Skip to content

HITRUST Government Affairs

HITRUST is dedicated to shaping policies that foster innovation, security, and trust in the digital age. Our efforts focus on promoting consistent and reliable standards, alignment across borders, cooperation, and stakeholder engagement to ensure cybersecurity and risk management excellence.  

Our Goals

Join us in our mission. We invite policymakers, industry leaders, and the public to join us in advocating for consistent standards, cross-border cooperation, and stakeholder engagement. Together, we can create a more transparent, accountable, and innovative society that serves the needs of all citizens. 

Promote Consistent, Relevant, Validated Standards
Promote Consistent, Relevant, Validated Standards

Advocate for the adoption of harmonized standards to ensure reliability and security across sectors and regions.

Enhance Cross-Border Alignment
Enhance Cross-Border Alignment

Bridge regulatory gaps and promote the adoption of international best practices for global interoperability.

Foster Cooperation
Foster Cooperation

Encourage collaboration among stakeholders to develop comprehensive and effective policies.

Engage Stakeholders
Engage Stakeholders

Prioritize open dialogue and incorporate diverse perspectives in policy-making processes.

Leverage Proven Practices
Leverage Proven Practices

Utilize insights from the HITRUST 2024 Trust Report to drive continuous improvement and accountability.

Divider

Achieving Consistent, Reliable Standards

Robust information security and risk management has never been more critical.
HITRUST believes in the power of consistent standards that are validated by relevant controls and reliable assurances. 

Why Consistent Standards Matter

The complexity and variety of regulatory requirements present significant challenges for organizations striving to secure their information assets. Inconsistent and fragmented standards not only complicate compliance efforts but also expose organizations to greater risks. By advocating for consistent standards, we aim to streamline these efforts, providing a unified approach that enhances security across all sectors.

The Role of Relevant Controls

Controls are the backbone of any effective information security program. Our standards are built on the foundation of meticulously selected controls that address the most pressing threats and vulnerabilities. By ensuring these controls are relevant and regularly updated, we provide organizations with the tools they need to proactively manage their security risks. 

Assurance Through Validation

Assurance is a cornerstone of our approach. We believe that standards must be not only consistent but also validated through rigorous and transparent processes. Reliable assurances give organizations the confidence that they are meeting the highest levels of security and compliance. This, in turn, fosters trust and accountability within industry and among regulatory bodies. 

Alignment Across Borders

In an interconnected world, cross-border alignment is essential for addressing global challenges and promoting collaboration. We work to bridge gaps between different regulatory environments and encourage the adoption of international best practices to enhance global interoperability and security.

Cooperation and Stakeholder Engagement

Engaging with stakeholders from government, private sector, academia, and civil society is vital for developing comprehensive and effective policies. Our efforts prioritize open dialogue and cooperation to ensure that diverse perspectives are considered and incorporated into policy-making processes and are practically achievable.

 

HITRUST Statement on 2024 HIPAA NPRM

 

Read HITRUST's statement on HIPAA Notice of Proposed Rulemaking.

 

HITRUST Letter to DHHS and Committees

 

Read HITRUST's statement, "The Opportunity to Provide Meaningful Change for Health Sector Cybersecurity."

 

HITRUST Letter to Congress

 

Read HITRUST's recommendations on avoiding or minimizing ransomware attacks that have impacted healthcare organizations.

Ready to take your information security program to the next level?

Chat

Chat Now

This is where you can start a live chat with a member of our team