • Apps intended to run from a browser.

Specification of related changes, if any, to the HITRUST CSF Assurance Program to support the assessment and certification of an organization’s MAE, as defined.

If you are interested in Working Group participation, please fill out the form on the Working Group Sign-Up page.

Completed Working Groups

  • HITRUST Threat Catalogue Working Group (2016-2021)
  • HITRUST Information Security Continuous Monitoring (ISCM) Working Group (2019-2020)
  • HITRUST Shared Responsibility Working Group (2018-2020)
  • Industry Advisory Panel; AICPA SOC2 Working Group (2014-2019)
  • CSF Risk Factors Working Group (2014-2015)
  • Cybersecurity Working Group (2013-2014)
  • Content Definition Development Working Group (2011)
  • Mobile Devices Working Group (2011)
  • Cloud Security Working Group (2011)
  • Health Information Exchange Working Group (2011)

Chat Now

This is where you can start a live chat with a member of our team